TW200307428A - Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks - Google Patents

Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks Download PDF

Info

Publication number
TW200307428A
TW200307428A TW091134023A TW91134023A TW200307428A TW 200307428 A TW200307428 A TW 200307428A TW 091134023 A TW091134023 A TW 091134023A TW 91134023 A TW91134023 A TW 91134023A TW 200307428 A TW200307428 A TW 200307428A
Authority
TW
Taiwan
Prior art keywords
network
scope
plmn
item
authentication
Prior art date
Application number
TW091134023A
Other languages
Chinese (zh)
Other versions
TWI262005B (en
Inventor
Eyal Katz
Stuart Jeffery
Ilan Zorman
Dan Kolkowitz
Yair Karmi
Ben-Noon Gil
Original Assignee
Adjungo Networks Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/IL2002/000382 external-priority patent/WO2002093811A2/en
Application filed by Adjungo Networks Ltd filed Critical Adjungo Networks Ltd
Publication of TW200307428A publication Critical patent/TW200307428A/en
Application granted granted Critical
Publication of TWI262005B publication Critical patent/TWI262005B/en

Links

Abstract

Interface device for interfacing between a PLMN network and a non-PLMN network, the PLMN network being configured to recognize cellular base stations as nodes thereof through which to mediate connections to cellular mobile devices, the non-PLMN networks each comprising a plurality of access points for mediating connections to network compatible mobile devices, and for which the network compatible mobile devices are not required to be cellular devices. The interface device is configured as a node of the PLMN network to appear to the PLMN network as a standard cellular base station, and comprises functionality to make non-cellular devices connecting to the non-PLMN network and attempting to access the PLMN network through the non-PLMN network appear as cellular devices to the PLMN network.

Description

200307428 玖、發明說明 (發明說明應敘明:發明所屬之技術領域、先前技術、内容、實施方式及圖式簡單說明)200307428 发明, description of the invention (the description of the invention should state: the technical field to which the invention belongs, the prior art, the content, the embodiments, and the drawings)

【發明所屬技術領域J 發明領域 本發明是關於提供使非PLMN裝置可接達PLmn網路 5 及提供PLMN網路與非PLMN網路之介面的技術。 L先前技術3 發明背景 由於高速資料存取需求的快速成長。在9〇年代末期, 28 Kbps對於網路服務已經是非常快速了。然而現在對於 10網路服務即使是56 Kbps已被視為非常慢,而384 Kbps則 被視為一般的速度。以這些較高的傳輸速度,下載複雜的 網頁及“多樣媒體(rich media)”像是連續影像現已經是實際 可行的。 無線供應商現在正努力地將有線型式的經驗使用在無 !5線上來提供給他們的客戶。今日,行動電話供應商提供給 他們的行動電話客戶只是有限的f料而不是“多樣媒體,,服 務。現今使用在無線通訊上的典形的資料率是9 6 Kbps。 GPRS將很快的提升到5〇至8〇 Kbps(理論上可以達到⑴ Kbps),但相較於有線的384 Kbps而言仍然是慢的。 2〇 ^ 了解決者這個議題,行動電話業者積極的獲取額外 的授權頻寬及積極的要求工程界使用現有及預期的無線配 額來找更有效率的方法。但是這些行動執行要花費多年且 將花費相當的金錢。 未授權的無線網路變得非常受歡迎且可以使用在獲得 6 200307428 玖、發明說明 高速無線存取。未授權的無線網路操作在該ISM(工業,科 學及醫學)頻寬及被限制在非常低的的功率,其意為該頻 率可以被一再的重複使用。 IEEE 802. lib是未授權技術中的一個例子,其是非常 5 可以負擔得起及非常有能力提供高至10,000 Kbps的速度。 含蓋一小家庭或辦公室及支援三台電腦之一種802. lib無 線區域網(LAN)可以約500美元來被購得,及該設備漸變成 許多電腦產線上的標準配備,包括有戴爾公司及蘋果公司 。802.lib只是眾多無線LAN技術中的一種。其他的技術包 10 括HomeRF5 802.1 1,藍芽(Bluetooth)等。 當這些技術一開始是因辦公室及家庭所需而在無線區 域網路(WLAN)而被開發,然而一種新型態的網路服務供 應商使用此技術正在興起中。 在費用上,此等供應商透過802. lib提供公共存取。 15 此等網路正被安裝在機場,咖啡廳等及大眾會利用時間來 使用電腦的其他場所。本實施例是有關於在無線LAN及行 動電話或PLMN網路之間介面連接的問題。 高速未授權及授權網路存取技術現在可以被用來支援 700 Kbps至10 Mps及甚至更高的速度。此等無線存取技術 20 的例子包括有藍芽及無線LAN像是802.11 (X)。此等網域具 有相當高的速度來支援多樣媒體服務像是影像電話,連續 影像等。 PLMN使用者可以使用此等非PLMN存取網路(Access Network:AN)來高速存取多樣媒體服務。 7 200307428 玖、發明說明 在許多存取場所中,該非PLMN存取網路可以攜帶被 定位在該存取場所之相當大量的多樣媒體。一範例可以是 如一運動領域,其中該主要的多樣媒體源將是幾乎即時播 放比赛的精彩片段。而此多樣媒體可以透過通訊經由該 5 PLMN被傳送,保持此多樣媒體遠離該核心網路將降低該 網路的負擔。[Technical field to which the invention belongs J. Field of the invention The present invention relates to a technology for providing a non-PLMN device with access to a PLmn network 5 and providing an interface between the PLMN network and a non-PLMN network. L Prior Art 3 Background of the Invention Due to the rapid growth of high-speed data access requirements. In the late 1990s, 28 Kbps was already very fast for web services. However, even 56 Kbps is now considered very slow for 10 network services, and 384 Kbps is considered as the average speed. With these higher transmission speeds, downloading complex web pages and "rich media" like continuous images is now practically feasible. Wireless vendors are now working hard to use wired experience to provide their customers. Today, mobile phone providers provide their mobile phone customers with only limited information instead of "multimedia, services. The typical data rate used in wireless communications today is 96 Kbps. GPRS will soon improve To 50 to 80 Kbps (theoretically can reach ⑴ Kbps), but it is still slow compared to the wired 384 Kbps. 2 ^ After solving the issue of the solver, mobile phone operators actively obtain additional authorized frequencies Broad and aggressive requirements require the engineering community to use existing and expected wireless quotas to find more efficient methods. But these actions take years and will cost considerable money. Unauthorized wireless networks have become very popular and available After obtaining 6 200307428, invention description high-speed wireless access. Unauthorized wireless network operation in the ISM (Industrial, Scientific and Medical) bandwidth and limited to very low power, which means that the frequency can be repeatedly IEEE 802.lib is an example of unlicensed technology, which is very affordable and very capable of providing speeds up to 10,000 Kbps. A 802.lib wireless local area network (LAN) that covers a small home or office and supports three computers can be purchased for about $ 500, and the device has become standard equipment on many computer production lines, including Dell and Apple Inc. 802.lib is just one of many wireless LAN technologies. Other technologies include HomeRF5 802.1 1, Bluetooth, etc. When these technologies were first introduced in wireless LANs for office and home needs (WLAN) was developed, but a new type of network service provider is using this technology is emerging. In terms of cost, these providers provide public access through 802. lib. 15 These networks are being installed At airports, cafes, etc. and other places where the public will use time to use computers. This embodiment is related to the problem of interface connection between wireless LAN and mobile phones or PLMN networks. High-speed unauthorized and authorized network access Technology can now be used to support speeds from 700 Kbps to 10 Mps and even higher. Examples of such wireless access technologies20 include Bluetooth and wireless LANs such as 802.11 (X). The domain has a very high speed to support a variety of media services such as video phone, continuous video, etc. PLMN users can use these non-PLMN access networks (Access Network: AN) to access high-speed multiple media services. 7 200307428 玖Description of the invention In many access places, the non-PLMN access network can carry a considerable amount of diverse media located in the access place. An example could be the field of sports, where the main source of diverse media would be almost Play moments of the game instantly. The multiple media can be transmitted through the 5 PLMN through communication. Keeping the multiple media away from the core network will reduce the burden on the network.

為了利用此等資料但不是額外地變成巨大pLMN網路 的一部份,其需要以整合的方式來支援群組至群組(peer_ to-Peer),群組對區域伺服器及群對網路外連接型式,使 10 一單一連接客戶端可以利用所有的連接型式。此因為使用 者不想要有組端子,因此支援音頻通訊也是一種關鍵技術 要求。 牽涉到提供此介面連接的一議題是因為PLmn型網路 被設計來確保只有該網路的使用者是可以證明他們是特定 15電話號碼之所有人的裝置。此等設計之目的是確保帳單可 以可罪且正確地被產生’而其他非本人使用是不可能的且 未授權存取網路大體上是不可能的。最終,該等行動電話 設備或是提供有為一安全晶片及演算法之訂購者身份模組 (SIM)來變識該設被於該pLMN,及依據該特定網路之架構 20來額外執行資料加密及解密,或是它們具有身份資料讓系 統使用來認證它們來進入該網路。 SIM是保密避免複製及内部檢驗的實體裝置,其意為 4負料不會被外部讀取且不能使用分解元件來被還元。 该SIM典型地是由使用者實際擁有及被使用者安裝在 8 200307428 玖、發明說明 該設備中,典型地如行動電話中,該設備被使用來存取該 網路,此意為該存取裝置具有—SIM卡載體及讀取器。該 SIM觀念被廣泛地使用及更進一步允許該使用者簡易地由 既存的設備中取出他的SIM卡而將其置於新的設備中來交 5換正被使用來存取該網路的該設備而能保持相同的身份及 電話號碼。 SIM基礎的認證是適用於行動電話裝置直接連接至該 PLMN。然而,其也被考慮讓使用者可以透過行動電話連 接上一區域非PLMN網路像是藍芽網路及由此連接。再者 10 ,該區域非PLMN網路大體上可以使用在相當多的裝置上 ,像是攜帶型電腦,PDA型裝置及不是傳統行動電化裳置 及非標準配置有行動電話辨識單元,SIM或甚至一sim卡 載體或讀取機之類似裝置。次等裝置被總稱為“非_裝置” 。其需要提供一基礎設備來允許此等非SIM裝置透過該區 15域網路連接該行動電話網路,或至少准許他們存取其他的 網路,例如,基於他們的行動電話辨識單元之網際網路。 再者,區域非PLMN網路就其特性是非常的區域化的 。使用者在使用該裝置時可能想要移動使用,然而其可能 很容易地發現他自己已經超出了任何便利的存取點的範圍 2〇。更特別地,在—小範圍或局限範圍之内的移動行用者可 以使用適於10至100公尺級距之小範圍的任何技術而由一 區域存取點(AP)獲的服務。每一此等Ap支援一網路的區域 T動使用者。在每-使用者及該^之間的通訊連接由於改 變行進路徑損失,可利用傳輸能量,介面水準及網路負載 200307428In order to make use of this data without becoming part of a huge pLMN network, it needs to support group-to-group (peer_to-Peer), group-to-area server, and group-to-network in an integrated manner. External connection types, so that a single connection client can take advantage of all connection types. This is because the user does not want to have group terminals, so supporting audio communication is also a key technical requirement. One issue involved in providing this interface connection is because the PLmn-type network is designed to ensure that only users of that network are devices that can prove that they are the owner of a particular 15 phone number. The purpose of these designs is to ensure that the bill can be guilty and generated correctly 'while other non-personal use is impossible and unauthorized access to the network is generally impossible. In the end, these mobile phone devices may be provided with a Subscriber Identity Module (SIM) as a security chip and algorithm to identify the device being used in the pLMN, and perform additional data based on the specific network architecture 20 Encrypt and decrypt, or they have identity information that the system uses to authenticate them to enter the network. SIM is a physical device that is confidential to avoid duplication and internal inspection. It means that 4 negative materials cannot be read externally and cannot be returned using disassembly components. The SIM is typically owned by the user and installed by the user on 8 200307428. Invention Description The device, typically a mobile phone, is used to access the network, which means the access The device has a SIM card carrier and a reader. The SIM concept is widely used and further allows the user to simply remove his SIM card from an existing device and place it in a new device to exchange the device that is being used to access the network. The device can maintain the same identity and phone number. SIM-based authentication is suitable for mobile phone devices connected directly to the PLMN. However, it is also considered to allow users to connect to a regional non-PLMN network such as a Bluetooth network and so on via a mobile phone. Furthermore, the non-PLMN network in this area can be used on a large number of devices, such as portable computers, PDA-type devices, and non-traditional mobile electronic devices, and non-standard mobile phone identification units, SIM or even A sim card carrier or similar device for a reader. Inferior devices are collectively referred to as "non-devices". It needs to provide basic equipment to allow these non-SIM devices to connect to the mobile phone network through the 15-domain network in the area, or at least allow them to access other networks, such as the Internet based on their mobile phone identification unit road. Furthermore, regional non-PLMN networks are very regional in nature. The user may want to use the device while using the device, however, he may easily find himself beyond the range of any convenient access point. More specifically, mobile users in a small or limited range can use any technology suitable for a small range in the range of 10 to 100 meters to be served by an area access point (AP). Each of these APs supports a network of local users. The communication link between each user and the router can be used to reduce transmission path loss, which can use transmission energy, interface level, and network load 200307428

10 1510 15

玖、發明說明 而會在一大範圍之内有變化不同。 如果有多於一個AP在該區域内操作,無論多數個ap 疋被t e在單一存取點或其等被安裝在鄰近的分離區域 ,其可以讓使用者由不同的AP而不是正被使用或已經被考 5慮使用的AP來或的較佳通訊條件的服務。 該問題而後是要決動是否另一Ap是可以使用及讓使用 者可以連接至那另一個AP。此一問題是藉由被統稱為‘‘信 號交遞(handoff),,之廣泛可行程序來加以解決。 另問題發生在當一使用者配有一雙技術終端機,例 士行動電铦及無線LAN,行動電話及有線網路存取等, 及該連接需要由使用-技術之_存取點被交換至使用另一 技術之—存取點。在此情況中,通常與信號交遞相關之該 邏輯不會使用;然而,-不同的方法是被需要用來在該等 有效的通訊資源中作最佳使用。 md妓出來在—小且局限區域内提供網路 連接。在此技術群中最為人所熟知的是8G2 n頻率跳躍及 直接序列無線lan(WLAN)標準及藍芽技術。此等技術之 :準視該網路為獨立運作。當此一網路之一會員或一可能 =員不能由該網路存取點獲得㈤意的資料時,其原因可: 二由於惡化的通訊條件或網路負冑,在眾多負面处果之一 :能是來自使用者的立場:其可能保持暫停、,解:/脫離 r網路或被供應以不能被接受的低資料率。現存的解決方 =不%支援搜*或轉換該使用者至工作在該區域中的另一 罔路’亦即’並沒有等同於該行動電話交遞讓該移動使用 10 200307428 玖、發明說明 者被移轉至可你滿足其通訊需求的另一存取點。 再者’並沒有技術標準被提出來控制在提供服務給此 等局限範圍之技術及與寬區域主要如行動電晝之技術之間 的轉換,或是在經由無線及有線連接覆蓋大區域之技術之 5 間的轉換。 其也需要考慮遠端連接認證,例如,認證遠端交易或 確過该正確的使用者有被遠端服務提供者請求付款,以及 除非其中一網路可以經由典型地如其他網路之網路通道被 使用來提供認證給使用者的通訊連接,介面連接在網路之 1〇間疋不算完成的,該網路通道不是保密的或是一使用者無 法非常確認辨識。 現在存在有許多交易並不需要實體相鄰的交易對象下 來執行交易。此等環境包括有ATM交易,信用卡及其它藉 由電活進行的交易,以及透過網際網路進行的交易。一般 15而言,買方的身份在此等交易中不會被建立至一相當高的 =次。該等交易經由未保密及/或非認證連接及使用未保 密及/或非涊證連接之通訊技術,而讓使用者個人資料及 信用卡號碼被偷。 現今,電子付款的方法是非常依賴信用卡,其使得對 2〇小額付款難以徵稅,像是使用網路的時間費用,或下載資 料項目的小額費用。 現在存在有許多交易並不需要實體相鄰的交易對象下 來執行交易。此等環境包括有ATM交易,信用卡及其它藉 由電話進行的交易,以及透過網際網路進行的交易。一 a 200307428 玫、發明說明 貝方的身份在此等交易中不會被建立至一相當高的 層次。該等交易經由未保密及/或非認證連接及使用未保 密及/或非認證連接之通訊技術,而讓使用者個人資料及 信用卡號碼被偷。 5 現今,電子付款的方法是非常依賴信用卡,其使得對 J額付放難以徵稅,像是使用網路的時間費用,或下載資 料項目的小額費用。 、 C 明内容】 發明概要 10 根據本發明之第一特徵,因此其具有介面連接於一 PL_網路與非PL_網路之間的介面裝置,上述凡顧網 路被架構來確認蜂巢細胞基地台作為中繼連接至該蜂巢細 胞行動裝置之節點,上述非PLMN網路的每一個包括有中 繼連接至網路相容行動裝置之多數個存取點,上述網路相 15容行動裝置不需要是蜂巢細胞行動裝置,上述介面裝置被 架構來作為上述PLMN之一節點以使得上述pLMN網路作 為它的一基地台及具有使非蜂巢細胞行動裝置連接至上述 非PLMN網路及用來存取上述網路之功能,藉此如同蜂巢 細胞行動裝置存取至上述PLMN網路一樣。 2〇 該裝置最好包括有用來通話的一交換電路介面及用來 作資料及控制使用之一分封介面。 幸义佳地,上述PLMN網路是為具有一 a介面或一 介 面之一GSM網路,及上述交換電路介面可以操作使用上述 A介面及上述分封介面可以操作使用上述Gb介面。 12 200307428 玖、發明說明 較佳地,上述PLMN網路是具有一 IuCS介面及一IuPS 介面之一 UMTS網路,及其中上述交換電路介面可以操作 使用上述IuCS介面及上述分封介面可以操作使用上述IuPS 介面。 5 該裝置最好包括有與上述非PLMN網路之保密層相關 之一模擬蜂巢細胞辨識閘道器及可操作來決定一連接裝置 已經被上述非PLMN網路所認證,及可操作響應一 PLMN 網路認證佇列來指示上述認證已經成功。 較佳地,上述模擬蜂巢細胞辨識閘道器是一模擬SIM 10 閘道器及上述PLMN網路是一 GSM網路。 較佳地,上述模擬蜂巢細胞辨識是一模擬ESN閘道器 及上述PLMN網路是為一 CDMA網路。 較佳地,上述非PLMN保密層是包括有SSL,Ipsec, TLS,SRP,及SSH之一群組中的一個,及其中上述群組之 15 —的認證需要允許上述模擬SIM閘道器來提供上述認證響 應至上述PLMN網路。 較佳地,上述保密層可被架構設定一所需要的保密水 準。 該裝置最好包括有一傳聲器,其用來接收來自上述非 20 PLMN網路之部份傳聲信號用以傳聲使用,及接收來自上 述PLMN網路之被傳聲的聲音信號用以部份解碼。 該裝置最號包括有一傳聲器,其用來接收來自上述非 PLMN網路之部份傳聲信號用以傳聲使用,及接收來自上 述PLMN網路之被傳聲的聲音信號用以部份解碼。 13 200307428 玖、發明說明 較佳地,該裝置被架構始得上述PLMN網路同時作為 用於分封資料之一服務GPRS支援節點(SGSN)及作為交換 電路資料之一基地台。 較佳地,更包括有認證連接至上述非PLMN網路之一 裝置的功能。 該裝置最好更包括有著冊連接至上述非PLMN網路之 一裝置的功能。发明 、 Explanation of invention It will vary within a wide range. If there is more than one AP operating in the area, no matter if multiple APs are installed at a single access point or they are installed in adjacent separate areas, it allows users to use different APs instead of being used or Services that have been considered using APs for better communication conditions. This question then determines whether another AP is available and allows the user to connect to that other AP. This problem is addressed through a wide range of feasible procedures collectively referred to as' 'handoff'. Another problem occurs when a user is equipped with a pair of technical terminals, such as mobile phones and wireless LAN, mobile phones and wired network access, etc., and the connection needs to be exchanged by the use-technology access point to Use another technology-access point. In this case, the logic normally associated with signal delivery will not be used; however, a different approach is needed to make the best use of such effective communication resources. MD prostitutes come out to provide internet connectivity in a small and confined area. The best known in this technology group are the 8G2 n frequency hopping and direct sequence wireless lan (WLAN) standards and Bluetooth technology. These technologies: The network is considered to operate independently. When a member of this network or a member of the network cannot obtain arbitrary data from the network access point, the reasons can be: Second, due to deteriorating communication conditions or network load, it has resulted in many negative consequences. One: It can be from the user's standpoint: it may remain suspended, and / or be disconnected from the network or supplied at an unacceptably low data rate. Existing solution = not% support to search * or convert the user to another way of working in the area 'that is' is not equivalent to the mobile phone handing over to the mobile for use 10 200307428 玖, the inventor Moved to another access point where you can meet their communication needs. Furthermore, no technical standards have been proposed to control the transition between technologies that provide services to these confined areas, and technologies that cover a wide area, such as mobile power, or technologies that cover large areas via wireless and wired connections. 5 conversions. It also needs to consider remote connection authentication, for example, authenticating a remote transaction or verifying that the correct user has been requested to pay by a remote service provider, and unless one of the networks can be accessed via a network such as the others The channel is used to provide a communication connection for authentication to the user. The interface connection is not complete between 10 networks. The network channel is not confidential or a user cannot confirm it. There are many transactions that do not require entities that are adjacent to the transaction to execute the transaction. These environments include ATM transactions, credit cards and other transactions made through electronic activities, and transactions made over the Internet. Generally speaking, the buyer's identity will not be established to a fairly high level in these transactions. These transactions involve the theft of user personal data and credit card numbers through unsecured and / or unauthenticated connections and the use of unsecured and / or unsecured connections. Today, electronic payment methods rely heavily on credit cards, which makes it difficult to levy 20 small payments, such as time spent on the Internet or small charges for downloading data items. There are many transactions that do not require entities that are adjacent to the transaction to execute the transaction. These environments include ATM transactions, credit card and other transactions over the phone, and transactions over the Internet. A 200307428 Rose, invention description The identity of the Bay side will not be established to a fairly high level in these transactions. These transactions allow users' personal data and credit card numbers to be stolen through unsecured and / or unauthenticated connections and the use of unsecured and / or unauthenticated communication technologies. 5 Today, electronic payment methods rely heavily on credit cards, which makes it difficult to tax J payments, such as time spent using the Internet, or small fees for downloading data items. Contents of the invention] Summary of the invention 10 According to the first feature of the present invention, it has an interface device with an interface connected between a PL_ network and a non-PL_ network. The above mentioned network is structured to confirm the honeycomb cells. The base station serves as a node connected to the cellular mobile device via a relay. Each of the above-mentioned non-PLMN networks includes a plurality of access points that are connected to a network-compatible mobile device through relay. The interface device does not need to be a honeycomb cell mobile device. The above interface device is structured to serve as a node of the PLMN so that the pLMN network serves as a base station thereof. The functions of accessing the above network are similar to that of the cellular network mobile device accessing the above PLMN network. 20 The device preferably includes a switching circuit interface for communication and a decapsulation interface for data and control use. Fortunately, the above PLMN network is a GSM network having an a interface or an interface, and the switching circuit interface can operate using the A interface and the decapsulating interface can operate using the Gb interface. 12 200307428 发明 Description of the invention Preferably, the PLMN network is a UMTS network with an IuCS interface and an IuPS interface, and the above-mentioned switching circuit interface can operate using the above-mentioned IuCS interface and the above-mentioned decapsulation interface can operate using the above-mentioned IuPS interface. 5 The device preferably includes a simulated honeycomb cell recognition gateway related to the security layer of the non-PLMN network and operable to determine that a connected device has been authenticated by the non-PLMN network, and is operable to respond to a PLMN A network authentication queue indicates that the above authentication has been successful. Preferably, the simulated honeycomb cell recognition gateway is a simulated SIM 10 gateway and the PLMN network is a GSM network. Preferably, the simulated honeycomb cell identification is a simulated ESN gateway and the PLMN network is a CDMA network. Preferably, the above-mentioned non-PLMN security layer is one of a group consisting of SSL, IPsec, TLS, SRP, and SSH, and 15 of the above-mentioned groups of authentication needs to allow the above-mentioned simulated SIM gateway to provide The authentication response is returned to the PLMN network. Preferably, the security layer can be set to a required level of security by the architecture. The device preferably includes a microphone for receiving a part of the sound transmission signal from the non-20 PLMN network for sound transmission, and receiving a sounded sound signal from the PLMN network for partial decoding. . The device includes a microphone, which is used to receive a part of the sound transmission signal from the non-PLMN network for sound transmission, and to receive the sounded sound signal from the PLMN network for partial decoding. 13 200307428 发明. Description of the invention Preferably, the device is constructed so that the above-mentioned PLMN network serves as a serving GPRS support node (SGSN) for packet data and as a base station for switching circuit data. Preferably, it further includes a function of authenticating a device connected to the non-PLMN network. The device preferably further includes a function of having a device connected to the above-mentioned non-PLMN network.

該裝置最好包括有更新連接至上述非PLMN網路之一 裝置之位置的功能。 10 該裝置最好包括有支援允許連接上至上述非PLMN網 路之一裝置產生服務請求之功能。 該裝置最好包括有提供具有為上述PLMN網路規格化 的連接控制資料之上述PLMN網路可以整合相應活動至一 完整帳單之功能。 15 該裝置最好被架構來與上述非PLMN網路之一連接管 理單元一起操作,藉此獲得來自連接使用者及被交換資料 的品質之非PLMN網路細節。 該裝置最好包括有規格化所獲得的上述細節成為一 PLMN相容規格之功能。 20 該裝置最好包括有與其相關的一蜂巢細胞辨識模組, 用以提供PLMN保密功能,藉此允許透過上述無線LAN存 取一 PLMN網路。 較佳地,蜂巢細胞辨識模組是安裝在上述存取卡上。 較佳地,上述蜂巢細胞辨識模組是可以反向地安裝在 14 200307428 玖、發明說明 上述存取卡。 較佳地,上述蜂巢細胞辨識模組是一 SIM。 較佳地,該裝置同時包括有一 SIM載體及一 SIM讀取 器。 5 較佳地,上述蜂巢細胞辨識模組是一垂直蜂巢細胞辨 識模組。 較佳地,上述垂直蜂巢細胞辨識模組是包括有SIM功 能之一垂直模組。 該裝置最好包括有與一 LAN閘道器交換認證信號之功 10 能,藉此達到網路認證。 較佳地,上述認證信號被規格化可以在上述閘道器及 上述PLMN網路之間傳遞,藉此來獲得PLMN認證。 根據本發明之第二特徵,其提供一種經由使用非 PLMN裝置之非PLMN網路來存取PLMN網路的方法,包括 15 有: 提供上述非PLMN裝置具有匹配於上述非PLMN網路 之一存取卡, 提供上述存取卡具有一蜂巢細胞辨識模組,及 提供上述非PLMN網路具有閘道器功能,以保留蜂巢 20 細胞辨識信號於上述非PLMN裝置與上述PLMN網路之間 〇 根據本發明之第三特徵,其提供有一種經由使用非 PLMN裝置之非PLMN網路來存取PLMN網路的方法,包括 有: 15 200307428 玖、發明說明 提供上述非PLMN網路具有用來認證上述非PLMN裝 置之一保密認證單元,及 提供上述非PLMN網路具有與上述保密認證單元相關 之閘道器功能,以操作上述認證單元及保留響影於上述非 5 PLMN網路之認證的蜂巢細胞辨識信號給上述PLMN網路The device preferably includes a function of updating the location of a device connected to one of the non-PLMN networks described above. 10 The device preferably includes a function that allows a device to connect to one of the above non-PLMN networks to generate a service request. The device preferably includes a function of providing the above-mentioned PLMN network with connection control data standardized for the above-mentioned PLMN network to integrate corresponding activities into a complete bill. 15 The device is preferably structured to operate with a connection management unit of one of the non-PLMN networks described above, thereby obtaining non-PLMN network details from the quality of the connected users and the data exchanged. The device preferably includes the function of normalizing the above-mentioned details to become a PLMN-compliant specification. 20 The device preferably includes a honeycomb cell identification module associated with it to provide PLMN security functions, thereby allowing access to a PLMN network via the wireless LAN described above. Preferably, the honeycomb cell identification module is installed on the access card. Preferably, the above honeycomb cell identification module can be reversely installed at 14 200307428 (ii), the above description of the access card. Preferably, the honeycomb cell identification module is a SIM. Preferably, the device includes a SIM carrier and a SIM reader. 5 Preferably, the honeycomb cell identification module is a vertical honeycomb cell identification module. Preferably, the vertical honeycomb cell identification module is a vertical module including a SIM function. The device preferably includes the ability to exchange authentication signals with a LAN gateway to achieve network authentication. Preferably, the authentication signal is standardized to be transmitted between the gateway and the PLMN network, thereby obtaining a PLMN authentication. According to a second feature of the present invention, it provides a method for accessing a PLMN network via a non-PLMN network using a non-PLMN device, including the following: providing the above-mentioned non-PLMN device having a memory matching one of the above-mentioned non-PLMN networks; Remove the card, provide the access card with a honeycomb cell identification module, and provide the non-PLMN network with a gateway function to retain the honeycomb 20 cell identification signal between the non-PLMN device and the PLMN network. A third feature of the present invention is to provide a method for accessing a PLMN network via a non-PLMN network using a non-PLMN device, including: 15 200307428 玖. Description of the invention The above non-PLMN network is provided for authenticating the above A confidential authentication unit of a non-PLMN device, and a gateway function that provides the non-PLMN network with a function of the confidential authentication unit to operate the authentication unit and retain the authentication hive cells that are affected by the non-5PLMN network Identification signal to the above PLMN network

10 根據本發明之第四特徵,其提供有一種在一 PLMN網 路與一非PLMN網路之間操作一保密閘道器來使非PLMN 裝置可以認證使用在PLMN連接之方法,該方法包括有: 藉由一第一認證協定來認證上述非PLMN網路,及 透過一蜂巢細胞認證協定來與上述PLMN網路交換信 號,其包括有透過上述第一協定來指示緊接著認證來作裝 置認證。 根據本發明之第五特徵,其提供有一種在一 PLMN網 15 路與一非PLMN網路之間操作一保密閘道器來使非PLMN 裝置可以認證使用在PLMN連接之方法,該方法包括有: 透過一蜂巢細胞認證協動來與上述PLMN網路交換信 號,藉此認證上述非PLMN網路來連接至上述裝置。 根據本發明之第六特徵,其提供有一種管理行動裝置 20 單元之信號交遞(handoff)之信號交遞管理器,其使用在一 第一行動裝置網路存取點及一第二行動裝置網路存取點之 間的一可辨識電信工作時期來通訊,其中上述第一存取點 屬於一第一網路,及上述第二存取點屬於一第二網路,上 述管理器可以共同地存每一網路及包括有: 16 200307428 玖、發明說明 仃動裝置單①匹配器’用以執行在具有未與一網路 切斷之行動裝置單元及具有連接其他網路之間的匹配;及 -電信工作時期維持器’與上述行動裝置單元匹配器 搭配用來傳送在該等因此配對之行動裝置單元之間的工作 5時期,藉此在該等網路之間進行信號交遞》 該信號交遞管理器最好包括有在一單一區域之一單元 Ο 礼唬乂遞官理器最好包括有位在多數個内部網路及 交互網路上的分散功能。 1〇 較佳地,上述網路中的-個網路是為-PLMN網路。 較佳地,上述網路中的一個網路是一無線lan網路。 較佳地,上述網路中的一個網路是一無線lan網路。 a該信號交遞管理器最好更包括有一電信工作時期主動 吕理單7L ’在當連接品質臨界標準不能達到時,由一現在 15被使用網路來決定,用以指示上述行動裝置單元搜尋周圍 的網路及決定它的連接參數,以由上述參數中辨識出一最 加網路及指示上述行動裝置單元連接上述最佳網路。 較佳地,上料信工作時期主動管理單元與上述行動 裝置單源匹配器-起使用,藉此使用上述指示來協助上述 20 的匹配。 較佳地,上述電信工作時期主動管理單元可操作決定 上述被指示的匹配是否已經成功,及在沒有成功連接時, 其可操作指示上述行動裝置單元連接至下一最佳網路。 較佳地’上述電信工作時期主動管理單元可操作繼續 17 200307428 玖、發明說明 指示上述行動裝置單元來連接至下一最佳單元直到一成功 的連接被指示為止。 該信號交遞管理器最好包括有一電信工作時期被動管 理單元,用以在當連接品質臨界值不能符合時,由上述行 動褒置單元來決定,以指示上述行動裝置單元搜尋附近網 路及決定它的連接參數,以由上述參數辨識一最佳網路及 指示上述行動裝置單元連接至上述網路。 该信號交遞管理器最好更可操作指示上述行動裝置單 元來由一第一網路切斷及接著連接至一最佳網路。 該信號交遞管理器最好可操作指示上術行動裝置單元 連接至一最佳網路及接著由現在的網路切斷。 該信號交遞管理器最好可操作降低在一現在網路上的 連接品f,藉此強迫上述行動裝置單元由其切斷並找尋另 一網路。 該信號交遞管理器最好緊接選擇一最佳網路用來再連 接,以講低在現在網路上的連接品質,及傳送一指示至上 述仃動單兀以連接至上述被選擇的最佳網路。 該信號交遞管理器最好操作提供給多數個可能可使用 網路之上述行動裝置單元辨識碼。 該信號交遞管理器最好操作提#一個可能使用網路之 上述行動裝置單元辯識碼。 較佳地,上述參數包括有下列群組中之任一 ··一相對 PLMN網路之較佳存取通道,可以支援較佳分散说基本 架構之網際網路存取之代理抒之身份碼,上述可能可使用 18 200307428 玖、發明說明 網路之負載條件。上述可能可取得網路之一般性可取的參 數’網際網路存取之網路存取號碼,及在上述可能可取得 網路之期望負載條件上的資訊。 較佳地,上述第一行動裝置網路及上述第二行動裝置 5網路分別是一單-熱點(H〇tsp〇t)的無線。 車乂佳也±述第一及第二網路是重疊網路及信號交遞 之一行動裝置單元位在上述網路之間重疊的一點上。 較佳地,上述第一及上述第二網路分別使用相同的網 路協定。 1〇 車交佳地’上述第-及上述第二網路分別使用不同網路 協定。 較佳地,上述第一及第二網路是非重疊的。 較佳地,上述第一網路及上述第二網路分別是不同的 熱點。 15 較佳地,上述不同的熱點具有一區域的重疊及其中信 號父遞之一行動裝置單元位在上述重疊區域。 較佳地,上述該等熱點使用一單一通訊協定。 較佳地,上述該等熱點分別使用不同的通訊協定。 較佳地,上述第一網路及上述第二網路分別是pLMN 20 網路。 較佳地,上述第一PLMN及上述第二Plmn網路使用 一單一通訊協定。 較佳地,上述第一 PLMN及上述第二pLMN網路分別 使用不同的通訊協定。 19 200307428 玖、發明說明 較佳地,上述第-及上述第二通訊網路具有重疊區域 及其中信號交遞之-行動裝置單元是位在上述重疊區域中 0 幸又佳地Jl述第、網路是一無線區域網路及上述第二 網路是一 PLMN網路。 較佳地’上述無線區域網路位在於上述pLMN網路覆 盖區域之内。10 According to a fourth feature of the present invention, there is provided a method for operating a secure gateway between a PLMN network and a non-PLMN network to enable a non-PLMN device to authenticate for use in a PLMN connection. The method includes: : Authenticating the non-PLMN network by a first authentication protocol, and exchanging signals with the PLMN network by a honeycomb cell authentication protocol, which includes instructing device authentication by following the first protocol through authentication. According to a fifth feature of the present invention, there is provided a method of operating a secure gateway between a PLMN network 15 and a non-PLMN network to enable non-PLMN devices to authenticate and use in a PLMN connection. The method includes: : Exchange signals with the PLMN network through a honeycomb cell authentication collaboration to authenticate the non-PLMN network to connect to the device. According to a sixth feature of the present invention, there is provided a signal handover manager for managing a signal handoff of 20 units of a mobile device, which uses a network access point of a first mobile device and a second mobile device The network access points communicate with each other in a recognizable telecommunication working period. The first access point belongs to a first network and the second access point belongs to a second network. The managers can share Store each network and include: 16 200307428 玖, description of the invention, automatic device list ① matcher 'is used to perform matching between a mobile device unit that is not disconnected from a network and a connection to other networks ; And-the telecommunication working period maintainer 'is used in conjunction with the above mobile device unit matcher to transmit the 5 working periods between the mobile device units thus paired, thereby transmitting signals between these networks " The signal handover manager preferably includes a unit in a single area. The teleportation manager preferably includes decentralized functions on multiple internal networks and interactive networks. 10 Preferably, one of the networks is a PLMN network. Preferably, one of the networks is a wireless LAN network. Preferably, one of the networks is a wireless LAN network. a The signal delivery manager preferably further includes an active Lülidan 7L during the telecommunications work period. When the critical quality of the connection cannot be reached, it is determined by the current 15 network to instruct the mobile device unit to search. The surrounding network and its connection parameters are determined to identify an optimal network from the parameters and instruct the mobile device unit to connect to the optimal network. Preferably, the active management unit and the single source matcher of the mobile device are used together during the working period of the feeding letter, thereby using the above instruction to assist the matching of the 20 above. Preferably, the active management unit during the telecommunication work period is operable to determine whether the indicated matching has been successful, and when there is no successful connection, it is operable to instruct the mobile device unit to connect to the next best network. Preferably, the above-mentioned active management unit of the telecommunication working period is operable to continue. 17 200307428 (ii) Description of the invention The mobile unit is instructed to connect to the next best unit until a successful connection is indicated. The signal handover manager preferably includes a passive management unit during the telecommunication work period, which is used by the mobile setting unit to determine when the connection quality threshold cannot be met, to instruct the mobile device unit to search for nearby networks and determine Its connection parameters are used to identify an optimal network from the parameters and instruct the mobile device unit to connect to the network. Preferably, the signal delivery manager is further operable to instruct the mobile device unit to be disconnected from a first network and then connected to an optimal network. The signal delivery manager is preferably operable to indicate that the mobile device unit is connected to an optimal network and then disconnected from the current network. The signal delivery manager is preferably operable to lower the connection f on an existing network, thereby forcing the mobile device unit to cut off and search for another network. The signal handover manager preferably selects the best network for reconnection immediately, so as to lower the connection quality on the current network, and sends an instruction to the above-mentioned automatic unit to connect to the selected best network.佳 网络. The signal delivery manager preferably operates to provide a plurality of such mobile device unit identifiers that may be available on the network. The signal delivery manager preferably operates a mobile device unit identification code that may use the network. Preferably, the above-mentioned parameters include any of the following groups: a better access channel relative to the PLMN network, which can support a better distributed identity of the basic architecture of the Internet access proxy, The above may use 18 200307428. The invention explains the load conditions of the network. The above may obtain the general desirable parameters of the network, the Internet access number of the Internet access, and the information on the expected load conditions of the network that may be obtained above. Preferably, each of the first mobile device network and the second mobile device 5 network is a single-hotspot (Hotshot) wireless. Che Yejia also mentioned that the first and second networks are overlapping networks and one of the signal delivery. The mobile device unit is located at a point where the above networks overlap. Preferably, the first network and the second network each use the same network protocol. 10 车 交 佳 地 ’The first and second networks described above use different network protocols. Preferably, the first and second networks are non-overlapping. Preferably, the first network and the second network are different hotspots, respectively. 15 Preferably, the different hotspots have an area overlap and one of the mobile device units of the signal parent is located in the overlap area. Preferably, the aforementioned hot spots use a single communication protocol. Preferably, the aforementioned hot spots use different communication protocols, respectively. Preferably, the first network and the second network are pLMN 20 networks, respectively. Preferably, the first PLMN and the second Plmn network use a single communication protocol. Preferably, the first PLMN and the second pLMN network respectively use different communication protocols. 19 200307428 发明. Description of the invention Preferably, the first and second communication networks have overlapping areas and the signal delivery thereof in the mobile device unit is located in the overlapping area. It is a wireless local area network and the second network is a PLMN network. Preferably, 'the wireless LAN is located within the coverage area of the pLMN network.

該信號交遞管理器最好包括有用來設定無線區域網路 作為較上述PLMN具有較高優先順序之—優先順序單元, 10 使一行動裝置單元在位在它的範圍之内時,自動地信號交 遞至上述無線區域網路。 根據本發明之第七特徵,其提供有一種行動裝置單元 之信號交遞方法,該行動震置單元在-通訊工作時期中通 Λ上述仏號父遞疋在一第一及一第二無線網路之間個別 15的存取點之間,該方法包括有·· 提供共用於上述網路二者之位置上的-控制點; 在上述控制點決定行動裝置單元之身份,其中誰的連 接已經被中斷及獲得它的相對電信工作時期之資料; 在上述控制點決定形成與行動裝置單元新的連接之身 2〇 份; 在上述控制點匹配上述身份,藉此匹配與_行動裝置 單兀之一存在電信工作時期,其中該行動裝置單元已經中 止在一第一存取點上的連接及已經再連接於一第二存取點 20 200307428 玖、發明說明 根據本發明之第八特徵,其提供一種認證裝置,包括 有: 一通訊器,與一認證行動裝置單元通訊; 一驗證器,與上述認證行動裝置單元共用來驗證該通 5 訊是在一預備的認證裝置;及 一關聯器,透過一非認證裝置關聯該驗證與該活動請 求,藉此認證該非認證裝置之活動請求。 較佳地,上述認證裝置是一 GSM裝置及上述認證鏈結 是一 GSM鏈結。 10 較佳地,上述認證裝置是一 CDMA裝置及上述認證鏈 結是一CDMA鏈結。 較佳地,上述認證裝置是一PDC裝置及上述認證鏈結 是一 PDC鏈結。 較佳地,上述認證裝置是一 EDGE裝置及上述認證鏈 15 結是一EDGE鏈結。 較佳地,上述認證裝置是一 WCDMA裝置及上述認證 鏈結是一 WCDMA鏈結。 較佳地,上述認證裝置是一GPRS裝置及上述認證鏈 結是一 GPRS鏈結。 20 較佳地,上述認證裝置是一銥網路(Iridium)裝置及上 述認證鍵結是一錶網路鏈結。 較佳地,上述保密鏈結牽涉到位在上述加密行動裝置 之一電信服務使用者身份模組。 較佳地,上述保密鏈結牽涉到位在上述認證裝置之一 21 200307428 玖、發明說明 電信服務使用者身份模組。 較佳地,上述認證裝置是一行動電話。 較佳地,上述通訊包括有一電子資料通訊。 較佳地,上述電子資料通訊包括電子訊息傳送。 較佳地,上述電子訊息傳送包括有SMS訊息傳送。 較佳地,上述電子訊息傳送包括有WAp。The signal handover manager preferably includes a wireless LAN which is used to set a higher priority order than the above-mentioned PLMN-a priority order unit. 10 When a mobile device unit is located within its range, the signal is automatically signaled. Submit to the above wireless LAN. According to a seventh feature of the present invention, there is provided a signal handover method for a mobile device unit. The mobile seismic unit communicates with the above-mentioned parent number in a first and a second wireless network during a communication operation period. Between the individual 15 access points between the roads, the method includes providing a control point that is commonly used in both locations of the network; the control point determines the identity of the mobile device unit, whose connection has been Was interrupted and obtained information about its relative telecommunication work period; at the above control point, it was decided to form a new connection with the mobile device unit; 20 copies; at the above control point, the identity was matched to match with the mobile device unit. A telecom operation period in which the mobile device unit has suspended connection on a first access point and has been reconnected to a second access point 20 200307428 发明 Description of the invention According to an eighth feature of the present invention, it provides An authentication device includes: a communicator that communicates with an authenticated mobile device unit; and a verifier that is used with the authenticated mobile device unit to verify the communication. The 5 message is a preliminary authentication device; and a correlator that associates the verification with the activity request through a non-authentication device, thereby authenticating the activity request of the non-authentication device. Preferably, the authentication device is a GSM device and the authentication link is a GSM link. 10 Preferably, the authentication device is a CDMA device and the authentication link is a CDMA link. Preferably, the authentication device is a PDC device and the authentication link is a PDC link. Preferably, the authentication device is an EDGE device and the authentication link 15 is an EDGE link. Preferably, the authentication device is a WCDMA device and the authentication link is a WCDMA link. Preferably, the authentication device is a GPRS device and the authentication link is a GPRS link. 20 Preferably, the authentication device is an Iridium device and the authentication key is a watch network link. Preferably, the aforementioned security link involves a telecommunications service user identity module located in one of the encrypted mobile devices. Preferably, the above-mentioned security link involves one of the above-mentioned authentication devices. 21 200307428 发明 Description of the invention A telecommunications service user identity module. Preferably, the authentication device is a mobile phone. Preferably, the communication includes an electronic data communication. Preferably, the electronic data communication includes electronic message transmission. Preferably, the above electronic message transmission includes SMS message transmission. Preferably, the electronic message transmission includes WAp.

較佳地,上述電子訊息傳送包括有電子郵件。 較佳地,上述電子訊息傳送包括有£1^8。 較佳地,上述電子訊息傳送包括有]^1^18。 較佳地,上述通訊器包括有藉由傳送來自上述認證裝 置之一啟動訊號來啟動上述通訊之功能,及具有接收對來 自上述認證裝置之上述啟使訊息之一回覆之功能,此外授 權上述活動請求。 較佳地,上述通訊器具有接收對來自上述認證裝置及 15上述非認證裝置之其一的啟始通訊之功能,及具有對上述 啟始訊息傳送一回覆之功能,此外授權上述活動請求。 車父佳地,上述通訊器包括有接收來自一外部裝置之一 啟始通訊之功能,及建立在上述認證裝置與上述非認證裝 置之間的一鏈結,此為授權上述活動請求。 20 較佳地,上述通訊器牽涉到接收來自上述認證裝置之 一訊息的功能及藉由傳送一響應至上述保密認證裝來完成 上述通訊之功能,藉此授權上述活動請求。 較佳地,上述通訊器包括有插入一辨識碼於上述回覆 給一請求端透過上述非認證裝置輸入之功能,及其中上述 22 200307428 玖、發明說明 驗證器更包括有決定上述識別碼是否已經透過上述非認證 裝被置接收。 較佳地,上述通訊器可以操作使用一自動聲音以與上 述認證裝置通訊。 5 較佳地,上述認證裝置是與一付費帳號一起使用,上 述裝置更包括有向上述請求活動對上述付費帳號收費的功 能。 ,¥ 較佳地,上述被請求活動是一網際網路瀏覽活動或銷 f 售點活動。 10 較佳地,上述被請求活動是存取至一網路。 較佳地,該裝置可以透過藍芽存取點來操作連接至上 述非認證裝置。 較佳地,該裝置可以透過至少一個WLAN存取點來操 作連接至上述非認證裝置。 15 較佳地,該裝置可透過一TCP/IP連接至上述非認證裝 置。 · 較佳地,上述通訊器可操作由上述非認證裝置獲得用 來與上述認證裝置通訊之一電話號碼。 較佳地,上述通訊器可操作獲的來自上述非認證裝置 ,· 20之身份資料用以形成上述關聯。 _ · 較佳地,上述非認證裝置是下列一群組中之一,包括 有:-信用卡,-智慧卡,一紅外線裝置,一藍芽裝置, 一pda’ -攜帶型電腦’ _固^電腦,及—電腦網路。 較佳地’該裝置包括有-計數器,如果上述通訊沒有 23 200307428 玖、發明說明 在一預定次數限制之内完成,用以計算上述連接認證失敗 較佳地,該裝置包括有用以登錄該非認證裝置之一登 錄功能。 5 較佳地,上述關聯器被連接至一認證者用以指示上述 活動請求被允許。Preferably, the electronic message transmission includes an email. Preferably, the electronic message transmission includes £ 1 ^ 8. Preferably, the above electronic message transmission includes] ^ 1 ^ 18. Preferably, the communicator includes a function of initiating the communication by transmitting an activation signal from one of the authentication devices, and a function of receiving a reply to one of the activation messages from the authentication device, and authorizing the above activities. request. Preferably, the communicator has a function of receiving initiation communication from one of the authentication device and one of the non-authentication device, and has a function of transmitting a reply to the initiation message, and authorizes the activity request. Chau Jia, the communicator includes a function of receiving communication from an external device, and a link established between the authentication device and the non-authentication device. This is to authorize the activity request. 20 Preferably, the communicator involves a function of receiving a message from the authentication device and completing the function of the communication by transmitting a response to the confidential authentication device, thereby authorizing the activity request. Preferably, the communicator includes a function of inserting an identification code in the response to a requester and inputting through the non-authentication device, and the above-mentioned 22 200307428 玖, the invention description verifier further includes determining whether the identification code has passed The non-authentication device is received. Preferably, the communicator is operable to use an automatic voice to communicate with the authentication device. 5 Preferably, the authentication device is used with a paid account, and the device further includes a function of charging the paid account to the requesting activity. , ¥ Preferably, the requested activity is an Internet browsing activity or a point-of-sale activity. 10 Preferably, the requested activity is access to a network. Preferably, the device can be operatively connected to the non-authenticated device via a Bluetooth access point. Preferably, the device can operate to connect to the non-authentication device through at least one WLAN access point. 15 Preferably, the device can be connected to the non-authenticated device via a TCP / IP. Preferably, the communicator is operable with a telephone number obtained by the non-authentication device to communicate with the authentication device. Preferably, the above-mentioned communicator is operable to obtain the identity information from the non-authentication device, and 20 is used to form the above-mentioned association. _ · Preferably, the non-authentication device is one of the following groups, including:-credit card,-smart card, an infrared device, a Bluetooth device, a pda '-a portable computer' _ 固 ^ Computer , And — computer network. Preferably, the device includes a counter. If the above communication is not 23 200307428, the invention description is completed within a predetermined number of times to calculate the connection authentication failure. Preferably, the device includes a device for logging in to the non-authentication device. One of the login functions. 5 Preferably, the correlator is connected to an authenticator to indicate that the activity request is allowed.

較佳地,上述認證通訊器可操作通訊上述認證至一與 上述非認證裝置相關之外部閘道器。 較佳地,上述認證通訊器可操作通訊上述認證至與上 10 述請求活動相關的一伺服器。 較佳地,上述認證通訊器藉由使用在一路由器上一路 徑表上的改變來可操作通訊上述認證。 根據本發明之第九特徵,其提供一種與ATM機器相容 的個人交易卡,包括有ATM讀取格式的一 ATM轉帳號碼及 15 —行動電話號碼,上述行動電話號碼是與上述個人交易卡Preferably, the authentication communicator is operable to communicate the authentication to an external gateway related to the non-authentication device. Preferably, the authentication communicator is operable to communicate the authentication to a server related to the request activity described above. Preferably, the authentication communicator is operable to communicate the authentication by using a change in a path table on a router. According to a ninth feature of the present invention, a personal transaction card compatible with an ATM machine is provided, which includes an ATM transfer number and 15-mobile phone number in ATM reading format. The mobile phone number is the same as the personal transaction card.

一起使用。 較佳地,上述號碼被儲存在一磁條中。 較佳地,上述號碼被儲存在一内部積體電路中。 根據本發明之第十特徵,其提供一種認證方法,包括 20 有·· 透過一保密鏈結與一認證裝置通訊; 驗證該通訊是與一預期的認證裝置;及 透過一非認證裝置來關聯該驗證與一活動請求,藉此 認證該非認證裝置之活動請求。 24 200307428 玖、發明說明 較佳地,上述認證裝置是一 G S Μ裝置及上述認證鏈結 是一 GSM鏈結。 較佳地,上述認證裝置是一CDMA裝置及上述認證鏈 結是一CDMA鏈結。 5 較佳地,上述認證裝置是一 PDC裝置及上述認證鏈結 是一 PDC鏈結。 較佳地,上述認證裝置是一 EDGE裝置及上述認證鏈 結是一EDGE鏈結。 較佳地,上述認證裝置是一 WCDMA裝置及上述認證 10 鏈結是一 WCDMA鏈結。 較佳地,上述認證裝置是一 GPRS裝置及上述認證鏈 結是一GPRS鏈結。 較佳地,上述認證裝置是一銥網路裝置及上述認證鏈 結是一銀網路鏈結。 15 較佳地,上述認證鍵結包括有牵涉到位在上述認證裝 置之内的一電信服務使用者身份模組之一保密鏈結。 較佳地,上述保密鏈結包括有牵涉到位在上述認證裝 置之内的一電信服務使用者身份模組。 較佳地,上述認證裝置是一行動電話。 20 較佳地,上述通訊包括有電子資料通訊。 較佳地,上述電子資料通訊包括有電子訊息傳送或 SMS訊息傳送。 較佳地,該方法包括有藉由傳送一啟動訊息至上述認 證裝置來啟動上述通訊及接收對來自上述認證裝置之上述 25 200307428 玖、發明說明 啟動訊息之回覆的功能,此外授權上述活動請求。 較佳地,該方法其中上述通訊牽涉到接收來自上述認 也I置之一汛息及藉由傳送一回覆至上述認證裝置來完成 上述通訊,藉此授權上述活動請求。 較佳地,該方法包括有插入一密碼至上述回覆給一請 求端透過上述非認證裝置來輸入,及決定上述密碼是否已 經透過上述非認證裝置被接收。 較佳地,該方法包括有使用一自動聲音與上述認證通 訊。 較佳地,上述認證裝置是與一付費帳號一起使用,上 述方法更包括有對上述請求活動向該付費帳號收費。 車乂佳地,上述清求活動是一群組或動之一包括有一網 際網路瀏覽活動,銷售點活動及存取一網路。 較佳地’該方法包括有使用一紅外線或藍芽之其一。 較佳地,上述非認證中置是一TCP/IP鏈結。 較佳地,該方法包括有由上述非認證裝置獲得與上述 認證裝置通訊之一電話號碼。 較佳地’上述非認證裝置是下列一群組中的一個,包 括有··一信用卡,一智慧卡,一紅外線裝置,一藍芽裝置 ,一 PDA,一攜帶型電腦,一固定電腦,及一電腦網路。 較佳地,該方法包括有一計數器,如果上述通訊沒有 在一預定次數限制之内完成,用以計算上述連接認證失敗 〇 較佳地’該方法包括有用以登錄該非認證裝置之一登 26 200307428 玖、發明說明 錄功能。 車乂佳地,δ亥方法,包括有輸出上述活動請求已經被允 許的指示。 較佳地,上述指示是輸出至與相上認證裝置相關之一 5 外部閘道器。 較佳地,上述指示是輸出至與上述被請求活動相關之 一伺服器。use together. Preferably, the numbers are stored in a magnetic strip. Preferably, the above number is stored in an internal integrated circuit. According to a tenth feature of the present invention, there is provided an authentication method including: 20 communicating with an authentication device through a confidential link; verifying that the communication is with an expected authentication device; and associating the communication with a non-authentication device Verify and an activity request, thereby authenticating the activity request of the non-authenticated device. 24 200307428 (ii) Description of the invention Preferably, the authentication device is a GSM device and the authentication link is a GSM link. Preferably, the authentication device is a CDMA device and the authentication link is a CDMA link. 5 Preferably, the authentication device is a PDC device and the authentication link is a PDC link. Preferably, the authentication device is an EDGE device and the authentication link is an EDGE link. Preferably, the authentication device is a WCDMA device and the authentication 10 link is a WCDMA link. Preferably, the authentication device is a GPRS device and the authentication link is a GPRS link. Preferably, the authentication device is an iridium network device and the authentication link is a silver network link. 15 Preferably, the authentication key includes a confidential link that involves a telecommunications service user identity module that is located in the authentication device. Preferably, the security link includes a telecommunications service user identity module involved in the authentication device. Preferably, the authentication device is a mobile phone. 20 Preferably, the communication includes electronic data communication. Preferably, the electronic data communication includes electronic message transmission or SMS message transmission. Preferably, the method includes the function of initiating the communication by receiving an activation message to the authentication device and receiving the above-mentioned 25 200307428 from the authentication device. Description of the invention The function of replying to the activation message, and authorizing the activity request. Preferably, in the method, the above-mentioned communication involves receiving a flood message from the above-mentioned authentication and completing the above-mentioned communication by sending a reply to the above-mentioned authentication device, thereby authorizing the above-mentioned activity request. Preferably, the method includes inserting a password into the reply to a requester to input through the non-authentication device, and determining whether the password has been received through the non-authentication device. Preferably, the method includes using an automatic voice to communicate with the authentication. Preferably, the authentication device is used with a pay account, and the method further includes charging the pay account for the requested activity. In Chedi, the above pursuing activities are one of a group or activity including an Internet browsing activity, a point of sale activity, and access to an Internet. Preferably ' The method includes the use of either infrared or Bluetooth. Preferably, the non-authentication center is a TCP / IP link. Preferably, the method includes obtaining a telephone number for the non-authentication device to communicate with the authentication device. Preferably, the above-mentioned non-authentication device is one of the following group including: a credit card, a smart card, an infrared device, a Bluetooth device, a PDA, a portable computer, a fixed computer, and A computer network. Preferably, the method includes a counter for calculating the connection authentication failure if the communication is not completed within a predetermined number of times. Preferably, the method includes logging in to one of the non-authentication devices. 26 200307428 玖2. Invention description record function. The car method, the delta method, includes an indication that the above-mentioned activity request has been permitted. Preferably, the above instruction is output to one of the external gateways associated with the above authentication device. Preferably, the instruction is output to a server related to the requested activity.

較佳地,丨上述指示是藉由加入在一路由器上一路徑 表的改變來被輸出。 10圖式簡單說明 為了對本發明有較佳的瞭解及顯示本發明如何成為有 用的,參考現將藉由純舉例說明與相伴隨的圖式來被完成Preferably, the above instructions are output by adding a change to a routing table on a router. 10 Schematic illustrations In order to better understand the present invention and show how the present invention is useful, reference will now be made by purely illustrating and accompanying drawings

現以特定標號詳細地說明該等圖式,其強調被顯示的 15特點是藉由範例及只說明本發明之較佳實施例之討論之目 的及呈現為了提供其相信是為最有用及容易瞭解本發明 原理及觀念特爭。就這一點而言,沒有意圖顯示本發明之 結構細節至需要對本發明之基本的瞭解,該描述及參考該 等圖式使熟習該項技術者知道本發明的許多種 20整合自在現時生活中。在相扮隨的圖式中: 第1圖是一 SIM之簡化表示, 第2圖是顯示-SIM之功能操作之—簡化方塊圖, 第3圖是根據本發明之—第—實施例顯示_客户端 置透過-虛擬_閘道器連接至—轨_網路及由那 27 200307428 玖、發明說明 連接至一 PLMN網路之一簡化概要圖, 第4a圖是更詳細地顯示第3圖之實施例之一簡化方塊 圖,包括一模擬SIM閘道器之次系統, 第4b圖是顯示另一解決方法透過一非PLMN網路提供 5 PLMN服務之一簡化比較圖,該服務是為習知技藝, 第4c圖是一示範圖式,顯示一掌上型裝置及一可插入 其中的一卡片,使其適於與藍芽及類似的非PLMM網路使 # 用, 第5圖是為根據本發明之一實施例之一簡化流程圖, 10 顯示透過一非PLMN網路連接一非SIM裝置經一虛擬SIM閘 道器連接至一 PLMN網路, 第6圖是顯示一典型PLMN網路基礎架構之概要圖, 第7圖是根據本發明之一實施例之一概要圖,其顯示 使用一虛擬基地台控制器作為至該PLMN網路之一介面, 15 第8圖是根據本發明之一較佳實施例之一概要圖,其 _ 顯示在一無線LAN及一PLMN網路之間的協定層及分封資 料認證, 第9圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一 LAN與一 PLMN網路之間的協定層及交換電路資 20 料認證, 第10圖是根據本發明之一較佳實施例之一概要圖,其 顯示與在GPRS及一無線LAN之間的連接相關的協定層, 第11圖是根據本發明之一較佳實施例之一概要圖,其 顯示與透過PLMN及無線網路之交換電路支援服務的提供 28 200307428 玖、發明說明 有關之協定層, 第12圖是根據本發明之一較佳實施例之一概要圖,其 顯示一虛擬SGSN+被使用作為在一無線LAN及一 PLMN之 間的一介面, 5 第13圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN及一 PLMN網路之間的協定層及分封資 料認證, 第14圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一 PLMN之間的分封支援服務的提供 10 之協定層, 第15圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一 PLMN之間的交換電路支援服務的 提供之協定層, 第16圖是根據本發明之一較佳實施例之一概要圖,其 15 顯示在一無線LAN與一PLMN之間的提供分封資料流量管 理之協動層, 第17圖是根據本發明之一較佳實施例之一概要圖,其 顯示覆概共同區域及結合連接一熱點中心點之二無線網路 ,其可以被用來協調在網路之間的交接, 20 第18圖是根據本發明之一較佳實施例之一概要圖,其 顯示一無線網路存在於一蜂巢細胞或PLMN網路之覆蓋區 域之内, 第19圖是根據本發明之一較佳實施例之一概要流程圖 ,其顯示在二網路之間作為信號交遞之整個原理, 29 200307428 玖、發明說明 5 第20圖是根據本發明之一較佳實施例之一概要流程圖 ,其况明由行動裝置單元的觀點之信號交遞, 第21圖是根據本發明之一較佳實施例之一概要流程圖 ,其顯示信號交遞程序的另一實施例, 第22圖是-簡化概要圖,說明具有一共同中心點之二 4 ^ 非重疊WLANs, 第23圖是-簡化概要圖,說明二重疊肌紙中的每一 個是-不同熱點的-部份及在該等熱點範圍之外有一共同 中心點, 10 第24圖是第23圖情節的一變化例,其中該熱點沒有重 疊, 15 • 層 - 第25圖說明二重疊的PLMN網路, 第26圖說明二非重疊PLMN網路, 第27圖是根據本發明之又一較佳實施例之一簡化方塊 ,其顯示一認證機構, 第28圖是顯示使用在第27圖之保密鏈結之一裝置之一 簡化插圖, 第29圖是顯示使用在第27圖之非保密鏈結之一裝置之 一簡化插圖, -20 第30圖是根據本發明之一認證機構之另一實施例之一 簡化方塊圖,特別地允許控制存取至一有線或無線1^八1^, 及 第31圖是第27圖之該認證機夠之操作之一簡化流程圖 ,其中該設定可由任一裝置開始,保密或非保密,包括有 30 200307428 玖、發明說明 由一不同的裝置來設定。The drawings are now described in detail with specific reference numerals, highlighting the 15 features that are shown by way of example and only illustrating the purpose and discussion of the preferred embodiments of the present invention in order to provide what they believe is the most useful and easy to understand The principles and concepts of the present invention are particularly contested. In this regard, there is no intention to show the structural details of the present invention to the extent that a basic understanding of the present invention is required, and the description and reference to the drawings make those skilled in the art aware of the many kinds of the present invention that are integrated into present life. In the accompanying drawings: Fig. 1 is a simplified representation of SIM, Fig. 2 is a simplified block diagram of display-SIM operation, and Fig. 3 is a display according to the first embodiment of the present invention. The client device is connected to the -rail_network through the -virtual_gateway and from 27 200307428, a description of the invention is a simplified schematic diagram of connecting to a PLMN network, Figure 4a is a more detailed display of Figure 3 A simplified block diagram of one embodiment, including a secondary system that simulates a SIM gateway. Figure 4b is a simplified comparison diagram showing another solution to provide 5 PLMN services through a non-PLMN network. Figure 4c is an exemplary diagram showing a handheld device and a card that can be inserted into it, making it suitable for use with Bluetooth and similar non-PLMM networks. Figure 5 is based on this A simplified flowchart of one embodiment of the invention. 10 shows a non-SIM device connected through a non-PLMN network to a PLMN network through a virtual SIM gateway. Figure 6 shows a typical PLMN network infrastructure. FIG. 7 is a schematic view of an embodiment of the present invention. A schematic diagram showing the use of a virtual base station controller as an interface to the PLMN network, FIG. 8 is a schematic diagram of a preferred embodiment of the present invention, which shows a wireless LAN and a The protocol layer and packet data authentication between PLMN networks. Figure 9 is a schematic diagram of a preferred embodiment of the present invention, which shows the protocol layer and switching circuit information between a LAN and a PLMN network. FIG. 10 is a schematic diagram of a preferred embodiment of the present invention, which shows a protocol layer related to the connection between GPRS and a wireless LAN. FIG. 11 is a comparison of a protocol according to the present invention. A schematic diagram of one of the preferred embodiments, which shows the protocol layer related to the provision of switching circuit support services through PLMN and wireless networks 28 200307428 发明 Description of the invention, Figure 12 is one of the preferred embodiments of the present invention A schematic diagram showing a virtual SGSN + used as an interface between a wireless LAN and a PLMN, FIG. 13 is a schematic diagram showing a wireless LAN and a wireless LAN according to a preferred embodiment of the present invention. Of a PLMN network The protocol layer and the encapsulation data authentication, FIG. 14 is a schematic diagram according to a preferred embodiment of the present invention, which shows the agreement layer providing the encapsulation support service 10 between a wireless LAN and a PLMN. FIG. Is a schematic diagram of a preferred embodiment of the present invention, which shows a protocol layer for providing switching circuit support services between a wireless LAN and a PLMN. FIG. 16 is a preferred implementation of the present invention. One example is a schematic diagram, where 15 shows a coordination layer between a wireless LAN and a PLMN to provide packetized data traffic management. FIG. 17 is a schematic diagram showing a overlay according to a preferred embodiment of the present invention. A common area and a wireless network connected to a hotspot center point can be used to coordinate handovers between networks. FIG. 18 is a schematic diagram of a preferred embodiment of the present invention. Shows that a wireless network exists within the coverage area of a honeycomb cell or a PLMN network. FIG. 19 is a schematic flowchart of a preferred embodiment of the present invention, which is shown as a signal communication between two networks. Pass the whole Management, 29 200307428 玖, description of the invention 5 FIG. 20 is a schematic flowchart according to a preferred embodiment of the present invention, which illustrates the signal delivery from the viewpoint of a mobile device unit, and FIG. 21 is a diagram according to the present invention. A schematic flowchart of one of the preferred embodiments, showing another embodiment of the signal delivery procedure, FIG. 22 is a simplified schematic diagram illustrating a common center point 2 ^ Non-overlapping WLANs, FIG. 23 is -Simplified schematic diagram, explaining that each of the two overlapping muscle papers is-different hotspots-part and has a common center point outside these hotspots. 10 Figure 24 is a variation of the plot of Figure 23, where This hotspot does not overlap. Layer 15-Figure 25 illustrates two overlapping PLMN networks, Figure 26 illustrates two non-overlapping PLMN networks, and Figure 27 is a simplified block according to yet another preferred embodiment of the present invention. It shows a certification authority. Figure 28 is a simplified illustration showing one of the devices used in the security link of Figure 27. Figure 29 is a simplified illustration showing one of the devices used in the non-security link of Figure 27. , -20 Figure 30 is based on One of the inventions is a simplified block diagram of another embodiment of a certification authority, specifically allowing control access to a wired or wireless 1 ^ 8 1 ^, and FIG. 31 is one of the operations of the authentication machine of FIG. 27 Simplified flowchart, where the setting can be started by any device, confidential or non-secure, including 30 200307428. The invention description is set by a different device.

I[實方方式]I 較佳實施例之詳細說明 本發明實施例提供一非PLMN網路經介面至一 PLMN 5 網路之連接。後述之本發明提供在該非PLMN網路及該 PLMN網路之間的介面,其使該PLMN網路偵測到經由該 非PLMN網路存取的單元,如同它們接存取該PLMN網路 一樣,那些透過該PLMN之無線電存取網路來存取該 PLMN網路之單元也是一樣的方式。因此,該PLMN網路 10 偵測提供服務給該被支援裝置之非PLMN網路簡化作為該 PLMN網路一之部份。 本發明包括有一組元件,該組元件互動作為使它的使 用者由一非PLMN或一 PLMN存取不同的資源的一系統, 而不需要有可以與該PLMN實體介面連接之一裝置(例如, 15 一行動電話)。在此所述的一些元件被安裝在存取該PLMN 網路或該非PLMN網路之裝置上,及有一些元件是在該非 PLMN網路與該PLMN網路之間的閘道器之内。有一些實 施例使用證明該行動電話使用者的代碼,如同由該行動電 話總機所產(例如,在一GSM SIM之内的IMSI及Ki,或在 20 一 CDMA裝置之内的MIN及ESN)—其他的實施例並不使用 此種代碼。該等實施例並不需要對該PLMN基礎結構作任 何修改;它們需要額外新的單元使得在該非PLMN網路與 該PLMN網路之間進行無縫存取。 允許由非PLMN至PLMN存取之一系統必需能執行至 31 200307428 玖、發明說明 少下列兩個動作。I [Real Way] I Detailed description of the preferred embodiment The embodiment of the present invention provides a connection from a non-PLMN network to a PLMN 5 network via an interface. The invention described below provides an interface between the non-PLMN network and the PLMN network, which enables the PLMN network to detect units accessed via the non-PLMN network as if they were accessing the PLMN network, The same is true of those units that access the PLMN network through the radio access network of the PLMN. Therefore, the PLMN network 10 detects non-PLMN networks that provide services to the supported device, and is simplified as part of the PLMN network. The present invention includes a set of elements that interact as a system that allows its users to access different resources from a non-PLMN or a PLMN without the need for a device that can be connected to the PLMN physical interface (for example, 15 a mobile phone). Some of the components described herein are installed on devices that access the PLMN network or the non-PLMN network, and some components are within the gateway between the non-PLMN network and the PLMN network. Some embodiments use codes proving the user of the mobile phone, as produced by the mobile phone switchboard (for example, IMSI and Ki within a GSM SIM, or MIN and ESN within a 20-CDMA device) — Other embodiments do not use such codes. These embodiments do not require any modification to the PLMN infrastructure; they require additional new units for seamless access between the non-PLMN network and the PLMN network. A system that allows access from a non-PLMN to a PLMN must be able to perform up to 31 200307428 玖 Description of the invention The following two actions are missing.

1.認證使用者,亦即,證明該PLMN中,請求存取它 的資源或要對該PLMN帳號請求款項之其他資源之該使用 者是該PLMN之認證使用者。在一些例子中,此認證除了 5 身份的證明之外更包括有允許存取特定服務之權利。該 PLMN必需不能分辨由一非PLMN啟始的存取及經由該 PLMN自己存取網路之間,無論是一無線或是其他實體通 訊架構。此必需被完成,因為該PLMN必需被確認,而該 存取請求實際上是與該特定請求服務的一有效帳號相關。 10 2.在非PLMN及PLMN之間使用者流量的致能傳送。該 PLMN必需不能分辨起始來自一非PLMN或至一非PLMN之 流量與在該PLMN自身存取網路之間至使用者或來自使用 者之流量之間的差別。1. An authenticated user, i.e., proves that the user in the PLMN that requested access to its resources or other resources to request payment for the PLMN account is the authenticated user of the PLMN. In some examples, this authentication includes the right to allow access to specific services in addition to the proof of identity. The PLMN must not be able to distinguish between accesses initiated by a non-PLMN and its own access network via the PLMN, whether it is a wireless or other physical communication architecture. This must be done because the PLMN must be confirmed and the access request is actually associated with a valid account for the particular requested service. 10 2. Enable the transmission of user traffic between non-PLMN and PLMN. The PLMN must not be able to distinguish between the traffic originating from a non-PLMN or to a non-PLMN and the traffic between the PLMN's own access network to the user or from the user.

所有的實施例是關於存取該非PLMN之該存取裝置的 15 認證及通訊保密,其中該服務是可以在存取時對與該存取 裝置相關之一 PLMN帳號請求款項的。 二實施例描述負責使該PLMN偵測到如同其經由標準 的蜂巢細胞節點來被完成的該存取之該實體單元;該等被 特性化後的實體單元因此被設計為模擬行蜂巢細胞節點。 20 此等節點被連接至一非PLMN及一 PLMN二者;它們可以 與它們所模擬的該等節點的方式來存在於該PLMN基礎架 構中。該VBSN(虛擬基地台控制器;Virtual Base Station Controller)似乎讓該PLMN作為一 BSS);在此情況下,該 被模擬的節點是一BSC。該VSGN+似乎讓該PLMN作為一 32 200307428 玖、發明說明 行動電話細胞切換節點,亦即,一分封開關資料之SGSN 或一電路切換資料之MSC。該VBSC及該VSGN+可以執行 上述兩種功能。它們參與該非PLMN存取裝置至該PLMN 網路的認證;及它們可以將資訊流由該非PLMN網路傳送 5 至該PLMN網路。 在其中的二個實施例中一具有SIM的存取裝置,及混 合網路認證,該認證是依據藉由該PLMN運算子(與該 PLMN運算子提供給它們的使用者來存取該PLMN自身存 取網路之該PLMN運算子相同的識別參數)來提供給該使用 10 者之一代用符號(token),例如,對於一GSM PLMN系統, 那些存在於一 SIM之内者,或典型地直接儲存在一蜂巢細 胞電話中者)。在另二個實施例中一SSG(模擬SIM閘道器) 及虛擬SIM,該代用符號被一虛擬代用號所取代,該虛擬 代用符號是模擬該代用符號之一套裝軟體。在該第一實施 15 例中,該虛擬代用符號被安裝在該閘道器中(VBSC或 VSGN+),在前一實施例中,該套裝軟體是被安裝在該非 PLMN存取裝置中。 該系統支援許多種不同的認證方法。該模擬行蜂巢細 胞節點(VBSC或VSGN+)在每一種認證方法中拌演著一基 20 本的角色。我們將該等認證方法分類(及個別地對該等實 施例)成以下的類別。All embodiments are related to 15 authentication and confidentiality of access to the access device other than the PLMN, where the service can request a payment to a PLMN account associated with the access device during access. The second embodiment describes the entity unit responsible for causing the PLMN to detect the access as if it were done via a standard honeycomb cell node; the characterized entity units are therefore designed to simulate a honeycomb cell node. 20 These nodes are connected to both a non-PLMN and a PLMN; they can exist in the PLMN infrastructure in the same way as the nodes they simulate. The VBSN (Virtual Base Station Controller) seems to have the PLMN as a BSS); in this case, the simulated node is a BSC. The VSGN + seems to make the PLMN a 32 200307428. Description of the invention Cell phone switching node, that is, a SGSN with closed switch data or an MSC with circuit switch data. The VBSC and the VSGN + can perform both functions. They participate in the authentication of the non-PLMN access device to the PLMN network; and they can transmit information flows from the non-PLMN network to the PLMN network. In two of these embodiments, an access device with a SIM, and hybrid network authentication, the authentication is based on accessing the PLMN itself by the user provided by the PLMN operator (and the PLMN operator provided to them). Access the network with the same identification parameters of the PLMN operator) to provide tokens to one of the 10 users, for example, for a GSM PLMN system, those that exist within a SIM, or typically directly Stored in a honeycomb cell phone). In another two embodiments, an SSG (simulated SIM gateway) and a virtual SIM, the substitute symbol is replaced by a virtual substitute number, and the virtual substitute symbol is a software package that simulates one of the substitute symbols. In the first embodiment, the virtual substitute symbol is installed in the gateway (VBSC or VSGN +). In the previous embodiment, the software package is installed in the non-PLMN access device. The system supports many different authentication methods. The simulated hive cell node (VBSC or VSGN +) plays a basic role in each authentication method. We classify these authentication methods (and the examples individually) into the following categories.

1·終端使用者存取裝置之PLMN類認證一在此等認證 方法中,該終端使用者存取裝置包括有一 SIM :後文包括 有該SIM是為一真實的SIM之實施例及該SIM是為虛擬SIM 33 200307428 玖、發明說明 之實施例(亦即,GSM系統之SW SIM及非GSM網路之儲存 蜂巢細胞電話識別碼)。一實體的SIM可以被安裝在該裝置 中,其可以被安裝在該存取卡,安裝在一專用卡,或安裝 在與其他周邊設備(例如,嵌入磁盤)。在此等方法中,該 5 行動電話細胞節點(該VBSC或者該VSGSN+)由該終端使用 者獲得該蜂巢細胞電話認證資訊,及將其與已經被儲存在 它的資料庫中該認證資料予以比對,或與由該PLMN基楚 架構中取的的認證資料一起比對。混合網路認證是單向相 關於或啟始具有被驗證及被認證的認證資料之該模擬蜂巢 10 細胞節點。 2. 存取裝置之非PLMN認正,藉由模擬器閘道器(存在 於模擬該PLMN基礎架構節點之内,例如,一蜂巢細胞節 點)一一模擬SIM閘道器(SSG)接收該PLMN認證資料及使該 蜂巢細胞網路認為該裝置具有一實體代用符號/蜂巢細胞 15 密度及響應如同任何蜂巢細胞電話一樣。該閘道器事實上 認證使用不同認證協定之裝置,典型的為網際網路型式。 該非PLMN閘道器採用具有特別優先權之一節點之識別碼 ,而該行動電話網路提供此一節點。 3. 牽涉到該使用者PLMN裝置之認證,例如蜂巢細胞 20 電話一藉由在二存取裝置之間相關來連結一非認證非 PLMN存取裝置至一可認證PLMN存取裝置,例如,蜂巢 細胞電話。混合網路認證基於該使用者是該PLMN之一授 權使用者而允許該使用者存取該非PLMN。其假設其有一 VBSC或VSGSN+被用來提供由非PLMN存取至PLMN。對 34 200307428 玖、發明說明 於此種認證,其具有三種例子; i.在每一次該使用者請求存取該非PLMN時,PLMN提 供一個一次存取碼。此種方式需要在該等網路之間以及該 使用者之手動插入上可以同時進行通訊。 5 ii.自動一次存取節點。其種方式是在該非PLMN裝置 具有一用戶端單元來自動處理該程序,其或許可以被延伸 甚至使用在由該PLMN裝置(蜂巢細胞電話)自動地傳送該 存取碼至在非PLMN存取裝置中的該用戶端單元。 iii.一虛擬SIM之啟動。在此系統中,在該PLMN裝置 10 及該非PLMN裝置之間的一次關係被使用來啟動具有一虛 擬SIM之該非PLMN裝置或具有另一認證系統(可能是為該 SSG所使用)之認證資料之該非PLMN裝置。而後該使用者 可以經由該非PLMN來被該PLMN所認證及存取該PLMN而 不用包含在該PLMN之範圍内。 15 本發明之一特徵是提供可以被使用來介面連接於一非1. PLMN-type authentication of the end-user access device-In these authentication methods, the end-user access device includes a SIM: the following includes an embodiment in which the SIM is a true SIM and the SIM is It is a virtual SIM 33 200307428 (i.e., an embodiment of the invention description (ie, the SW SIM of the GSM system and the stored cell phone identification code of the non-GSM network). A physical SIM may be installed in the device, it may be installed in the access card, a dedicated card, or with other peripheral devices (for example, embedded disks). In these methods, the 5 mobile phone cell node (the VBSC or the VSGSN +) obtains the honeycomb cell phone authentication information from the end user and compares it with the authentication data that has been stored in its database. Yes, or compare it with the certification data taken from the PLMN infrastructure. Hybrid network authentication is a one-way phase about or initiating the simulated honeycomb 10-cell node with authenticated and authenticated authentication data. 2. The non-PLMN identification of the access device is received by the simulator gateway (existing within the node that simulates the PLMN infrastructure, such as a honeycomb cell node)-the SIM gateway (SSG). The authentication information and the honeycomb cell network believe that the device has a physical surrogate symbol / hive cell 15 density and response just like any honeycomb cell phone. The gateway actually authenticates devices using different authentication protocols, typically the Internet type. The non-PLMN gateway uses the identification code of a node with special priority, and the mobile phone network provides this node. 3. Involves the authentication of the user's PLMN device, such as Hive Cell 20, a phone linking a non-authenticated non-PLMN access device to an authenticated PLMN access device by correlating between two access devices, for example, hive Cell phone. Hybrid network authentication allows the user to access the non-PLMN based on the user being an authorized user of the PLMN. It assumes that it has a VBSC or VSGSN + used to provide access from a non-PLMN to a PLMN. Regarding 34 200307428 (ii), the invention has three examples for this type of authentication; i. The PLMN provides an access code each time the user requests access to the non-PLMN. This method requires simultaneous communication between the networks and the user's manual insertion. 5 ii. Automatically access the node once. One way is to have a client unit in the non-PLMN device to automatically process the program, which may be extended or even used by the PLMN device (honeycomb cell phone) to automatically transfer the access code to the non-PLMN access device The client unit in. iii. Activation of a virtual SIM. In this system, a relationship between the PLMN device 10 and the non-PLMN device is used to activate authentication information of the non-PLMN device with a virtual SIM or another authentication system (possibly used by the SSG) The non-PLMN device. The user can then be authenticated by the PLMN and access the PLMN via the non-PLMN without being included in the scope of the PLMN. 15 A feature of the present invention is to provide an interface that can be used to connect to a non-

PLMN網路及一 PLMN網路之間的一虛擬SIM閘道器。該閘 道器執行適宜於通訊連接該存取裝置之認證,像是在整 PLMN網路上之典型的網際網路協定環境認證;在其滿足 其已經被授權一連接裝置之後,而後其代表該存取裝置授 20 權其自身給該PLMN網路,如同在一裝置上具有一 SIM(包 括在那些網路中不使用SIM的相同蜂巢細胞識別碼)。另一 方面,此二閘極可以被整合在一起,其中一認證的中間步 驟是依據其他認證的中間步走驟而定。例如,該閘道器可 以將請求,詢問及響應由一鏈結傳送至另一鏈結。如果資 35 200307428 玖、發明說明 訊流被傳送至該PLMN,而後該閘道器加密使的其就像是 原來就具有SIM(或該相同的蜂巢細胞辯識碼)。本發明的 再一變化實施是使用一 SIM於該非SIM裝置上,最好是整 合該SIM於該裝置的連接卡中,因此可以提供不同型式的 5 WLAN及整合SIMs使用的其他連接卡。A virtual SIM gateway between a PLMN network and a PLMN network. The gateway performs authentication suitable for communicating with the access device, such as a typical Internet Protocol environment authentication on the entire PLMN network; after it has satisfied that it has been authorized to connect a device, it then represents the storage device. The access device grants 20 rights to the PLMN network itself, as if it had a SIM on a device (including the same honeycomb cell identification code that does not use SIM in those networks). On the other hand, the two gates can be integrated together, and the intermediate steps of one certification are based on the intermediate steps of other certifications. For example, the gateway can pass requests, queries, and responses from one link to another. If the information is transmitted to the PLMN, then the gateway is encrypted so that it appears to have the SIM (or the same hive cell identification code). Another implementation of the present invention is to use a SIM on the non-SIM device, and it is best to integrate the SIM into the connection card of the device. Therefore, different types of 5 WLAN and other connection cards for integrated SIMs can be provided.

當其最好不要整合使用一 SIM於該存取裝置中時,而 後使用不同的認證選擇的另一架構存在:配置具有一虛擬 SIM之該連接裝置。該虛擬SIM可以被儲存在具有將其演 算法植入在該存取裝置中的一處理器之内的其他存取裝置 10 之中,亦即,沒有特別硬體的軟體植入。詳細地,將在後 面予以描述之混合網路認證可以被使用來授權被裝在該該 遠端連接裝置之該虛擬SIM之啟動。配置有一虛擬之一裝 置透過VBSC或VSGSN來認證,此將在後面予以詳述,其 最後存在於該非PLMN網路及該PLMN網路之間,且其可 15 以產生用於虛擬SIMs或在其他網路中的其等效者(MIN, ESN)之假三連碼(rand,sres,ke),或其他認證資料,例如, 可以被該模擬SIM閘道器所認證的使用者名稱及密碼,以 及提供給該網路在如果一使用者將可以經由該PLMN存取 網路及該模擬節點存取時,該模擬節點將可與該PLMN交 20 換之相同或等同的資料。然而,如果此方法被使用時,而 後該PLMN不直接認證該使使用者(亦即,不驗證在他所擁 有的裝置中具有該SIM或等同的行動電話細胞識別碼),而 是依據該閘道器。該閘道器而後可以進行提供充電資訊給 該 PLMN 〇 36 200307428 玖、發明說明 在此要指出,在當一虛擬SIM被使用在該存取裝置中 時,而後該模擬PLMN閘道器最好是具有認證一虛擬sim 之功能。 本發明之另一特徵提供一虛擬基地台控制器,其提供 5介面功能,使得該非PLMN網路出現至該PLMN網路,如 同一蜂巢細胞基地台控制器。該觀念可以甚至延伸至模擬 一蜂巢細胞基地台,因此該1^]^1^網路出現如同一或多個 蜂巢細胞基地台。基本上,所能提供者為一代理伺服器型 配置。至該虛擬基地台控制器之一延伸功能允許在該非 10 PLMN網路中的對等連接,在該非凡以^^網路之内的對等 連接,及導出於該網路來被該PLMN網路所管理的連接。 本發明之另一特徵提供該蜂巢細胞網路去同意經由一 非蜂巢細胞裝置之相關透過不同的路徑連接至該蜂巢細胞 電活之存取。 15 允許與該蜂巢細胞裝置相關之裝置經由區域網路連接 至该蜂巢細胞網路之關念被延伸使用至配置有蜂巢細胞模 組或非SIM之類似者之蜂巢細胞之網路。 本發明之另一特徵是提供行動裝置使用者一種維持無 縫連接之方法,其與其可以存取的不同通訊網路無關,及 20其是否由一連接型式移至另一型式無關。 在詳細介紹本發明之至少一實施例之前,其可以被暸 解,本發明並不受限於後面的描述及圖式中的說明之應用 本务明可以被應用在其他的實施例或其可以不同的方法 被實施或執行。再者,其可以瞭解,在此使用的用語及用 37 200307428 玖、發明說明 詞是用為說明的目的而不是被視為限制。 模擬SIM閘道器 /現Μ參考第1B|所示’其是為—簡要圖式顯示應用在 一行動電話裝置之典型襲。該_ 1()是_插人在該蜂巢 細胞電話裝置14中的一 SIM卡載體暨讀取器12的一小型模 組。該SIM提供該蜂巢細胞電話裝置的識別碼,及允許其 確貫連接至該蜂巢細胞電話網路。 ίο 15 20 現請參考第2圖,第謂是為—簡化方塊圖,其顯示在 該SIM H)之内的主要次系統。該sm 1〇包括有一認證次系 統16’用以執行保密身份來確保該網路是該電話號碼的合 法使用者,及一加密次系統,其加密來自該網路之聲音及 資料通訊,及其解密來自該網路的輸入聲音或資料通訊, 而其使用像是A5之演算法。當然,要注意,其他的加密系 統或者完全不同的加密系統也可以被使用。加密及解密是 使用被供應為該網路所認證之一訊息所執行。要被使用的 認證及加密的正確型式是依據網路而定。在認證中,一隨 機數RAND被該網路送至該SIM,其中其被使用作為至一 單向功能A3之輸入。該SIM送回該功能輪出,其中該基地 台比較由該系統所完成的前一動作之SRES來施加RAND至 A3。如果該響應符合SRES,而後該連接装置被認證。 現請參考第3圖所示,其是為一概要圖示顯示一遠端 裝置透過一區域網路連接至一蜂巢細胞或pLMN網路。裝 置20然而具有處理能力來允許其辨識自己,其儘管是以不 匹配於或PLMN網路之要求的方法來執行。該裝置2〇不需 38 200307428 玖、發明說明 要是一行動電話或是具有一 SIM。此一裝置在此被稱為一 非PLMN裝置。裝置20連接至非PLMN網路22,其可以典 型是為具有無線存取點之一LAN網路。該LAN典型地使用 TCP-IP作為一通訊協定。該LAN透過一模擬SIM閘道器24 5 來被連接至該PLMN或蜂巢細胞網路26。該模擬SIM閘道 器24提供在該TCP-IP認證及加密協定及該PLMN協定及之 間的橋樑,及因此允許裝置20被該PLMN網路所保密地確 認,即使其不具有SIM也一樣。 如第3圖中所示,在該裝置20及該閘道器之間的連接 10 是使用任何標準TCP/IP安全協定來保護,例如,安全插座 連結(secure socket link:SSL),TLS,Ispec,其是為典型使 用在IP網路之任何安全加密及認證技術。其在後將作進一 步的詳細描述,該安全技術被使用在該裝置20來不混淆的 來辨識自己至該閘道器。另一方面,像是IPSec之其他安 15 全協定也可以被使用在此目的;那就是說,該用語SSL在 當使用此解釋時是整合指為任何可以被使用來保護在該裝 置及該閘道器之間傳輸的資料之任何安全協定,包括有那 些操作在低層級及不使用一插座者。該閘道器在已經決定 該連接裝置的身份之後與該PLMN網路執行一 SIM匹配辨 20 識程序,其中該閘道器指示該PLMN已經被授權該連接裝 置。該授權程序將在第5圖中作更詳細細的說明。 現請參考第4 A圖所示,其是一簡化圖詳細顯示第3圖 之實施例,及特別地顯示該閘道器24之内部次系統。與前 面圖式相同的元件被給予相同的標號及除非對於瞭解本實 39 200307428 玖、發明說明 施例有必要下不會再一次參考。該模擬SIM閘道器24包括 有一資料庫次系統28,一存取次系統30,一交互影響次系 統32及一PLMN次系統34。該不同的次系統可以安裝在許 多的伺服器上或該整個閘道器可以被安裝在一單一伺服器 5 中,其依據所需的操作規模而定。該閘道器最好設置在安 全的位置,使得保護對該系統的實體破壞的可能情事。然 而,如將解釋如後,該閘道器不儲存任何將妥協SIM安全 要求的資訊。 該存取次系統28大體上包括有標準LAN安全設備,典 10 型地是建立一 SSL插座於該連接裝置於20。該存取次系統 辨識該裝置及通知該PLMN次系統34。該PLMN次系統通 訊至該PLMN網路26,其中一連接是需要的。該閘道器被 架構看起來像是一標準的行動電話細胞基地台,或是對於 該PLMN網路之一標準的SGSN,一標準的基地台控制器或 15 一標準的MSC,其傳送標準SIM身份資料至該PLMN次系 統。在當該裝置沒有一 SIM時,該次系統不會傳遞任何身 份資料至該裝置。除此之外,其簡要地核對該SSL或其他 TCP/IP基礎的認證協定是成功的及送出一標準的SIM確認 至該PLMN網路。 20 如果由該終端使用者存取裝置傳送至該PLMN之資訊 流是需要的,而後在需要提供與該PLMN網路匹配時,該 PLMN次系統34也可以執行外送資料及聲音的加密及送入 聲音及資料的解密。 該交互影響次系統提供在該IP基礎存取次系統與被使 40 200307428 玖、發明說明 用的該PLMN系統的之行動電話細胞協定之間的橋樑。 該資料庫次系統包括有該LAN之使用者的資料,因此 個別使用者可以被授權及給予存取該適當的服務。 現請參考第4B圖所示,其是為一簡化的比較圖,其顯 5 示允許非PLMN裝置存取一 PLMN網路之另一實施例。如 上述,該非PLMN裝置是被該PLMN網路要求作下列事項; 1)使用者認證一該PLMN傳送一隨機數(RAND)至該存 取單元。為了被認證,該存取單元必需要響應該正確數字 (SRES)。該存取裝置藉由輸入該RAND至該SIM來決定 10 SRES,其中該秘密A3演算法處理此一動作及該SRES是為 該輸出。該SRES被送回至該PLMN,其中其被比作為該期 望值。在使用另一蜂巢細胞辨識系統的裝置中,該存取單 元提供MIN及ESN於一第一次存取中,TMSI及ESN緊接在 後,使其可以為該PLMN作類似的認證。 15 2)資料或聲音加密一由該存取裝置被送至該PLMN之 數位持有資訊(聲音或資料)被加密來避免竊聽。在GSM網 路的範例中,該SIM加密使用該A5演算法之資料流及由該 RAND所導出的一内部產生力ϋ密訊息。相同目的之不同演 算法被定義用於CDMA及其他網路。 20 上述要求可以藉由提供存取來至該非PLMN網路之一 SIM(或等同的行動電話細胞辨識資料)來被加以執行,及 此可以藉由整合該SIM至該使用者終端機來被加以完成。 該SIM可以整合至該裝置本身,整合成一分離的存取卡片 或模組或是一 SIM載體暨讀取器可以是該網路存取卡的一 41 200307428 玖、發明說明 部份。對於非SIM類蜂巢式網路,該蜂巢識別資料可以被 儲存在使用者終端機,特別的智慧卡或該存取卡中。為非 PLMN裝置所使用的存取卡使用相當多種類的存取技術, 包括有藍芽,無線區域域網路(802.11X)及有線10/100類乙 5 太網路。 此等卡片的規格包括有標準的PCMCIA , CompactFlash及其他的規格。When it is better not to integrate and use a SIM in the access device, then another architecture exists that uses a different authentication option: configure the connection device with a virtual SIM. The virtual SIM may be stored in another access device 10 having its algorithm embedded in a processor in the access device, that is, software without special hardware. In detail, a hybrid network authentication which will be described later can be used to authorize the activation of the virtual SIM installed in the remote connection device. A virtual device is configured to be authenticated through VBSC or VSGSN, which will be described in detail later. It finally exists between the non-PLMN network and the PLMN network, and it can generate 15 virtual virtual SIMs or other A false triplet (rand, sres, ke) of its equivalent (MIN, ESN) in the network, or other authentication information, such as a user name and password that can be authenticated by the analog SIM gateway, And provided to the network, if a user will be able to access the network through the PLMN and the simulation node, the simulation node will exchange the same or equivalent data with the PLMN. However, if this method is used, then the PLMN does not directly authenticate the user (ie, does not verify that he has the SIM or equivalent mobile phone cell ID in the device he owns), but instead relies on the gateway Device. The gateway can then provide charging information to the PLMN 〇 36 200307428 玖, the description of the invention is to point out that when a virtual SIM is used in the access device, then the simulated PLMN gateway is preferably With the function of authenticating a virtual sim. Another feature of the present invention is to provide a virtual base station controller, which provides 5 interface functions, so that the non-PLMN network appears to the PLMN network, such as the same cellular cell base station controller. This concept can even be extended to simulate a honeycomb cell base station, so the 1 ^] ^ 1 ^ network appears as the same or multiple honeycomb cell base stations. Basically, all providers are a proxy server type configuration. An extended function to the virtual base station controller allows peer-to-peer connections in the non-10 PLMN network, peer-to-peer connections within the extraordinary ^^ network, and export to the network to be used by the PLMN network The connection managed by the road. Another feature of the present invention is to provide the honeycomb cell network to agree to access to the honeycomb cells through different paths through a non-honeycomb cell device. 15 The concept of allowing devices related to the honeycomb cell device to connect to the honeycomb cell network via a local area network is extended to a network of honeycomb cells configured with a honeycomb cell module or a non-SIM-like device. Another feature of the present invention is to provide a method for mobile device users to maintain a seamless connection, which is independent of the different communication networks that they can access, and whether it is moved from one connection type to another. Before introducing at least one embodiment of the present invention in detail, it can be understood that the present invention is not limited to the application of the following description and the description in the drawings. The present invention may be applied to other embodiments or may be different. The method is implemented or executed. Furthermore, it can be understood that the terms used herein and the terms 37 200307428 玖, invention description words are used for the purpose of illustration and are not to be considered as limiting. The Sim SIM Gateway / Reference Reference No. 1B | is shown here for the purpose of-a schematic diagram showing a typical attack on a mobile phone device. The _1 () is a small module of a SIM card carrier and reader 12 inserted in the cellular telephone device 14. The SIM provides the identification code of the honeycomb cell phone device and allows it to connect to the honeycomb cell phone network consistently. ίο 15 20 Please refer to Fig. 2, which is called-Simplified Block Diagram, which is shown in the SIM subsystem. The sm 10 includes an authentication sub-system 16 'for performing a confidential identity to ensure that the network is a legitimate user of the phone number, and an encrypted sub-system that encrypts voice and data communications from the network, and Decrypts incoming voice or data communications from the network, using algorithms such as A5. Of course, it should be noted that other encryption systems or completely different encryption systems can also be used. Encryption and decryption are performed using one of the messages supplied for authentication by the network. The correct type of authentication and encryption to be used depends on the network. In the authentication, a random number RAND is sent to the SIM by the network, where it is used as an input to a one-way function A3. The SIM returns the function in rotation, where the base station compares the SRES of the previous action performed by the system to apply RAND to A3. If the response complies with SRES, then the connected device is authenticated. Please refer to FIG. 3, which is a schematic diagram showing a remote device connected to a honeycomb cell or a pLMN network through a local area network. The device 20, however, has the processing power to allow it to identify itself, although it is implemented in a way that does not match or meets the requirements of the PLMN network. This device 20 does not require 38 200307428. Invention Description If it is a mobile phone or has a SIM. This device is referred to herein as a non-PLMN device. The device 20 is connected to a non-PLMN network 22, which may be typically a LAN network with one wireless access point. The LAN typically uses TCP-IP as a communication protocol. The LAN is connected to the PLMN or honeycomb cell network 26 through an analog SIM gateway 24 5. The analog SIM gateway 24 provides a bridge between the TCP-IP authentication and encryption protocol and the PLMN protocol, and thus allows the device 20 to be confidentially identified by the PLMN network, even if it does not have a SIM. As shown in Figure 3, the connection 10 between the device 20 and the gateway is protected using any standard TCP / IP security protocol, such as secure socket link (SSL), TLS, Ispec It is any security encryption and authentication technology typically used in IP networks. It will be described in further detail later. This security technology is used in the device 20 to unambiguously identify itself to the gateway. On the other hand, other security protocols such as IPSec can also be used for this purpose; that is, the term SSL when used in this interpretation is integrated to mean that anything that can be used to protect the device and the gate Any security protocol for data transmitted between routers, including those operating at a lower level and not using a socket. After the gateway has determined the identity of the connected device, it performs a SIM matching identification procedure with the PLMN network, wherein the gateway indicates that the PLMN has been authorized for the connected device. The authorization procedure will be explained in more detail in Figure 5. Please refer to FIG. 4A, which is a simplified diagram showing the embodiment of FIG. 3 in detail, and particularly the internal subsystem of the gateway 24. Elements that are the same as those in the previous drawings are given the same reference numerals and will not be referenced again unless it is necessary to understand the present invention. The simulated SIM gateway 24 includes a database subsystem 28, an access subsystem 30, an interaction subsystem 32, and a PLMN subsystem 34. The different secondary systems can be installed on many servers or the entire gateway can be installed in a single server 5 depending on the required scale of operation. The gateway is preferably located in a secure location to protect the possibility of physical damage to the system. However, as will be explained later, the gateway does not store any information that would compromise SIM security requirements. The access subsystem 28 generally includes standard LAN security devices. Typically, an SSL socket is established at the connection device 20. The access subsystem identifies the device and notifies the PLMN subsystem 34. The PLMN secondary system communicates to the PLMN network 26, of which a connection is required. The gateway is structured to look like a standard mobile phone cell base station, or a standard SGSN, a standard base station controller, or a standard MSC for the PLMN network, which transmits a standard SIM Identity information to the PLMN secondary system. When the device does not have a SIM, the secondary system will not pass any identity data to the device. In addition, it briefly checks that the SSL or other TCP / IP-based authentication protocol is successful and sends a standard SIM confirmation to the PLMN network. 20 If the information flow transmitted by the end-user access device to the PLMN is needed, and then when it needs to provide a match with the PLMN network, the PLMN sub-system 34 can also perform encryption and transmission of outgoing data and sound Decryption of incoming voice and data. The interaction subsystem provides a bridge between the IP-based access subsystem and the mobile phone cell protocol of the PLMN system used. The database system includes data of users of the LAN, so individual users can be authorized and given access to the appropriate services. Please refer to FIG. 4B, which is a simplified comparison diagram showing another embodiment that allows non-PLMN devices to access a PLMN network. As described above, the non-PLMN device is required by the PLMN network to do the following: 1) The user authenticates that the PLMN sends a random number (RAND) to the access unit. In order to be authenticated, the access unit must respond to the correct number (SRES). The access device determines the 10 SRES by inputting the RAND to the SIM, wherein the secret A3 algorithm processes this action and the SRES is the output. The SRES is returned to the PLMN, where it is compared to the expected value. In the device using another honeycomb cell identification system, the access unit provides MIN and ESN in a first access, and the TMSI and ESN are immediately behind, so that it can perform similar authentication for the PLMN. 15 2) Data or Voice Encryption-Digitally held information (voice or data) sent to the PLMN by the access device is encrypted to avoid eavesdropping. In the example of a GSM network, the SIM encrypts the data stream using the A5 algorithm and an internally generated dense message derived from the RAND. Different algorithms for the same purpose are defined for CDMA and other networks. 20 The above requirements can be implemented by providing access to a SIM (or equivalent cell phone identification data) of the non-PLMN network, and this can be implemented by integrating the SIM into the user terminal carry out. The SIM can be integrated into the device itself, integrated into a separate access card or module, or a SIM carrier and reader can be a part of the network access card. For non-SIM type cellular networks, the cellular identification data can be stored in the user terminal, a special smart card or the access card. The access cards used for non-PLMN devices use quite a few types of access technologies, including Bluetooth, wireless local area network (802.11X) and wired 10/100 Ethernet. The specifications of these cards include standard PCMCIA, CompactFlash and other specifications.

對於個人數位助理器及膝上型電腦而言,該存取卡通 常可以是内建式的。更可能地,其可以設置有一附加卡, 10 例如一 CompactFlash(或PCMCIA)附加卡。已經被建立的一 種標準包括有CompactFlash規格的藍芽卡。此卡片被修改 成包括一 SIM載體及該藍芽驅動軟體被修改成包括有該 SIM讀卡器及控制。 該SIM載體及讀卡器可以被加入無線區域網路卡,像 15 是CompactFlash或PCMCIA格式的 802.lib協定。For personal digital assistants and laptops, the access card can often be built-in. More likely, it may be provided with an add-in card, such as a CompactFlash (or PCMCIA) add-in card. One standard that has been established includes Bluetooth cards with CompactFlash specifications. The card is modified to include a SIM carrier and the Bluetooth driver software is modified to include the SIM card reader and controls. The SIM carrier and card reader can be added to a wireless LAN card, such as the 802.lib protocol in CompactFlash or PCMCIA format.

第4圖是基於該GSM/GPRS網路。該圖式的上半部份 顯示GPRS可以完全被使用的現在標準的方法。該SIM卡及 控制軟體被正常地安裝在該GPRS存取卡中。該GPRS存取 卡被安裝在該使用者設備(User Device)中,該設備典型地 20 是為一個人數位助理器,膝上型電腦或行動電話。 該方法之原理被顯示在第4B圖。在第4B圖中,一比 較被顯示在該圖式的上半部及該圖式的底半部之間,其中 上半部中,標準的GPRS被使用及SIM存取是透過一GPRS 存取卡36來提供,及在該底半部中,一非PLMN網路之中 42 200307428 玖、發明說明 間區域仲裁及SIM存取透過一藍芽存取卡38被提供。 在該圖之下方部份,該GPRS存取卡36被一藍芽存取 卡3 8所取代。該控制軟體被安裝在此相同的卡片上。該藍 芽存取卡被安裝在該使用者設備中及透過該藍芽網路溝通 5 ° GPRS訊息是經由藍芽及在該網路的邊緣上被傳輸。藍 芽傳輸是被標準的GPRS傳輸所取代如該圖中所示。 相較於第4A圖所示者,上述方法的優點是上述SIM被 包括在一存取卡裝置中。指定值是被限制在一特別的卡片 ,其也就是說,該解決方法可以單純的基於提供SIMs在該 1〇非pLMN裝置上來被實現,及實質上沒有額外的功能必需 被提供至任何相關的網路。申請使用者被提供可以存取所 有的網路服務。所有的存取及加密使用標準及完整未修改 的PLMN技術。該供應商可以被保護免於被欺騙,因為它 是依據它自己的保密系統。該存取網路總機是藉由相同的 15嘗試及測試PLMN系統來保護免於被欺騙。 參考请看第5圖,其是透過一LAN連接藉由一非SIM裝 置來獲得存取該蜂巢式無線或pLMN網路之方法的流程圖 。该圖式參考至第4A圖之實施例。相較下,第4B圖之裝 置以一完整標準方式來連接。根據第5圖所示,該裝置在 20啟始步驟^中連接至該LAN,及而後一SSL軟體資料結構 (socket)在下一步驟S2中被建立。至該lAN的連接最好是 使用標準的網路瀏纜器來執行,其最好是可以支援一 SSL 軟體貝料結構或其他的丁CP/_證協定。該軟體資料結構 是標準的且典型地可使用64,128位元加密錄匙或其他經 43 200307428 玖、發明說明 同意加密鑰匙資料串來加密通訊,藉此提供通訊安全而免 於被竊聽。該軟體資料結構一但被建立時是被使用在二階 段涊證操作,包括有第一步驟S3,其中該伺服器認證本身 至該連接客戶端。伺服器認正通常是使用簽暑認證的系統 5來達成,例如該x.509標準伺服器認證,其再確認該連接 裝置是與一經確認及在必要時可以追蹤的伺服器通訊。一 旦該伺服器已經認證本身至該裝置,而後在步驟S4,該使 用者通常被要求提供一使用者名稱及密碼。此最好使用一 標準對話框來執行。該使用者名稱及密碼與該伺服器資料 10庫比較及該伺服器而後可以決定該連接裝置被給與的該連 接協定。 如果步驟3及步驟4成功地在該閘道器與該裝置之間溝 通協調,而後在步驟5中,該閘道器提示該pLMN—連接是 需要的。在步驟6中,該PLMN藉由提供一 SIM保密三連碼 15 (tHplet)來響應,該三連碼包括一隨機數RAND,來自該 SIM至該隨機三連碼之一期望響應訊別及一加密输匙Kc。 在-SIM裝置的正常例子中,ran^送至該_,其是被 使用作為單向功能的輸入。該SIM送回該功能輸出,其中 該基地台與SRES比較。如果該響應匹配於SRES,則該連 20接裝置被授權。然而,在本例中,該連接裝置不是一襲 裝置。在步驟37中,反而該PLMN系統43簡易地和對該連 接裝置在步驟3及步驟4被成功地認證,而後送出一認證響 應至該PLMN。在步驟8中,該閘道器在後續通訊使用該加 錢匙Kc來負責資料及聲音的加密。聲音最好總是在該間 44 200307428 玖、發明說明 道器上由該SSL來解密,及可以根據該PLMN網路的要求 來使用該A5演算法及該加密鑰匙Kc來接續地再加密。 上述實施例的優點可以加諸於該網路使用者,該LAN 總機及該PLMN或蜂巢網路總機。該網路使用者使用到由 5 一標準PLMN所提供的所有加密,但可以使用一低成本裝 置來連接或簡單地使用在當時方便取得的一裝置,而不需 要任何特別的硬體套件。對於該LAN總機,它可以基於它 自己的TCP /IP認證技術來提供全套的連接服務。最後地 ,對於該PLMN總機,本實施例提供該網路使用者連接經 10 該LAN可以具有全套的服務的裝置,以確保其響應將可以 被該LAN總機接受。 雖然上述例子已經使用一標準A或Gb介面描述GSM系 統,本實施例除了應用在GPRS之外,還可以用在EDGE, WBCDMA,UMTS,3G,CDMAone,CDMA2000,3GPP 15 ,3GGP2,PDC及其它PLM標準。上述所列者並不是所有 者,及其預計額外的協定將假以時日被加在該PLMN領域 中〇 該非PLMN網路典型地可以是一有線LAN,藍芽, 820.11(x),無線LAN或類似者。 20 雖然上述已經針對SIMs及GSM予以描述,該相同的解 決方案使用在任何系統作為蜂巢細胞網路識別及/或保密 ,及特別地包括在CDMA網路中的MIN及ESN。 範例: 上述之一範例可以是使用802.11存取卡連接至一 45 200307428 玖、發明說明 802.1 1 LAN之一 PDA,其中其被連接至該GSM或GPRS蜂 巢細胞網路。根據上述實施例,此一連接可以在提供該 PDA具有一 GSM相容SIM時來被達成。Figure 4 is based on the GSM / GPRS network. The upper part of the figure shows the current standard method in which GPRS can be used completely. The SIM card and control software are normally installed in the GPRS access card. The GPRS access card is installed in the User Device, which is typically a digital assistant, laptop or mobile phone. The principle of this method is shown in Figure 4B. In Figure 4B, a comparison is shown between the upper half of the figure and the lower half of the figure. In the upper half, standard GPRS is used and SIM access is through a GPRS access. The card 36 is provided, and in the bottom half, a non-PLMN network 42 200307428, area arbitration and SIM access between invention descriptions are provided through a Bluetooth access card 38. In the lower part of the figure, the GPRS access card 36 is replaced by a Bluetooth access card 38. The control software is installed on this same card. The Bluetooth access card is installed in the user equipment and communicates through the Bluetooth network. 5 ° GPRS messages are transmitted via the Bluetooth and on the edge of the network. Bluetooth transmission is replaced by standard GPRS transmission as shown in the figure. The advantage of the above method over that shown in Figure 4A is that the SIM is included in an access card device. The specified value is restricted to a special card, which means that the solution can be implemented on the 10 non-pLMN device based solely on providing SIMs, and essentially no additional functions must be provided to any relevant network. Subscribers are provided with access to all network services. All access and encryption uses standard and complete unmodified PLMN technology. The supplier can be protected from fraud because it is based on its own security system. The access network switchboard is protected from being spoofed by the same 15 attempts and tests of the PLMN system. Please refer to FIG. 5, which is a flowchart of a method for obtaining access to the cellular wireless or pLMN network through a LAN connection through a non-SIM device. The figure refers to the embodiment of FIG. 4A. In contrast, the device in Figure 4B is connected in a complete standard way. According to Fig. 5, the device is connected to the LAN in the initial step 20, and then an SSL software data structure (socket) is established in the next step S2. The connection to the LAN is preferably performed using a standard web browser, and it is best to support an SSL software architecture or other CP / _certificate protocol. The software data structure is standard and can typically use 64, 128-bit encryption keys or other communications. The 2003 200307428 玖, description of the invention agrees to encrypt the key data string to encrypt communication, thereby providing communication security from eavesdropping. Once the software data structure is established, it is used in the second-stage verification operation, including a first step S3, in which the server authenticates itself to the connecting client. The server authentication is usually achieved by using a system 5 signed for certification, such as the x.509 standard server certification, which reconfirms that the connecting device communicates with a server that has been confirmed and can be traced if necessary. Once the server has authenticated itself to the device, then at step S4, the user is usually required to provide a username and password. This is best performed using a standard dialog. The user name and password are compared with the database of the server data and the server can then determine the connection agreement that the connecting device is given. If steps 3 and 4 successfully communicate and coordinate between the gateway and the device, then in step 5, the gateway prompts that the pLMN-connection is needed. In step 6, the PLMN responds by providing a SIM secret triple code 15 (tHplet). The triple code includes a random number RAND, from the SIM to one of the random triple codes. Encryption key Kc. In the normal example of the -SIM device, ran ^ is sent to this _, which is used as an input for a one-way function. The SIM sends back the function output, where the base station is compared with SRES. If the response matches SRES, the connection device is authorized. However, in this example, the connection device is not a strike device. In step 37, instead, the PLMN system 43 simply and successfully authenticates the connected device in steps 3 and 4, and then sends an authentication response to the PLMN. In step 8, the gateway uses the money key Kc in subsequent communications to encrypt data and sound. The voice is preferably always in this room. 44 200307428 发明, description of the invention The SSL is used to decrypt on the router, and the A5 algorithm and the encryption key Kc can be used to re-encrypt in succession according to the requirements of the PLMN network. The advantages of the above embodiments can be added to the network user, the LAN switchboard, and the PLMN or cellular network switchboard. The network user uses all the encryption provided by a standard PLMN, but can use a low-cost device to connect or simply use a device that was easily available at the time without the need for any special hardware kit. For this LAN switchboard, it can provide a full set of connection services based on its own TCP / IP authentication technology. Finally, for the PLMN switchboard, this embodiment provides a device for the network user to connect via the LAN, which can have a full set of services, to ensure that its response will be accepted by the LAN switchboard. Although the above example has described the GSM system using a standard A or Gb interface, this embodiment can be used in addition to GPRS, EDGE, WBCDMA, UMTS, 3G, CDMAone, CDMA2000, 3GPP 15, 3GGP2, PDC and other PLM standard. The above list is not the owner, and it is expected that additional agreements will be added to the PLMN domain over time. The non-PLMN network can typically be a wired LAN, Bluetooth, 820.11 (x), wireless LAN or the like . 20 Although the above has been described for SIMs and GSM, the same solution is used in any system as cellular network identification and / or security, and specifically includes MIN and ESN in CDMA networks. Example: One of the above examples can be connected to a PDA using an 802.11 access card. According to the above embodiment, this connection can be achieved when the PDA is provided with a GSM compatible SIM.

虛擬SIM 5 現請參考第4C圖,其是為一簡化比較圖,其顯示允許Virtual SIM 5 Please refer to FIG. 4C, which is a simplified comparison diagram.

非PLMN裝置存取一 PLMN網路之一變化實施例。該方法 是適合在當連接至該PLMN緊需要在認證及會計目的時, 但沒有使用者流量在該存取裝置及該PLMN之間被交換。 如上所述,在此方法中,該終端使用者存取裝置配備有一 10 虛擬SIM。該模擬蜂巢細胞節點(VBSC或VSGSN+)具有一 認證資料庫,其中所有具有需擬SIM(或其他方法模擬作為 蜂巢細胞辯識之認證替用碼)網路使用者的認證資訊。該 虛擬SIM可以許多方式來啟始或使用該資訊,其中至少部 份者僅可用於一存取或存取嘗試。詳而言之,在後面將被 15 描述之混合網路認證可以被使用來認證安裝在遠端連接裝 置之該虛擬SIM,及使用來讓該蜂巢細胞身份與儲存在該 模擬蜂巢細胞節點的資料庫之該認證資料相關。配備有一 虛擬SIM之一設備是被一 VBSC或一 VSGSN來認證,如後 將詳細描述,其最好存在於該非PLMN網路及該PLMN網 20 路之間,及其可以產生用於虛擬SIMs或在其他網路中之其 他等效者之假三連碼(rand,sres,kc)。然而,如果此方法 被加以使用,則該PLMN不直接認證該使用者(亦即,不會 確認他所擁有的設備中具有SIM或等效蜂巢細胞身份),但 是依賴該閘道器。該閘道器其後可以進一步提供會計資料 46 200307428 玖、發明說明 至該PLMN,或該會計資料可以依據該非PLMN,或者上 述兩種情況皆是。 在當傾向於他們沒有包括有SIM s或其他硬體基礎辨識 器(智慧卡或其等效者)用於非PLMN至PLMN連接時,該虛 5 擬SIM方法可以被使用於存取裝置;或它可以被使用在非 PLMN至PLMN連接,其中該PLMN不支援整合SIM基礎認 證——例如,CDMA。 在此方法中,一虛擬(通常是軟體)SIM被安裝在該遠 端裝置。該遠端裝置不具有一 SIM。該SSG被一指派的閘 10 道器所取代,其產生假三連碼至該遠端裝置。該閘道器及 該遠端裝置共用該虛擬SIM保密鑰匙(其被儲存在該模擬細 胞節點認證資料庫)。該閘道器使用它來產生該三連碼 (RAND,SRES,KC),及產生類GSM挑戰該遠端裝置(亦即 RANDP該三連碼可以藉由為該GSM認證協定所使用的相 15 同演算法來產生(例如,HMAC-SHA-1或HMAC-MD5)。相 同演算法的要求將為該虛擬SIM及該模擬蜂巢細胞節點 (VBSC或VSGSN+)所使用。該遠端裝置接著使用該虛擬 SIM來響應該挑戰,及送出SRES至該模擬蜂巢細胞節點( 經由該非PLMN網路)。當該認證程序被成功地完成時,而 20 後該終端使用者存取裝置及該模擬蜂巢細胞節點共用一加 密鑰匙(Kc)如同在該GSM系統中一樣,其不為其他人所知 悉。該終端使用者存取裝置及該模擬蜂巢細胞可以使用此 加密鑰匙來加密它們之間的交通流量。然而,此加密鑰匙 不能使用在加密被指定至該PLMN網路之流量,因為該 47 200307428 玖、發明說明 PLMN不具有此加密鑰匙。 SIM或USIM可以此種方法實現。不像是SIM —一軟體 SIM可以被複製,使得使用虛擬SIM之認證協定包括有複 製偵測機構。 5 虛擬基地台控制器(VBSC)A variation of a non-PLMN device accessing a PLMN network. This method is suitable when the connection to the PLMN is needed for authentication and accounting purposes, but no user traffic is exchanged between the access device and the PLMN. As mentioned above, in this method, the end-user access device is equipped with 10 virtual SIMs. The simulated honeycomb cell node (VBSC or VSGSN +) has an authentication database, all of which have authentication information for network users who need a pseudo-SIM (or other method to simulate the authentication substitute code for identification of the honeycomb cell). The virtual SIM can initiate or use the information in many ways, at least some of which can only be used for an access or access attempt. In detail, the hybrid network authentication described later in 15 can be used to authenticate the virtual SIM installed on a remotely connected device, and to use the identity of the honeycomb cell and the information stored in the simulated honeycomb cell node The certification information of the library is relevant. One of the devices equipped with a virtual SIM is authenticated by a VBSC or a VSGSN. As will be described in detail later, it preferably exists between the non-PLMN network and 20 channels of the PLMN network, and it can generate virtual SIMs or False triple codes of other equivalents in other networks (rand, sres, kc). However, if this method is used, the PLMN does not directly authenticate the user (ie, does not confirm that he has SIM or equivalent cellular identity in the device he owns), but relies on the gateway. The gateway can provide further accounting information later. 2003200328 玖, invention description to the PLMN, or the accounting information can be based on the non-PLMN, or both. When it is intended that they do not include SIM s or other hardware-based identifiers (smart cards or their equivalents) for non-PLMN to PLMN connections, the virtual SIM method may be used for access devices; or It can be used for non-PLMN-to-PLMN connections, where the PLMN does not support integrated SIM-based authentication-for example, CDMA. In this method, a virtual (usually software) SIM is installed on the remote device. The remote device does not have a SIM. The SSG is replaced by an assigned gate 10 router, which generates a false triplet to the remote device. The gateway and the remote device share the virtual SIM secret key (which is stored in the simulation cell node authentication database). The gateway uses it to generate the triple code (RAND, SRES, KC), and to generate a GSM-like challenge to the remote device (that is, RANDP. The triple code can be used for the GSM authentication protocol. Co-calculation algorithm to generate (for example, HMAC-SHA-1 or HMAC-MD5). The requirements of the same algorithm will be used by the virtual SIM and the simulated honeycomb cell node (VBSC or VSGSN +). The remote device then uses the The virtual SIM responds to the challenge, and sends SRES to the simulated honeycomb cell node (via the non-PLMN network). When the authentication process is successfully completed, the end user accesses the device and the simulated honeycomb cell node after 20 Sharing an encryption key (Kc) as in the GSM system, it is not known to others. The end user access device and the simulated honeycomb cell can use this encryption key to encrypt the traffic between them. However This encryption key cannot be used to encrypt the traffic that is assigned to the PLMN network, because the 47 200307428 玖, invention description PLMN does not have this encryption key. SIM or USIM can be implemented in this way. Unlike SIM - a software SIM can be copied, making use of virtual SIM authentication protocol includes the replication mechanism 5 detects the virtual base station controller (VBSC).

現請參考第6圖,其是為一標準GSM網路配置的簡化 方塊圖。一基地台系統(BSS)40支援遠端位置行動裝置42 。其透過一MSC 44連接至一電路交換網路,在此例中為 該PSTN,及其透過一 SGSN被連接至一分封交換網路,像 10 是網際網路。要觀察的關鍵點是該基地台介面至該MSC是 使用A界面於電路交換連接及使用Gb介面於分封連接。此 等介面可以將如後詳述被該VBSC使用使得讓該PLMN像是 在該GPS網路中的任何其他BSS—樣。Please refer to Figure 6, which is a simplified block diagram of a standard GSM network configuration. A base station system (BSS) 40 supports remote location mobile devices 42. It is connected to a circuit-switched network through an MSC 44, in this case the PSTN, and it is connected to a packet-switched network through an SGSN, like 10 is the Internet. The key points to observe are that the base station interface to the MSC is using the A interface for circuit switched connections and the Gb interface for packetized connections. These interfaces can be used by the VBSC as detailed later to make the PLMN look like any other BSS in the GPS network.

現請參考第7圖所示,其是顯示一非PLMN網路48之一 15 簡化方塊圖,其係由一虛擬基地台控制器VBSC 50介面連 接至第6圖之該GSM網路。與前面圖式相同的元件給予相 同的標號,及除非在本發明的暸解下必要,否則不再次予 以說明。該非PLMN網路48透過一連串的存取點連接至遠 端裝置52及具有以任何典型網路型式之其自己的網路伺服 20 器。一SIM伺服器56被顯示提供有一模擬SIM閘道器,或 如上述型式的一虛擬SIM伺服器認證。 如在第6圖中所示之該標準基地台,該VBSC 50使用 該A介面以達到電路交換網路像是該PSTN及該GB網路用 以達到分封交換網路。該VBSC(虛擬基地台控制器)是作用 48 200307428 玖、發明說明 為在該非PLMN存取網路(藍芽,802.11 等)及該PLMN之間 的一代理閘道器。該VBSC透過該A及Gb介面連接至該 PLMN。有一些介面是該PLMN使用來與一BSC通訊及因此 該VBSC出現將該PLMN視為一 BSC。 5 該VBSC 62與使用該非PLMN網路之一存取裝置52通 訊,例如PDA,或筆記型電腦。該通訊是由安裝在該存取 網路或一網路伺服器上的一客戶端應用軟體來完成,及使 用基於TCP/IP或其他匹配的標準協定之一通訊通道來被執 行。通訊對於該VBSC是需要用於上述該SIM伺服器作為認 10 證及加密服務使用。該終端使用者存取裝置可以具有安裝 在其中的一虛擬SIM,及該SIM伺服器可比是一虛擬SIM驗 證器,或其可以是一模擬SIM閘道器如前述。 該VBSC最好也可以與在該存取裝置上的一分封資料 或在電路交換軟體客戶端通訊。該客戶端可以被網路使用 15 者獲得被請求得該特定服務像是公司VPN,網際網路存取 ,存取至在該蜂巢細胞網路之内的伺服器或聲音交換連接 〇 該存取裝置客戶端應用軟體典型地是為作為應用的下 載軟體,特別是當該存取裝置是一 PDA或筆記型電腦。Please refer to FIG. 7 for a simplified block diagram showing one of the non-PLMN networks 48. It is connected to the GSM network of FIG. 6 by a virtual base station controller VBSC 50 interface. The same elements as in the previous drawings are given the same reference numerals, and will not be described again unless necessary in the understanding of the present invention. The non-PLMN network 48 is connected to the remote device 52 and its own network server 20 in any typical network type through a series of access points. A SIM server 56 is shown provided with an analog SIM gateway, or a virtual SIM server certification of the type described above. As shown in the standard base station in FIG. 6, the VBSC 50 uses the A interface to reach a circuit-switched network such as the PSTN and the GB network to achieve a packet-switched network. The VBSC (Virtual Base Station Controller) is a proxy gateway between the non-PLMN access network (Bluetooth, 802.11, etc.) and the PLMN. The VBSC is connected to the PLMN through the A and Gb interfaces. There are interfaces that the PLMN uses to communicate with a BSC and therefore the appearance of the VBSC treats the PLMN as a BSC. 5 The VBSC 62 communicates with an access device 52 using one of the non-PLMN networks, such as a PDA, or a laptop. The communication is performed by a client application software installed on the access network or a network server, and is performed using a communication channel based on TCP / IP or other matching standard protocols. For the VBSC, communication is needed for the SIM server as an authentication and encryption service. The end user access device may have a virtual SIM installed therein, and the SIM server may be compared to a virtual SIM verifier, or it may be an analog SIM gateway as described above. The VBSC may also preferably communicate with a packet of data on the access device or a circuit-switched software client. The client can be used by 15 people on the network to get requested specific services like corporate VPN, Internet access, access to a server or voice exchange connection within the cellular network. The access The device client application software is typically download software as an application, especially when the access device is a PDA or a notebook computer.

20 該VBSC 50作為在該存取,非PLMN,網路及該PLMN 之間的一介面,及最好支援相當廣的範圍,其可以分別透 過該A及Gb介面通訊。該VBSC開始及響應訊息至及由該 PLMN,及與在該存取網路之間的元件互動來執行此等功 能。被選擇的功能如後述。 49 200307428 玖、發明說明20 The VBSC 50 serves as an interface between the access, non-PLMN, network and the PLMN, and preferably supports a wide range, which can communicate through the A and Gb interfaces, respectively. The VBSC starts and responds to messages to and from the PLMN, and interacts with components between the access network to perform these functions. The selected function is described later. 49 200307428 玖, description of invention

現請參考第8及9圖所述,其分別為顯示SIM服務至Gb 介面之一簡化信號平面及SIM服務至A介面之一簡化信號 平面。在該PLMN與該非PLMN網路之間的保密結構的正 確介面連接是使該介面看起來像是一 PLMN基地台(BTS)或 5 基地台次系統(BSS)的一部份。第8圖顯示透過存取點54連 接至一無線LAN網路之間的一連串行動裝置52。該無線 LAN使用它自己的協定,RF基礎協定,包括有該客互端至 該LAN連接的MAC,及客戶端至VBSC連接及在該網路之 内的其他網路協定。VBSC 62作用為在該網協定信號及該 10 PLMN信號之間的一繼電器。獲得該正確的信號内容需要 該行動元件具有内建SIMs或如上述類型的一模擬SIM閘道 器被加以使用。Please refer to Figs. 8 and 9, which respectively show a simplified signal plane of one SIM service to the Gb interface and a simplified signal plane of one SIM service to the A interface. The correct interface connection of the security structure between the PLMN and the non-PLMN network is such that the interface looks like part of a PLMN base station (BTS) or 5 base station subsystem (BSS). FIG. 8 shows a serial mobile device 52 connected to a wireless LAN network through an access point 54. The wireless LAN uses its own protocol, the RF-based protocol, including the MAC from the client to the LAN connection, and the client-to-VBSC connection and other network protocols within the network. VBSC 62 functions as a relay between the network protocol signal and the 10 PLMN signal. Obtaining the correct signal content requires the mobile device to have built-in SIMs or an analog SIM gateway of the type described above to be used.

該Gb介面被用來在該VB SC及提供GPRS服務支援點 SGSN之間傳送信號,其中標準存取是由該蜂巢細胞基本 15 架構中獲得:在Gr上以該HLR認證,在Gn上資料通道至 GGSN,在Ga上會計資料至Ga等。一 Gs介面68被使用來以 一行動交換中MSC來傳送資料。在此要注意,該VSGSN+ 最好總是具有朝向著該行動介面的一分封資料;然而朝向 著該網路,其可以使用一分封或電路。那也就是說,特定 20 化該VSGSN使得該非PLMN存取網路可以出現作為分封資 料之一 SGSN及作為電路交換資料之BSC。注意在第8圖中 只說明該蜂巢細胞協定,因此該網際網路連接可以被使用 作為轉換站。 該SGSN 66最好是作為該Gb及Gs介面之間的一繼電器 50 200307428 玖、發明說明 。要注意,該MSC只被考慮到電路交換資料。其作為分封 交換資料的等效者是為該SGSN。 第9圖顯示電路交換資料的認證平面。與前面圖式相 同的元件給予相同的標號,及除非在對本發明瞭解上的需 5 要下,不再對其解釋。第9圖除了該SGSN階段被省略之外 ,其餘的與該第8圖相同及該A協定70被使用來在該VBSC 62及該MSC 68之間直接通訊。 現請參考第10圖所示,其是為顯示分封交換傳送通道 服務之通訊協定平面之一簡化圖。與前面圖式相同的元件 10 被給予相同的標號,及除了對本實施例之瞭解有必需時, 不再對其予以解釋。一 GPRS網路伺服器72透果該Gn介面 74被連接至該SGSN 66。對於該圖中的每一元件,不同的 可使用的協定層被加以顯示。 一資料存取客戶端執行GPRS應用軟體,典型地包括 15 有如WAP瀏覽器者。被使用的該通訊路徑是與上述第8圖 中者相同。雖然圖中未示,應用軟體可以經由該閘道器 GPRS支援節點GGSN 76來獲得存取該PLMN GPRS網路之 外如第6圖所示。 在當下載至該存取裝置時,該資料存取客戶端典型地 20 是由標準GPRS軟體協定元件被組合,及透過該TCP/IP通 道與該VBSC通訊。在該VBSC上,該傳輸層最好是以 BSSGP(BSS GPRS協定)來替代以與該SGSN相容。再者, 在該VBSC,該無線電連接控制層訊息最號在該BSSGP需 要時提供支援。 51 ^0307428 玖、發明說明 見月乡考第11圖所不,其顯示在提供的電路交換服務 2不同元件上相_協定之-簡化協定方塊圖。該通訊路 大圖上如第7圖所示及與前圖相同的元件被給予相同的 標號,及及除了對本實施例之瞭解有必需時,不再對其予 5 以解釋。 如上述,在該存取裝置已經被認證之後,其可以被於 分封資料連接或電路交換連接。第u圖說明電路交換服務 連接路t》具有對聲音的特定討論。對於熟習相關技 術者將可瞭解,傳真及Hs資料是以類比型式來加以處理。 1〇 冑於聲音存取而言,該連«置52最好包括有一電話 杈鍵及顯不益及支援音頻伺服器。如果該裝置淋身是為 電舌單S ’像疋—藍芽無線電話,而後此等結構被使用 在該裝置中及該客戶端僅需要支源存取至該資料通道。 :如果該裝置是-標準PDA或膝上型電月遂,則該客戶端 15最好包括有一軟電話按鍵及顯示器及1好包括彳音頻支援 此釔構在IP電話客戶端在今日已經是標準結構。 講話最好是以AMR(自我調整多頻率·· Adaptive Multi· Rate)來作聲音傳播,其是為在GSMpLMN中現今所採用的 標準。此聲音傳播可以在該客戶端或在該VBsc上被執行 20 ’每一種可能的優點及缺點如后·· 1.在行動裝置中的聲音傳播器 在存取裝置中的AMR聲音傳播具有降低.LAN聲音頻 寬的優點,其在該存取裝置上明顯的處理需求去交換執行 該聲音傳播及與在該VBSC上該AMR分封之再訊框同步。 52 200307428 玖、發明說明 該無線LAN傳輸通道大體上是被期望產生該時間延遲來引 導再同步的需求。分封經該通道通過可能會遭遇到分裂, 但因為該聲音傳播,只有當該全訊框已經接收及再重造可 以讓該VBSC送其經該A介面至該MSC。 5 2.在該VBSC上的聲音傳播器 另一技術被使用在客戶端上的一種已經被使用在讓聲 音通過IP而被稱為輕重量聲音傳播技術。在該VBSC上, 該輕重量編碼而後最好被轉碼成為AMR。 在該無線LAN是藍芽基礎的無線網路時,聲音傳播可 10 以在該客戶端上被一起分配。此是音為該藍芽無線網路協 定支援特定為聲音所設計的一電路交換通道。其同時支援 32 Kbps的ADPCM及64 Kbps的PCM。如果該藍芽聲音通道 被使用,而後所需要的該唯一聲音傳播是在該VBSC。 置放該聲音傳播器於該VBSC上的架構之一缺點是該 15 無線LAN最後結束時攜帶有一相當高資料率的聲音通道。 此導致通道能力的損失,特別是因為此能力必需保證維持 它的即時特性。 如上述該等圖式所示,該VBSC 62被安裝在該LAN上 。然而,其可以被變換跟著PLMN的裝置來安裝,典型地 20 為該載體交換中。前述方法的優點是一 VBSC失敗可能影 響只有一個LAN。後面的例子允許一單一 VBSC去服務很 多個LANs,及緊接著在成本上有節省,但較高層次的可 信度是需要的。 該VBSC提供在該LAN及該蜂巢細胞網路之間的協定 53 200307428 玖、發明說明The Gb interface is used to transmit signals between the VB SC and the SGSN providing GPRS service support points. The standard access is obtained by the Hive Cell Basic 15 architecture: the HLR certification on Gr, and the data channel on Gn. To GGSN, accounting information on Ga to Ga and so on. A Gs interface 68 is used to transfer data with a mobile switching MSC. It should be noted here that the VSGSN + preferably always has a packet of data towards the mobile interface; however, towards the network, it can use a packet or circuit. That is to say, specifying the VSGSN makes the non-PLMN access network appear as one of the encapsulation data, SGSN, and BSC as circuit-switched data. Note that only the honeycomb cell protocol is illustrated in Figure 8, so the Internet connection can be used as a switching station. The SGSN 66 is preferably used as a relay between the Gb and Gs interfaces. 50 200307428 发明 Description of the invention. Note that the MSC is only considered for circuit-switched data. It is equivalent to the SGSN for the exchange of information in sub-packages. Figure 9 shows the authentication plane for circuit-switched data. The same elements as those in the previous drawings are given the same reference numerals, and will not be explained unless it is necessary to understand the present invention. Figure 9 is the same as Figure 8 except that the SGSN phase is omitted, and the A protocol 70 is used for direct communication between the VBSC 62 and the MSC 68. Please refer to FIG. 10, which is a simplified diagram of a communication protocol plane for displaying a packet switching transmission channel service. Elements 10 that are the same as those in the previous drawings are given the same reference numerals, and will not be explained again unless it is necessary to understand the present embodiment. A GPRS network server 72 transparently connects the Gn interface 74 to the SGSN 66. For each element in the figure, a different available protocol layer is shown. A data access client runs GPRS application software, typically including 15 such as a WAP browser. The communication path used is the same as that shown in FIG. 8 above. Although not shown in the figure, the application software can gain access to the PLMN GPRS network through the gateway GPRS support node GGSN 76 as shown in FIG. 6. When downloading to the access device, the data access client is typically composed of standard GPRS software protocol components and communicates with the VBSC through the TCP / IP channel. On the VBSC, the transport layer is preferably replaced with BSSGP (BSS GPRS Protocol) to be compatible with the SGSN. Furthermore, in the VBSC, the radio connection control layer message number is provided to support the BSSGP when needed. 51 ^ 0307428 发明, description of the invention See Figure 11 of the Yuexiang Township Examination, which is shown in the circuit switching service provided. 2 Different components on the different components of the agreement-simplified agreement block diagram. On the large diagram of the communication path as shown in FIG. 7 and the same components as the previous figure are given the same reference numerals, and will not be explained again except when it is necessary to understand this embodiment. As described above, after the access device has been authenticated, it can be connected to a packet data connection or a circuit switched connection. Figure u illustrates circuit-switched services. Connection t has a specific discussion of sound. Those skilled in the art will understand that facsimile and Hs data are processed by analogy. 10 In terms of sound access, the connection 52 preferably includes a telephone keypad and a display and audio server. If the device is in the form of an electric tongue, it's like a Bluetooth wireless phone, and then these structures are used in the device and the client only needs a source to access the data channel. : If the device is a standard PDA or laptop, then the client 15 preferably includes a soft phone button and display and 1 including tritium audio support. This yttrium structure is already standard in IP phone clients today. structure. Speech is best transmitted using AMR (Adaptive Multi-Rate ...), which is the standard currently used in GSMpLMN. This sound propagation can be performed on the client or on the VBsc. 20'Each of the possible advantages and disadvantages is as follows ... 1. The sound transmitter in the mobile device has a reduced AMR sound transmission in the access device. The advantage of LAN audio and audio is that it has obvious processing requirements on the access device to exchange and execute the sound transmission and synchronize with the re-frame of the AMR packet on the VBSC. 52 200307428 (ii) Description of the invention The wireless LAN transmission channel is generally expected to generate the time delay to guide the need for resynchronization. Passing the packet through the channel may encounter division, but because of the sound transmission, only when the full frame has been received and reconstructed can the VBSC send it to the MSC through the A interface. 5 2. Sound Propagator on the VBSC Another technology used on the client is a light weight sound propagation technology that has been used to pass sound over IP. On the VBSC, the light weight code is then preferably transcoded into AMR. When the wireless LAN is a Bluetooth-based wireless network, sound propagation can be distributed together on the client. This is a circuit-switched channel designed specifically for sound by the Bluetooth wireless network protocol. It supports both 32 Kbps ADPCM and 64 Kbps PCM. If the Bluetooth sound channel is used, then the only sound propagation required is in the VBSC. One disadvantage of the architecture in which the sound transmitter is placed on the VBSC is that the 15 wireless LAN finally carries a sound channel with a relatively high data rate. This results in a loss of channel capability, especially since this capability must ensure that its immediate characteristics are maintained. As shown in the above drawings, the VBSC 62 is installed on the LAN. However, it can be changed to be installed following a PLMN device, typically 20 for the carrier exchange. The advantage of the foregoing method is that a VBSC failure may affect only one LAN. The latter example allows a single VBSC to serve many LANs, followed by cost savings, but higher levels of reliability are needed. The VBSC provides an agreement between the LAN and the cellular network 53 200307428 玖, description of the invention

橋接,其允許該二者工作在一起如同一整體。因此,電信 服務供應商可以在沒有其他可使用者時來使用非PLMN網 路(藍芽,802.lib等)來提供電信服務使用者3G的服務,無 論是可使用頻寬的理由或者因為該接收裝置不具有複雜的 5 電路來接收它們。因此,例如,大部份的行動電話不能接 收任何簡單的影像,然而可以連接至該LAN網路之大部份 基本型的PDA可以接收相當複雜的影像。電信服務使用者 可以由該非PLMN網路本身來被提供高速,豐富的經驗, 而在同時可以完全存取標準聲音及資料服務。電信服務使 10 用者經由該標準PLMN網路可以額外的被提供完整的請款 及服務概況。電信服務供應商獲得低成本存取網路來允許 他們降低價錢來提供給電信服務使用者。電信服務使用可 以透過像是該SIΜ閘道器之一整合保密機構來被提供在網 路上的通訊隱私性。同樣地,同時的聲音及資料通訊被提 15 供。Bridging, which allows the two to work together as one unity. Therefore, telecommunications service providers can use non-PLMN networks (Bluetooth, 802.lib, etc.) to provide telecommunications service users with 3G services when no other users are available, whether for bandwidth reasons or because The receiving device does not have complicated 5 circuits to receive them. Therefore, for example, most mobile phones cannot receive any simple images, but most basic PDAs that can be connected to the LAN network can receive quite complex images. Telecom service users can be provided with high-speed, rich experience by the non-PLMN network itself, while having full access to standard voice and data services. Telecommunications services allow 10 users to additionally be provided with complete payment and service profiles via the standard PLMN network. Telecommunications service providers have access to low-cost access networks to allow them to reduce their prices to provide telecommunications service users. The use of telecommunications services can be provided through the integration of security agencies like one of the SIM gateways to provide privacy on the Internet. Similarly, simultaneous voice and data communications were provided.

虛擬VSGN加成 為了讓在該非PLMN及該PLM網路之間的介面要有效 率及允許該網路的非PLMN部份提供它自己的貢獻給使用 者經驗,一種為熟知的VSGN加成(VSGN+)被提供支援群 20 組對群組(peer-to-peer),群組對區域伺服器(peer to local server)及群組對離線網路通訊,其交換連接至一 PLMN網 路如同是該網路的整體部份。特別地,該VSGSN使得該非 PLMN存取網路同時出現對分封資料的一服務GPRS支援節 點(SGSN)及電路交換資料的BSC。 54 200307428 玖、發明說明 一標準服務GPRS支援節點負責在其地理服務區域之 内的資料分封傳遞至及接收來自該等行動基地台。其工作 包括有分封路由及傳遞’移動管理(附加/分開及位置管理) ,邏輯連接管理,及認證及充電功能。該SGSN的位置暫 5 存器儲存有所有著冊在該SGSN的GPRS使用者的位置資料( 例如,現在的蜂巢細胞,現在的VLR)及使用者資料(例如 ,IMIS,在該分封資料網路中被使用的位置)。命名該加 成(Plus)的意義指的是支援電路交換通訊的功能,其通常 不是該GPRS之一部份及因此不能被一標準SGSN來支援。 10 為了提供此整合性的功能,該介面被要求提供特別是 該下列服務: 認證及著冊該電信服務使用者, 更新該電信服務使用者的位置(或支援送入的訊息或 電話), 15 支援該電信服務使用者產生的服務請求, 整合活動至完整的請款單中,及 提供一定範圍的其他支援服務。 該虛擬基地台控制器(VBSC)如前述致能上述服務,但 本身並不致能群組對群組(peer-to_peer),群組對區域伺服 20 器(peer to local server)及群組對離線網路通訊。該 VSGSN+整合所有的VBSC功能及額夕卜支援群組對群組及群 組對離線網路連接。The virtual VSGN addition has made the interface between the non-PLMN and the PLM network efficient and allows the non-PLMN part of the network to provide its own contribution to the user experience, a well-known VSGN addition (VSGN + ) Is provided with a support group of 20 peer-to-peer, peer-to-local server and peer-to-peer network communication. The exchange connection to a PLMN network is as it should be. An integral part of the network. In particular, the VSGSN enables the non-PLMN access network to simultaneously present a serving GPRS support node (SGSN) for packetized data and a BSC for circuit switched data. 54 200307428 (1) Description of the invention A standard service GPRS support node is responsible for transmitting and receiving data within its geographic service area to and from these mobile base stations. Its work includes encapsulation routing and delivery ’mobile management (attachment / separation and location management), logical connection management, and authentication and charging functions. The location of the SGSN 5 temporarily stores the location information of the GPRS user (eg, the current hive cell, the current VLR) and the user data (eg, IMIS) in the SGSN. Where it is used). The meaning of naming the Plus refers to functions that support circuit-switched communications, which are usually not part of the GPRS and therefore cannot be supported by a standard SGSN. 10 In order to provide this integrated functionality, the interface is required to provide, in particular, the following services: authenticate and document the telecommunications service user, update the location of the telecommunications service user (or support incoming messages or phone calls), 15 Support service requests generated by users of this telecommunications service, integrate activities into a complete request form, and provide a range of other support services. The virtual base station controller (VBSC) enables the above services as described above, but does not enable group-to-peer, group-to-local server, and group-to-offline Network communication. The VSGSN + integrates all the VBSC functions and support for group-to-group and group-to-offline network connections.

現在回到第6圖及要觀察的一個重點是該BBS 40透過 該A介面作為電路交換連接來介面連接該MSC。該SGSN 55 200307428 玖、發明說明 46透過該Gs介面連接至該MSC/VLR 44,透過該Gr介面連 接至該AuC/HLR 78,及透過該Gn介面來與網路中的剩餘 者介面連接。此等介面被VSGSN+所使用來使其讓該 PLMN作為一標準BSS及一標準SGSN二者,及將常態地構 5 成該PLMN網路的部份。Now returning to Figure 6 and an important point to observe is that the BBS 40 interfaces with the MSC through the A interface as a circuit switched connection. The SGSN 55 200307428 玖, invention description 46 is connected to the MSC / VLR 44 through the Gs interface, to AuC / HLR 78 through the Gr interface, and to the rest of the network interface through the Gn interface. These interfaces are used by VSGSN + to make the PLMN both a standard BSS and a standard SGSN, and will normally form part of the PLMN network.

現請參考第12圖所示,其是為顯示該VSGN+之整體及 其如何配置入該網路環境之一簡化方塊圖。元件與前面圖 式相同者給予相同的標號及除非在對於本發明之暸解上之 必要,不再予以說明。一無線LAN 48具有一SIM伺服器56 10 如前述者但額外具有一連接管理器82及一區域伺服器82, 其中後者攜帶特定於該LAN的媒體豐富資料。該網路被連 接至一 VSGSN+單元84,其與前圖的VBSC以相當類似的方 式介面連接在該LAN與該PLMN之間。Please refer to Fig. 12, which is a simplified block diagram for showing the whole of the VSGN + and how it is configured into the network environment. Elements that are the same as those in the previous drawings are given the same reference numerals and will not be described unless necessary for an understanding of the present invention. A wireless LAN 48 has a SIM server 56 10 as before but additionally has a connection manager 82 and an area server 82, the latter carrying media-rich data specific to the LAN. The network is connected to a VSGSN + unit 84, which is connected between the LAN and the PLMN in a fairly similar manner to the VBSC in the previous figure.

該VSGSN+ 84與該PLMN交換連接如同它是為一標準 15 的SGSN ;其也可以使用一附加的A介面。該Gs及Gr及Ga 介面連接被使用來在此一般性的PLMN網路功能來通訊於 該MSC/VLR 44及HLR 78及CGF(未示於圖中),此等網路 功能像是認證,著冊,服務概要及包括有會計之流量量測 ,例如,經過該Ga介面至該CGF。相較之下,傳送資料流 20 量流過該Gn介面至該電信服務提供者的IP交換空間(IP cloud)。然而該不同的Gx介面是功能性不同的,它們典型 地設置在相同的傳輸媒體上。電路交換聲音控制及該個別 傳送信號是透過該A介面再一次經該VSGSN+通訊。 該分PLMN區域網路配置有一連接管理器80如前述, 56 200307428 玖、發明說明 以建立其群組對群組及群組對區域伺服器及群組對離線網 路伺服器。該連接管理器80藉由提供該VSGSN與該被連接 單元的身份識別及在該單元之間被移動資料的總數。該資 訊被該VSGSN使用來規格化撥叫詳細輸入。該規格是該 5 PLMN期待來自一標準SGSN者,及該撥叫詳細記錄是由該 PLMN所請求,以執行它的撥叫管理功能。 該VSGSN+啟始及響應來自該PLMN之訊息,及與在 該存取網路之内的元件互動來執行這些功能。 現請參考第13圖所示,其為顯示在該LAN PLMA介面 10 之不同部份可以取得的協定,特被是使用在認證者。該圖 除了該Gb介面被該Gs介面86取代之外其餘與第8圖相同。 該VBSC 62被該VSGSN+ 84所取代,該VSGSN+ 84操作類 似於LAN協定及該PLMN網路協定之間的一橋樑。更特別 地,該圖顯示牵涉到當該VSGSN+ 84介面連接於該PLMN 15 的MSC/VLR 68及該LAN SSG之間作為著冊的該等協定。 第13圖專注在該分封切換側,亦即資料傳輸。對於聲音等 ,在該A介面上與該MSC相互連接是類似的。 現請參考第14圖,其是顯示一資料傳送PLMN似服器 90之網路及協定環境之一簡易圖示。該VSGSN+r介面連接 20 在該LAN及該PLMN之間如同上述第12圖。 除了執些網際網路連接之外,如可以取得,該存取客 戶端52執行標準的GPRS應用,其可典型地包括有存取在 蜂巢細胞IP網路上的服務作為特別電子郵件,視訊資料等 。通訊是藉由該資料及協定如第14圖所示。雖然未顯示, 57 200307428 玖、發明說明 應用可以透過該GGSN獲得存取該PLMN GPRS網路之外。 該資料存取客戶端可以由標準的GPRS軟體協定元件 來組合及可以透過TCP/IP與該VSGSN+通訊。The VSGSN + 84 exchanges connections with the PLMN as if it were a standard 15 SGSN; it can also use an additional A interface. The Gs and Gr and Ga interface connections are used to communicate with the MSC / VLR 44 and HLR 78 and CGF (not shown) in this general PLMN network function. These network functions are like authentication, Book, service summary and flow measurement including accounting, for example, through the Ga interface to the CGF. In comparison, the amount of transmitted data flows through the Gn interface to the IP cloud of the telecommunications service provider. However, the different Gx interfaces are functionally different, and they are typically provided on the same transmission medium. The circuit-switched voice control and the individual transmission signals are again communicated through the VSGSN + through the A interface. The sub-PLMN local area network is configured with a connection manager 80 as previously described, 56 200307428 (ii), description of the invention to establish its group-to-group and group-to-area server and group-to-offline network server. The connection manager 80 provides the total number of data moved between the VSGSN and the connected unit by providing the identity of the connected unit. This information is used by the VSGSN to normalize dialing detailed input. The specification is that the 5 PLMN expects to come from a standard SGSN, and the call detail record is requested by the PLMN to perform its call management function. The VSGSN + initiates and responds to messages from the PLMN, and interacts with components within the access network to perform these functions. Please refer to Fig. 13, which shows the protocols that can be obtained in different parts of the LAN PLMA interface 10, and is especially used by certifiers. This figure is the same as Figure 8 except that the Gb interface is replaced by the Gs interface 86. The VBSC 62 is replaced by the VSGSN + 84, which operates similar to a bridge between the LAN protocol and the PLMN network protocol. More specifically, the figure shows the agreements that are registered between the MSC / VLR 68 of the PLMN 15 and the LAN SSG when the VSGSN + 84 interface is connected. Figure 13 focuses on the packet switching side, that is, data transmission. For sound, etc., the interconnection with the MSC on the A interface is similar. Please refer to FIG. 14, which is a simplified diagram showing one of the network and protocol environment of the data transmission PLMN server 90. The VSGSN + r interface connection 20 is between the LAN and the PLMN as shown in Figure 12 above. In addition to some Internet connections, if available, the access client 52 executes standard GPRS applications, which may typically include services accessed on the cellular IP network as special email, video data, etc. . Communication is based on this information and protocol as shown in Figure 14. Although not shown, 57 200307428 28, invention description Application can gain access to the PLMN GPRS network outside the GGSN. The data access client can be combined by standard GPRS software protocol components and can communicate with the VSGSN + through TCP / IP.

現請參考第15圖所示,其是為一簡化圖顯示該電路交 5 換傳送服務網路及網路桓境之間的一簡化圖。再一次地, 該VSGSN+應用作為在該LAN 60與該PLMN之間的一介面 ,此時透過該A介面連接至該MSC 44。聲音壓縮及聲音傳 播是與上述VBSC中所描述者相同。Please refer to FIG. 15, which is a simplified diagram showing a circuit between the circuit switching service network and the network environment. Once again, the VSGSN + application serves as an interface between the LAN 60 and the PLMN, and at this time connects to the MSC 44 through the A interface. The sound compression and sound transmission are the same as those described in the above VBSC.

現請參考第16圖所示,其是為顯示該網路協定環境及 10 說明分封資料流通管理之一簡化說明圖。如上所述,該 VSGSN+ 84是用來支援非PLMN網路,其可以提供連接型 式包括有群組對群組,群組對伺服器及群組對離線網路。 所有的此等連接型式最好是由該連接管理器8 0來建立及管 理。該VSGSN+獲得來自該連接管理器節點之流通管理資 15 訊及將其格式化成為相容於該PLMN格式之訊息組。至少 ,在上面有提到的該撥叫詳細記錄(Call Detail Records:CDRs)是以此方式來被產生。 第16圖顯示該分封資料服務之訊息流量。電路交換通 訊是以類似的方式以A介面取代該Gs介面來取代。 t 20 至於對於上述該VBSC,該VSGSN+可以被安裝在該無 線LAN位置或在該電信服務提供者交換中心。在成本及可 信度之間的效益互換如上述使用。如果一中心化的 VSGSN+被使用,其最好具有高層次的可使用性。 在多數個非PLMN存取網路在地理位置非常接近的時 58 200307428 玖、發明說明 後,一中心化的VSGSN+將最可能是最好的方法。 除了上述關於該VBSC所述的優點之外,該VSGSN+提 供支援群組對群組,群組對伺服器及群組對離線網路通訊 ,而不會被該PLMN影響而有可見度及控制的損失。 5 VSGSN+總結 該VSGSN+執行下列工作: (1) 使用該行動裝置之適當方法的行動裝置的認證質疑 ,其是否具有一 SIM,使用標準或私有的方法,在一些例 子中可能需要VSGSN+去介面連接該HLR ;此即為甚麼要 10 Gr的理由;及 (2) —標準行動裝置對於該網路之扮演角色,如果其要 連接網路交換資料的該MSC,則經過該A或Gs介面,如果 其要連接分封裝置的一標準SGSN,則使用Gb,如果採用 SGSN的角色及直接連至一 GGSN(該Gn介面,其是為真正的 15 一通道攜載,而無論該行動裝置要交換甚麼樣子的資料)。 在此要注意,該VBSC是該VSGSN+中最普通的一個特 殊的例子。 信號交遞(Handoff) 本發明之信號交遞特徵加入信號交遞至目前尚不具有 20 此能力的許多無線網路中的通訊控制。有效的信號交遞允 許使用者是在網路範圍之内但仍然在移動時可獲得一無線 LAN的所有好處,因為當他離開網路範圍時,該連接是藉 由連接另一無線LAN或如果它具有一適當的客戶端時藉由 直接連接至該PLMN網路來被加以保留。 59 200307428 玖、發明說明 5 為了提供所有的解決方案,五種一般性的例子被考慮 如後,其各具有次實例: 1. 内部熱點(Intra Hot Spot)信號交遞 a) 在重疊的無線網路(WNs)之間以相同的技術操作 b) 在非重疊的WNs之間以相同的技術操作 c) 在重疊的WNs之間以不同的技術操作 2. 交互熱點(Inter Hot Spot)信號交遞 9 a) 在重疊的熱點之間以相同或不同的技術操作 b) 在非重疊的熱點之間以相同或不同的技術操作 10 3. 内部無線廣域網路(PLMN)信號交遞 a) 在重疊的PLMNs之間以不同的技術操作 b) 在非重疊的PLMNs之間以不同的技術操作 4. 在無線區域及廣域網路之間的信號交遞 a)由區域至廣域網路之間的信號交遞 15 • ► b)由廣域至區域網路之間的信號交遞 5.經由一有線網路如網際網露來連接及再連接至該 WWAN(蜂巢細胞,GPRS)網路之信號交遞觀念之解釋 概念上地,以下的範例是被本發明之信號交遞特徵所 保含: ' 20 1. 信號交遞是由一網路控制單體或該使用者啟動所命 令; 2. 該網路維持一強工作時期邏輯來考慮信號交遞及暫 時失去通訊。該工作時期可以在通訊已經被新的網路上被 建立之後被繼續。該系統可以決定該使用者已經由一網路 60 200307428 玖、發明說明 中脫離及加入另一網路,及而後可以重新開始一被中斷的 I作時期; 3·硬信號交遞或軟信號交遞可以被支援。在軟信號交 遞時沒有被中斷,及連接至新的網路在當通訊在原來的網 5 路仍然有效時被建立; 4·信號交遞可以藉由該ap通訊協定(該中間存取控制 或MAC)來處理。此可能需要該既存協定的修改。如果此 選擇不可獲得,系統邏輯可以支援該“八〇外部的控制來啟 動與另一 AP之通訊,而後再建立該工作時期。雖然八卩也 1〇不知道一信號交遞已經發生,已經被支援通訊執到現在的 該AP最好反應如同該使用者已經離開該網路。在此同時, 該AP至通訊已經被傳送最好反應如同一新使用者(及一新 的工作時期)已經被存取進入它的網路。 5·該邏輯最好支援所有的系統或一部份的系統,包括·· 5 夕重熱點,母一熱底可以包括有一或多數Aps。熱點 可以操作使用相同或不同區域網路技術或連接協定,例如 802.11,藍芽等,及一或多個廣域技術或通訊協定,例如 ’ GPRS,CDMA2000,Reflex。 6·該邏輯最好決定搜尋之優先順序來決應當信好交遞 20 是需要於下列之間 相同技術的APs, 不同技術的APs ; 區域網路及廣域網路技術;及 不同廣域技術。 61 200307428 玖、發明說明 輯實Γ㈣ί置早%最好經由為該服務控制器所設計的邏 輯貫體來連接,該服務批在 二制裔負貝該行動電話通訊工作 期之維持。此等工作時期θ户#/4 T f 乍子4疋在该行動裝置及另一個體 務之間的獨立通訊實㈣, "5亥另一個體是為該工作時期的# 端(該行動裝置被定義為近端)。該服務㈣n可㈣_ 非即時支援來自該相可則時是㈣交換或分封交換, 聲音/資料/在資料上的聲立 耳曰之服務。在當該行動裝置改變 它的存取道時,該錢交遞@此可以韻此等卫作 繼續。 該工作時期被定義在共同於該行動裝置至該服務控制 '之任何協定,標準或非標準之中。此工作時期被實施作 為在目前使用的該行動單元及該存取單元之上的一層級, 其刺為—無線廣域網路(WWAN),—無線區域網路 (WLAN),網際網路,内部網路,psTN等。因此,被加諸 15在5亥本貫施例中該網路包括在其他(包括有⑺^, EDGE及CDMA蜂巢細胞資料)之中,不同的8〇211 wlaNs 孤芽 ISDN ’ Χ·25,訊框中繼(prame Reiay)。 夕種型式的信號交遞被討論如後。為了觀念澄清的目 的,每一定義說明一特定例子,例如,在wlan&wwan 2〇之間的^號父遞。直接的強調,在實際上包括有如上定義 的一或多個方法之一複雜信號交遞邏輯可以操作在相同的 行動裝置及在需要提高時被作動。例如,在一 WLAN之内 遺失通訊的一行動裝置可以嘗試執行信號交遞至在相同 WLAN熱點之内的另一無線網路,以及尋找一可能的信號 62 200307428 玖、發明說明 交遞至一 WWAN,因此當多於一個題的作動可實行時,該 行動裝置,其服務控制或甚至該熱點控制器可以選擇使用 具有較高優先權或優點之信號交遞。 服務的持續為多包裝網路所確保,其沒有整合配置信 5號交遞或信號交遞能力。此服務持續藉由執行在該網路通 汛之上的一層級上的信號交遞來被實施。該實際的細節隨 著被該信號交遞所支援的無線網路型式而變化。 現請參考第17圖所示,其是為顯示具有重疊部份的二 區域無線網路WN1及WN2之簡化概要圖,該二區域無線網 10路是被相同的熱點中心點100所控制。該第一無線網路 WN1包括有控制四個電信服務使用者單元sul〜Su4之一存 取點API。該第二無線網路WN2具有控制二個電信服務使 用者單元SU5〜SU6之一存取點AP2。 行動裝置服務使用者(Mobile subscibler:MS)單元SU4 15現在是由API來提供服務,亦即,其是為WN1的一部份。 當在該WN1之内的通訊條件變得不可以接受時,其可能因 馨 為在SU4或API上的降級信號接收(例如,因為移動或干擾) ,或因為在WN1之内的負載太高,一信號交遞被執行,其 中SU4變成WN2的一部份及經由該WN1執行的相同工作 · ♦ 20 SU4透過WN2持續到現在。 、· 現明參考第18圖所示,其是為顯示一區域無線網路 110操作在一廣域網路112所覆蓋的區域之内的一簡化示意 圖。該區域無線網路110包括有其被設定要被控制的一存 取點(AP)m,雖然,另一方面,其可以藉由如第17圖所 63 200307428 玖、發明說明 示之一熱點中心點所控制。該廣域網露112是由一WAN中 ^ 116來控制。許多電信服務使用者單元SU在每一網路中 操作。一特定的電信服務使用者單元在該二網路之間傳遞 亦即,其已經被操作在WAN 12之間及傳送至該WN 11〇 5 ’或反之亦然。 迕多解決方案被提出針對在維持該無線電信服使用者 之工作時期操作在該網路之内時的信號交遞之實現。該等 解決方案是為了支援相當廣範圍的行動裝置及網路能。 在此要‘出’在此所描述的該等解決方案,無論它們 1〇使用硬或軟信號交遞,其可實現在分時基礎上,支援分擔 資源來降低硬體成本及藉此降低在一單一行動裝置單元之 内有超過一個無線電實施時典型發生的干擾。 解決方案1—在重疊無線網路之間的内部熱點信號交遞— 相同技術 15 L在相同工作時期位準上持續強力切換無線網路通訊。 現請參考第19圖所示,其是顯示在交互重疊網路之間 使用相同技術的信號交遞。當無論網路或行動裝置識別通 訊條件是不可接受的,該相應個體離開該通訊。該使用者 裝置可能只是離開及切換至另一無線網路,或該Ap可以包 2〇括有一停止服務,其主動地放棄該使用者。在此例子中,Please refer to FIG. 16, which is a simplified explanatory diagram for displaying the network protocol environment and explaining the management of decentralized data circulation. As mentioned above, the VSGSN + 84 is used to support non-PLMN networks. It can provide connection types including group-to-group, group-to-server and group-to-offline networks. All such connection types are best established and managed by the connection manager 80. The VSGSN + obtains the circulation management information from the connection manager node and formats it into a message group compatible with the PLMN format. At least, the Call Detail Records (CDRs) mentioned above are generated in this way. Figure 16 shows the message traffic of the data service. Circuit-switched communications are replaced in a similar manner by replacing the Gs interface with the A interface. t 20 As for the VBSC described above, the VSGSN + can be installed at the wireless LAN location or at the telecommunications service provider switching center. The interchange of benefits between cost and reliability is used as described above. If a centralized VSGSN + is used, it is best to have a high level of usability. When most non-PLMN access networks are located very close to each other 58 200307428 玖, description of the invention, a centralized VSGSN + will most likely be the best method. In addition to the above-mentioned advantages of the VBSC, the VSGSN + provides support for group-to-group, group-to-server, and group-to-offline network communications without being affected by the PLMN with loss of visibility and control. . 5 VSGSN + Summary The VSGSN + performs the following tasks: (1) Questions on the authentication of the mobile device using the appropriate method of the mobile device, whether it has a SIM and uses a standard or proprietary method. In some examples, the VSGSN + interface is required to connect to the HLR; this is the reason why 10 Gr is required; and (2)-the role of standard mobile devices for the network, if it is to connect to the MSC of the network to exchange data, go through the A or Gs interface, if it wants A standard SGSN connected to the decapsulation device uses Gb. If the role of SGSN is adopted and it is directly connected to a GGSN (the Gn interface, it is carried for the real 15 one channel, regardless of what data the mobile device is exchanging ). It should be noted here that the VBSC is the most common special example of the VSGSN +. Signal Handoff (Handoff) The signal handoff feature of the present invention adds signal handoff to communication control in many wireless networks that currently do not have this capability. Effective signal handover allows the user to get all the benefits of a wireless LAN when he is within range but still moving, because when he leaves the range, the connection is by connecting to another wireless LAN or if It has an appropriate client and is retained by connecting directly to the PLMN network. 59 200307428 发明, Description of Invention 5 In order to provide all solutions, five general examples are considered as follows, each of which has a secondary instance: 1. Intra Hot Spot signal delivery a) In overlapping wireless networks WNs operate with the same technology b) Non-overlapping WNs operate with the same technology c) Overlapping WNs operate with different technologies 2. Inter Hot Spot signal delivery 9 a) Operate with the same or different technologies between overlapping hotspots b) Operate with the same or different technologies between non-overlapping hotspots 10 3. Internal wireless wide area network (PLMN) signal delivery a) Overlapping Different technologies operate between PLMNs b) Different technologies operate between non-overlapping PLMNs 4. Signal delivery between wireless area and wide area network a) Signal delivery from area to wide area network 15 • ► b) Signal Handover from Wide Area to Local Network 5. Connect and reconnect to the WWAN (Hive Cell, GPRS) network via a wired network such as Internet Exposure Explain conceptually the following examples It is covered by the signal handover feature of the present invention: '20 1. The signal handover is commanded by a network control unit or the user's activation; 2. The network maintains a strong working period logic to consider the signal Submit and temporarily lose communication. This working period can be continued after communication has been established on the new network. The system can determine that the user has been disconnected from a network 60 200307428, added to another network in the description of the invention, and can then restart an interrupted I operation period; 3. Hard signal delivery or soft signal delivery Delivery can be supported. There is no interruption in the soft signal handover, and the connection to the new network is established when the communication is still valid on the original network 5; 4. The signal handover can be through the ap communication protocol (the intermediate access control Or MAC). This may require a modification of the existing agreement. If this option is unavailable, the system logic can support the "80 external control to initiate communication with another AP, and then establish the working period. Although Hachi also does not know that a signal delivery has occurred, has been The AP supporting communication until now preferably responds as if the user has left the network. At the same time, the AP-to-communication has been transmitted preferably responding as if the same new user (and a new working period) has been Access to its network. 5. The logic is best to support all systems or a part of the system, including 5 hot spots, the mother can include one or more Aps. The hot spots can be operated using the same or Different LAN technologies or connection protocols, such as 802.11, Bluetooth, etc., and one or more wide-area technologies or communication protocols, such as' GPRS, CDMA2000, Reflex. 6. This logic is best to determine the search priority and should be Good faith delivery 20 is the APs that require the same technology, APs of different technologies; LAN and WAN technologies; and different wide area technologies. 61 200307428 It is explained that it is best to connect the early% through the logical continuum designed for the service controller, and the service batch is maintained during the communication period of the mobile phone of the second system. These working periods θ 户 # / 4 T 子 4 的 Independent communication between the mobile device and another service, "The other body is the # end of the working period (the mobile device is defined as the near end). This service is not available in real-time. It is a service of exchange or packet exchange, voice / data / sound on data. When the mobile device changes its access channel, the service钱 交 送 @ 此 可以 Yun These works are continued. The working period is defined in any agreement, standard or non-standard that is common to the mobile device to the service control. This working period is implemented as currently in use The mobile unit and the level above the access unit are as follows:-wireless wide area network (WWAN),-wireless local area network (WLAN), Internet, intranet, psTN, etc. Therefore, it was added 15 The network in this example Included among others (including ⑺ ^, EDGE and CDMA honeycomb cell data), different 8021 wlaNs lone buds ISDN 'X · 25, frame relay (prame Reiay). The various types of signal delivery are The discussion is as follows. For the purpose of clarification of the concept, each definition illustrates a specific example, for example, the parenthesis between wlan & wwan 2 0. The direct emphasis, in fact, includes one or more of the definitions above. One of the methods is that the complex signal delivery logic can operate on the same mobile device and be activated when it needs to be improved. For example, a mobile device that has lost communication within a WLAN can try to perform signal delivery to the Another wireless network, and finding a possible signal 62 200307428 玖, the invention description is handed over to a WWAN, so when more than one question action can be implemented, the mobile device, its service control or even the hotspot controller can Choose to use signal delivery with higher priority or advantage. The continuous service is ensured by the multi-packaging network, which does not integrate the configuration letter 5 delivery or signal delivery capabilities. This service is continually implemented by signal delivery performed on a level above the network flood. The actual details vary depending on the type of wireless network supported by the signal delivery. Please refer to FIG. 17 for a simplified overview diagram of the two-area wireless networks WN1 and WN2 with overlapping portions. The two-area wireless networks 10 are controlled by the same hotspot center point 100. The first wireless network WN1 includes an access point API that controls one of the four telecommunication service user units sul ~ Su4. The second wireless network WN2 has an access point AP2 which controls one of the two telecommunication service user units SU5 to SU6. The mobile device service user (Mobile subscibler: MS) unit SU4 15 is now serviced by an API, that is, it is part of WN1. When the communication conditions within this WN1 become unacceptable, it may be due to degraded signal reception on SU4 or API (for example, due to movement or interference), or because the load within WN1 is too high, A signal delivery is performed, in which SU4 becomes a part of WN2 and the same work performed through the WN1. ♦ 20 SU4 continues through WN2 to the present. It is clearly shown with reference to FIG. 18, which is a simplified schematic diagram for showing that an area wireless network 110 operates within an area covered by a wide area network 112. The local wireless network 110 includes an access point (AP) m which is set to be controlled, although, on the other hand, it can be a hotspot center as shown in FIG. 63 200307428 (the invention description). Point controlled. The wide area network exposure 112 is controlled by a WAN 116. Many telecommunications service subscriber units SU operate in each network. A particular telecommunications service user unit is passed between the two networks, i.e. it has been operated between WAN 12 and passed to the WN 1105 'or vice versa. Many solutions have been proposed for the implementation of signal delivery while maintaining operation of the radio conferencing user within the network during working hours. These solutions are designed to support a wide range of mobile devices and network capabilities. It is necessary to 'out' the solutions described here, regardless of whether they use hard or soft signal delivery, which can support the sharing of resources to reduce hardware costs and reduce There is more than one type of interference typically occurring in a single mobile unit. Solution 1-Handover of internal hotspot signals between overlapping wireless networks-Same technology 15 L Continue to forcefully switch wireless network communication at the same working period level. Reference is now made to Figure 19, which shows signal handovers using the same technique between interactive overlay networks. When either the network or the mobile device recognizes that the communication conditions are unacceptable, the corresponding individual leaves the communication. The user device may simply leave and switch to another wireless network, or the Ap may include a service outage, which actively gives up the user. In this example,

该MS試著要加入另一網路,在此例為WN2。一但通訊被 再建立之後,該中心點邏輯決定有一使用者裝置的請求( 等待或插撥)’及誃請求工作時期被自動地再加入。當實 現被分配的中心點邏輯(在該AP之内的CP邏輯)時,該AP 64 200307428 玖、發明說明 控該被接受的無線網路是藉由推或拉邏輯被通知次MS的 -月求工作時期。在雜邏輯的例子巾,該前-服務無線網 路之AP開始通知該巾請卫作時期的該接收無線 網路(及可 月b的其他相鄰無線網路)之該Ap ;該拉邏輯意為前一接收 5無線網路之AP請求被加人該新網路之該猶的請求工作時 期上的資訊。 2·/又有區域無線行動協協助之硬網路控制信號交遞 現請參考第20圖所示,其是為顯示信號交遞如何執行 而不需要來自該行動裝置的協助之一簡化流程圖。在此實 10施中,在鄰近無線網路之内的第二接收器量測來自該使用 者的需要被信號交遞之接收。該第二接收器可以是一分離 的接收器或簡單地包括有為此目的所分被的一些時槽⑴咖 slots)於該一般的ap接收器工作計晝。 要交遞該行動裝置信號由一 WN至另一 WN的決定如果 15是該中心化邏輯時是由該cp所決定,或藉由該服務^及 預備接收WNs的該等APs。如果此邏輯決定該預備接收 WNs可以&供改善通訊服務,每一次它的量測的行動裝置 至AP通訊特性及其載入條件中的一個條件(其中一個條件 或二者)時,該信號交遞發生。 20 該行動裝置由該服務的WN至該被接收%!^的信號交遞 以下列兩種方式: a)如果該行動裝置可以接收無線網路選擇控制,其命 令信號交遞至該被選擇(接收的)WN,包括有如果可能傳 送该WN通訊參數來加速該信號交遞過程; 65 200307428 玖、發明說明 b)如果該行動裝置不能接受無線網路選擇控制,則其 藉由拒絕服務來放棄對WN的服務;而後該行動裝置試著 登錄另一 WN ’及只有該被選擇(接收)WN接受它的請求加 入該網路。 5 3·被硬網路控制信號交遞之行動裝置 在此貫施中,该區域無線行動裝置尋找額外的通道來 測量及決定其他網路的通訊條件及送出此資訊至該Ap。該 網路基礎結構可以是被中心化或分散,據此該八?區域地維 持該資訊或送出該資訊至該CP。 10 當只有以下的任一條件符合時,該區域無線行動裝置 搜尋額外的通道: a)該行動裝置被程式化在正常區間内來執行該收尋及 該區間之結束到達為止。該搜尋區間可以經由該AP傳輸來 被預先程式化或控制。 15 b)該行動裝置被該^所命令來搜尋額外的通道。此將 典型地發生在當該AP決定一信號交遞可能是需要的。 C)該行動裝置是由該cp或分散wCp邏輯來命令以執行 技尋額外的it道。此搜尋被需要用來支援即時熱點(HotThe MS is trying to join another network, in this case WN2. Once the communication is re-established, the central point logic decides that there is a request (waiting or plug-in) from a user device and that the request work period is automatically rejoined. When the assigned central point logic (CP logic within the AP) is implemented, the AP 64 200307428 发明. Invention description Controls whether the accepted wireless network is notified to the secondary MS by pushing or pulling logic-month Seeking work. In the example of miscellaneous logic, the AP of the pre-serving wireless network starts to notify the AP of the receiving wireless network (and other adjacent wireless networks that may be b) during the request period; the pull logic It means that the information of the AP that received the previous 5 wireless network request was added to the new network's request time. 2 // The hard network control signal delivery with the assistance of the Regional Wireless Mobile Association is shown in Figure 20, which is a simplified flowchart to show how the signal delivery is performed without assistance from the mobile device. . In this implementation, a second receiver within a nearby wireless network measures the reception from the user that needs to be signaled. The second receiver may be a separate receiver or simply include a number of time slot slots allocated for this purpose to the ordinary AP receiver to work. The decision to hand over the mobile device signal from one WN to another WN if 15 is the centralized logic is determined by the cp, or by the service ^ and the APs ready to receive WNs. If this logic determines that the ready-to-receive WNs can & improve communication services, each time it measures one of the communication characteristics of the mobile device to the AP and its loading conditions (one or both), the signal Delivered. 20 The mobile device transmits the signal from WN of the service to the received%! ^ In the following two ways: a) If the mobile device can receive wireless network selection control, its command signal is delivered to the selected ( (Received) WN, including if it is possible to transmit the WN communication parameters to speed up the signal delivery process; 65 200307428 玖, invention description b) If the mobile device cannot accept wireless network selection control, it will give up by denying service Service to WN; then the mobile device tries to log in to another WN 'and only the selected (receiving) WN accepts its request to join the network. 5 3. Mobile device handed over by hard network control signal In this implementation, the wireless mobile device in the area looks for additional channels to measure and determine the communication conditions of other networks and sends this information to the Ap. The network infrastructure can be centralized or decentralized, based on which? Regionally maintain the information or send the information to the CP. 10 The wireless mobile device in the area searches for additional channels when only one of the following conditions is met: a) The mobile device is programmed to perform the search within the normal interval and the end of the interval is reached. The search interval can be pre-programmed or controlled via the AP transmission. 15 b) The mobile device is commanded by the ^ to search for additional channels. This will typically happen when the AP decides that a signal delivery may be needed. C) The mobile device is commanded by the cp or decentralized wCp logic to perform a search for additional it tracks. This search is needed to support real-time hotspots (Hot

Spot)通訊條件之分析,及允許在必要或為測試目的時作 20 WNs的再分配。 ”該CP(或在該AP之内的分散CP邏輯)而後決定那—個 疋°亥订動裝置可以作信號交遞的最佳WN。此決定是基於 °玄被報導的通訊條件,該WNs的下載條件及該行動裳置所 需要的服務。該Ap控制該娜而後被提示。 66 200307428 玖、發明說明 -炎二動,置以參考第Μ圖所示之討論中的兩種方法之 —^號交遞由該服務的娜至該接收的簡·· 、果二仃動裝置可以接受無線網路選擇控制時,其 '作,唬父遞至該被選擇的(接收)WN,包括有如果可 月b傳送4WN通讯參數來加速該信號交遞程序。 )士果°亥订動裳置不能接受無線網路選擇控制時,其 可藉由拒絕服務來放棄該服務簡;而後該行動裝置試著 且錄至另-WN,及只有該被選擇(接收)wn接受它的請求 來加入該網路。 10 4.被硬信號交遞所控制的行動裝置 在本貫施中,該區域無線行動裝置搜尋額外通道是在 當⑴服務的品質漸漸不能滿足,或⑼當其接收一指令來 父遞信號至不同WN的一較好的通道時。 談行動裝置而後執行所有無線網路之搜尋及測量,其 15可接收及決定那一個是最好的網路來加以切換。決定要切 換的最佳WN的條件可以包括有通訊特性的測量及網路的 負載。 該行動裝置而後脫離提供服務給它的該WN。該選擇 被保留給該行動裝置而在脫離該WN之前遞送出一提示, 20 以加速該信號交遞程序。 在由該現在的服務WN脫離之後,該行動装置試著力 入被選擇來作信號交遞之該WN。該系統可以辨識該行動 裝置已經由其現在服務WN脫離至一新的WN作信號交遞及 確保經由該新的WN來重新開始的它的電信工作時期。 67 200307428 玖、發明說明 雖然在該信號交遞方法的較佳實施例中,沒有網路協 助的必要,該選擇可以被保留來實現具有網路協助的如所 述的該信號交遞。網路協助可以被提供於下列之任一中: ⑴可接收的相鄰WNs之辨識,亦即,它們的通訊參數 5之規定,例如為了避免登錄至屬於其他系統之WNs; (11)在負载條件上的資訊及其它相鄰WNs的可使用參 數;及 (出)該服務WN之期望負載條件之資訊。 5.網路命令,行動控制硬信號交遞 10 現吻參考第21圖所示,其為顯示實現當存在於該CP或 該AP中任一的網路控制決定該服務WN不能支援該行動服 務通訊條件。網路控制可能會或可能不會決定具有支援服 務能力的可能鄰近網路;如果此能力被決定,則網路控制 (經由該AP通訊)遞送在可使用WNs之通訊參數上的資訊至 15 該區域無線行動裝置。 該行動裝置而後搜尋可以支援其服務要求的其他的 WNs。在此方法的較佳實施例中,該行動單元時間多工在 該服務WN之内具有其通訊之相鄰網路之搜尋,因此最小 化該信號交遞服務的衝擊。當此不可行時,一選擇性的實 20施例被保流,其中該行動裝置脫離服務網路存取及搜尋相 鄰WNs。在該等實施例中,該行動裝置可以使用由該網路 所提供的資料或用在一任意搜尋中。 基於此搜尋,該行動裝置決定哪一 WN將信號交遞試 著存取此WN。 68 200307428 玖、發明說明 果4行動裝置沒有成功地存取該被選擇的,該 行動存取根據其搜尋結果來嘗試存取下—最佳職,而後 以此類推。 1在存取已經成功地完成之後,,網路確認此是為前一電 5信工作時期的重信開始以石隹保此電信工作時期的繼續。 6·軟信號交遞(Soft handoff) 具有硬信號交遞之上述五個方法中的四個方法也可以 使用軟(soft),,信號交遞。此用語“軟”信號交遞在此是用來 指在當由-職傳遞轉換至另一聰時維持通的的無縫連續 1〇,而不論在該區域無線行動電話之㈣電信卫作_活動 疋如何,包括有那些依據通訊的時間界限連續而定者,都 不會有影響。 如本實施例所支援之軟信號交遞可以在脫離現該現在 服務AP之前’藉由在該行動裝置單元及該第二Ap之間建 !5立通訊來加以實施。在另一種方法中,纟也可以藉由在 WNs之間切換快速到在電信工作時期通訊中沒有中斷來達 成。 軟信號交遞例如可以在當該第二Ap使用設計作為向外 傳达而貫際上是聽取該現在的行動裝置之一時槽時來達成 20 。在相反的例子中,其中該行動裝置單元採取主動,該行 動裝置可以使用為其設計來聽取一主動相鄰系統之時槽。 有許多種方法在以下被討論來在一 WN之内實施軟信 號交遞。 a)沒有區域無線行動裝置協助之軟網路控制信號交遞 69 200307428 玫、發明說明 在此實施中,在相鄰無線網路中的第二接收器測量被 該使用者請求信號交遞之接收。該第二接收器可以是一分 離的接收器或為此目的*酉己在該正常Ap接收器控作計劃中 的一些時槽。 5 網路控制提供該新的服務AP之精準參數至該行動裝置 • 及提供信號交遞控制給該新的服務WN,因此在電信服務 中是沒有中斷的。 i . b)提供有軟網路控制信號交遞協助之行動裝置 在此實施中,該區域無線行動裝置搜尋額外的通道以 10測量及決定其他網路的通訊條件及傳送此資訊改該Ap,其 依據該中心化或分散的基礎架構來區域地維持該資訊或送 出該資訊至該CP。 該HS網路(中心化或分散式)現在基於該行動裝置所提 供的資訊及它的WNs之操作狀態來選擇新的服務WN。 15 網路控制提供該新的服務AP之精確的參數給該行動裝 > 置及提供信號交遞控制給該新的服務WN。 為了確保不被中斷的通訊,該行動裝置現在建立在該 新的服務WN之内的通訊而不會切斷其舊的WN通訊。一旦 m 通訊被建立,該行動裝置脫離已經服務它的WN。一變化 -20實施允許該行動裝置在脫離該WN之前送出一提示。 c)軟信號交遞控制之行動裝置 在此實施中,該區域無線行動裝置搜尋額外的通道在 當⑴服務的品質逐漸不能滿足時,或(ii)當其接收到一命 令來進行信號交遞至在一不同WN中的一較佳通道。 70 200307428 玖、發明說明 / 4仃動4置而後執行所有無線網路的搜尋及測量,而 後〆、可接收及決定那一個是要被切換的最佳網路。決定要 被切換之最佳WN的條件可以包括有被量測的通 或網路負載。 5 忒仃動裝置而後提示網路控來指示它所選的那一個 簡要作為信號交遞及等待一確認或時間結束,其中其與 4新的WN建立通訊而不會切斷現在的。在通訊已㈣ 建立之後"亥行動電話脫離其已經被服務的WN。選擇是 被保留給該行動裝置而在脫離該WN之間送出-提示信號 10 。 "儿 C)網路命令,行«置㈣軟信號交遞 此方法是貫現在當存在於該cp或Ap中的網路控制決 疋違服務WN不能支援該行動服務通訊條件時。網路控制 會或不會決定具有支援服務能力之可能相鄰網路;如果該 15能力被決定,則網路控制(經由該AP通訊)遞送出在該可使 用的WNs之通訊參數上的資訊該區域無線行動裝置。 一但该行動裝置擁有該可能WNs,該程序繼續如前述 例子(行動控制軟信號交遞)。 在非重噠WN之間以相同技術運作之内部熱點信號交 20 遞(Intra Hot Spot handoff)。 現請參考第22圖所示,其為繪示在相同熱點之内的二 個分重疊WN之一簡化概要圖,及其被連接至一單一中心 點100。該熱點可以包括有額外的WNs。當一行動裝置單 元脫離一 WN之通訊時,及在同時,該通訊條件不允許與 71 200307428 玖、發明說明 另一 WN建立通訊,其假設該使用不在該熱點所涵蓋的範 圍之内。其可能是該熱點實際上是涵蓋著著該行動裝置單 元,但是現在不能支援它,然而此例子最好以與該行動裝 置早凡是不在該被涵蓋的區域之内的相同方式來處理。然 5而,對於暫停的時間可以是常數或是可以改變的,該行動 裝置單元之邏輯通訊可以被保持或凍結。該暫停可以因應 電路切換通訊及分封通訊,或聲音及資料,來作不同的定 義。-直到暫停結束之時,與該行動裝置單元的通被假設 是遺失的。 10 如果在當該通訊繼續時,該行動裝置單元存取另一 WN,該熱點最好即刻控制視期為以上所定義的第一信號 交遞例子(在該電信工作位準上,持續的無線網路通訊之 強力切換)。 以不同技術操作,在WNs之間的内部熱點信號交遞 15 #—實施例中也由第22圖來加以描述,其不同點在本 範例中是該WNs以不同的技術來運作,分別例如8〇2ub無 線網路(Wi-Fi)及藍芽。因為不同的的技術被使用,其使得 該等WNs有無重疊變得沒有影響;該假設是該行動裝置單 元在另一 WN建立通訊之前是由一冒2^進行信號交遞。 2〇 較佳地,信號交遞在以上所詳細描述相同的技術操作 該等重疊WNs之間分常相近的方式執行及如上詳細的被加 以描述。 如先前,該行動裝置單元並不被視為如同其已經由一 網路脫離。而是,對於固定或可以調整的暫停的時間長度 72 2〇〇3〇7428 玖、發明說明 而3,该行動裝置單元的邏輯通訊是被保留或凍結,其是 為遠電信工作期間被保持在請求狀態。該暫停可以對於該 乂換電路通訊及對於分封通訊給予不同的定義。在暫停結 束之時,與該行動裝置單元之通訊被假設為遺失。 忒通吼被定義遺失及一新的通訊被再建立。該熱點控 制器(Hot Spot contr〇iier),或在其上的任何連接邏輯,檢 查該使用者行動裝置單元之請求電信工作時期建立通訊。 如果該熱點連接邏輯成功的將該行動裝置單元建立保持的 通Λ (個或夕個電#工作時期)時,該熱點控制即刻視其 1〇為在電信工作時期位準上連續的無線網路通訊之強力切換 的上述定義之該信號交遞的例子,及該電信工作時期或該 等電信工作時期是在很短的時間之内被再建立而不會有資 料遺失。 以相同或不同的技術在重疊熱點之間的内部熱點信號交遞 15 以上所定義的該信號交遞實施例可以被擴充包括有該 行動元存取屬於不同的熱點之_WN,而不是藉由相同熱 點所控制的一新的WN,如在第23圖中所示之重疊wNs及 第24圖所示之非重疊WNs。 在第24圖的例+中(重疊WNs),信號交遞被視為具有 20對在相同熱點中的該等WNs之間的信號交遞所描述者有許 多相同之處。在此上述提到的所有信號交遞技術用到此例 子中以及硬及軟信號交遞。 以相同或不㈣技術在非重疊熱點之間的内部熱點信號交遞 -實施例被提供在熱點是非疊日夺的内部熱點信號交遞 73 200307428 玖、發明說明 之範例。此一範例如第24圖所示,其顯示一熱點控制器 110及二非重疊熱點HS1及HS2。在每一熱點之内是一無線 LAN,分別為WN1及WN2。該熱點可以使用相同或不同的 技術。該實施例以相同的方式操作於在該相同熱點之内的 5非重疊WNs之例子,如以上關於第23圖所述者,及其在當 該行動裝置單元超出了任-觀之涵蓋範圍時藉由通訊的 暫時遺失來被以描述。 上述的解決方案也可以被應用在第24圖的範例中。該 熱點控制器110為控制該等熱點二者之任一實體的或在該 1〇等熱點之間至少交換資訊,其確保該行動裝置單元電信工 作時期保持;東結,也就是說請求中但不遺失。另一方面, 上次服務該行動裝置單元之該熱點維持該等電信工作時期 於康結狀態。維持該電信工作時期打開可以藉由不提供與 該行動裝置之通訊遺施之指示來被加以執行。在該系狀 15内的其他元件可以確保只要沒有此等資訊被提供,及至少 對於該需要的暫停之時間,該等電信工作時期可以真正地 維持在此凍結狀態。 現請參考第24圖所示,其假設該行動裝置乂上一次是 在無線網路wm中受到服務,該無線網路網路侧是位在 20熱點HS1之内。在該行動裝⑽失去在侧之内的通訊或 服務之後,而後當其接著來到在熱點HS2之内的簡a涵蓋 車巳圍之内時,其建立與此無線網路之通訊。與此通訊建立 相關的資訊被遞送至該熱點控制器11〇,無論該控制器是 以中心化或分散處理。一搜尋而後被執行來決定是否有該 74 200307428 玖、發明說明 行動裝置Μ的凍結電信工作期間。如果一凍結電信工作期 間被發現,其被再建立以確保在通訊中沒有遺失。該選擇 的通訊技術支援此信號交遞程序的是與在相同熱點之W N s 之間的信號交遞的例子相同。 5 本實施例因此確保在相同熱點或不同熱點之WNs之間 的傳送維持相同的無縫特性。 以不同技術操作在重疊PLMNs之間的内部PLMN信號交遞 現請參考第25圖所示,其是為說明在重疊PLMNs之間 的信號交遞之一簡化概要圖,其是具有二蜂巢細胞網路。 10 二PLMNs,PLMN1 120及PLMN2 122重疊。每一PLMN分 別具有一存取點124及126,及該存取點最後連接至一共用 邏輯控制器128。 現在參考第25圖所述之一實施例說明一種改善的方法 來提供服務給一行動裝置單元,該行動裝置單元可以接收 15 其現在所處的二PLMNs所涵蓋的區域之内的該二PLMNs之 信號。亦即該二PLMNs使用相同的技術或該行動裝置單元 可以使用兩種技術來連接。 該行動裝置所使用的資料通訊(包括有通過IP VoIP之 聲音)現在是由PLMN1 120來服務。服務的品質變得難以 20 接受,及該行動裝置被指示要進行搜尋,或它自己進行搜 尋,另一個服務。該搜尋的結果指示其要被PLMN2 122所 月艮務。 根據本實施例,該行動裝置單元最好是由該服務控制 器128所服務。該服務控制器典型地是藉由非該PLMN之一 75 200307428 玖、發明說明 不同服務來操作,雖然在一些例子中,其可以事實上屬於 該等PLMN載體之一。 如在後將解釋,實施例將同時提供即時連續的服務, 如果該行動裝置可以配置來與PLMNs二者保持同步通訊時 5 ’及對於該較簡單的例子,該行動裝置離開與該PLMN1之 通訊及接著建立與PLMN2的通訊。 當提供給在PLMN1之内的該行動裝置的服務變得不可 以接爻時,不論是因為不良通訊條件,負載或在pLMN1之 内的其他條件,該行動裝置單元搜尋另一服務。該服務控 1〇制器凍結該行動裝置正在進行的電信工作時期成為一預設 暫停的最長的暫態,其中該暫停可以是固定或可以被設定 的。該行動裝置單元之邏輯通訊因此被保留或凍結,而實 體通Λ疋不月b操作或正在被再建立中。該暫停可以因聲音 或不同型式的資料來作不同的定義。在該暫停結束之前, 15與該行動裝置之通訊是被假設是遺失的。 接下來的選擇性技術被提出來使用在該等pLMNs之間 的信號交遞。 1·在電信工作時期位準上連續地作無線網路通訊之強 力切換 2〇 當PLMN,服務控制器或行動裝置單元辨識通訊條件 疋不可以被接文時,该相對端放棄通訊。由該服務控制器 所放棄的通汛最好疋藉由傳送一控制信號至一行動裝置單 元或藉由中斷該電信工作時期流程來使其讓該行動裝置單 元決定通訊必需要被切換。該行動裝置單元而後可以只要 76 200307428 玖、發明說明 脫離通訊及搜尋另一 PLMN來切換,或者該PLMN1停止服 務來有效地脫離該行動裝置單元。在此二例中,該行動裝 置單元發現另一 PLMN在該區域是存在的及試著加入它的 網路,在此例中是為PLMN2。一但通訊被再建立,該服務 5 控制器辨識有一或多個請求電信工作時期存在於該再連接 的行動裝置單元及該電信工作時期(或該等電信工作時期) 因此被辨識為一自動再加入。 另一實施例使用存在於該PLMN中的服務控制邏輯。 在此例中,接受該行動裝置單元之該PLMN藉由接觸在該 10 區域之内操作的PLMNs來發現該行動裝置單元隨後是否已 經被服務及是否有請求(凍結)電信工作時期;另一方面, 維持一開放工作時期之一 PLMN可以通知鄰近的PLMNs。 2.硬網路控制信號交遞協助之行動裝置單元 在又一實施例中,該行動裝置單元在脫離該PLMN之 15 前搜尋及辨識另一可接受的PLMN,其中該PLMN是現在 可以接受或可供使用的。該行動裝置而後送出通知給該服 務控制器或至另一實體來控制其實體通訊之邏輯。此實體 而後指示該行動裝置切換至該新的PLMN,其中該新的 PLMN是被決定為可接受每一定義的邏輯條件(工作關係, 20 負載條件,行動裝置服務申請合約等)。 該區域無線行動裝置單元在當下列條件之任一符合時 搜尋另一 PLMN所覆蓋的範圍: a)該行動裝置單元被程式化來常態地執行搜尋。該搜 尋區間可以經由服務控制器或通訊邏輯控制器指令來被預 77 200307428Spot) analysis of communication conditions and allow redistribution of 20 WNs when necessary or for testing purposes. "The CP (or decentralized CP logic within the AP) then decides the optimal WN for which a 订 ° subscription device can deliver signals. This decision is based on the reported communication conditions of the Xuan, the WNs Download conditions and the services required for this action. The Ap controls the Na and is prompted. 66 200307428 玖, Invention Description-Yan Erdong, refer to one of the two methods in the discussion shown in Figure M— The number ^ is handed over from the service's Na to the receiving Jane. When the second mobile device can accept the wireless network selection control, its operation, fools the parent to the selected (receiving) WN, including: If the 4WN communication parameters can be transmitted to speed up the signal delivery process.) Shiguo Haihe can not give up the service by denying service when it cannot accept wireless network selection control; then the mobile device Try and record to another -WN, and only the selected (received) wn accepts its request to join the network. 10 4. Mobile devices controlled by hard signal delivery In this implementation, the area is wireless Mobile devices are searching for additional channels at a time when the quality of services is gradual Satisfied, or when it receives a command to parentally transmit a signal to a better channel of a different WN. Talking about a mobile device and then performing all wireless network searches and measurements, it can receive and decide which one is the best The network to be switched. The conditions that determine the best WN to switch may include measurement of communication characteristics and network load. The mobile device then leaves the WN that provides services to it. The choice is reserved for the mobile device Before leaving the WN, a reminder is delivered to speed up the signal delivery process. After leaving the current service WN, the mobile device tries to enter the WN selected for signal delivery. The system can Recognize that the mobile device has switched from its current serving WN to a new WN for signal delivery and to ensure that it resumes its telecommunications work period via the new WN. 67 200307428 发明, invention description Although in the signal delivery method In the preferred embodiment of the invention, there is no need for network assistance, this option can be reserved to enable the signal delivery as described with network assistance. Network assistance can Provided in any of the following: 辨识 Identification of receivable neighboring WNs, that is, their communication parameter 5 requirements, for example, to avoid logging into WNs belonging to other systems; (11) information on load conditions and Available parameters of other adjacent WNs; and (export) information on the expected load conditions of the service WN. 5. Network command, action control, hard signal delivery 10 Now refer to Figure 21, which is a display implementation. The network control existing in either the CP or the AP determines that the service WN cannot support the mobile service communication conditions. The network control may or may not determine a possible neighboring network with support service capabilities; if this capability is It was decided that the network control (via the AP communication) delivered the information on the communication parameters that could use WNs to 15 wireless mobile devices in the area. The mobile device then searches for other WNs that can support its service request. In a preferred embodiment of this method, the time unit multiplexing of the mobile unit has a search of neighboring networks for communication within the service WN, thus minimizing the impact of the signal delivery service. When this is not feasible, an alternative embodiment is guaranteed, in which the mobile device accesses and searches for neighboring WNs off the service network. In these embodiments, the mobile device may use data provided by the network or use it in an arbitrary search. Based on this search, the mobile device decides which WN will hand over the signal and tries to access this WN. 68 200307428 (ii) Description of the Invention If the mobile device does not successfully access the selected one, the mobile access attempts to access the next-best job based on its search results, and so on. 1 After the access has been successfully completed, the network confirms that this is a re-trust of the previous telecom 5 telecom working period and that the telecom working period continues with Shi Wei. 6. Soft handoff (Soft handoff) Four of the above five methods with hard signal handover can also use soft (soft), signal handover. The term "soft" signal delivery is used here to refer to the seamless continuity that is maintained during the transition from on-the-job transfer to another Satoshi, regardless of the telecommunications work of wireless mobile phones in the area Whatever the activity, including those that are continually based on the timeline of communication, will have no effect. The soft signal handover as supported by this embodiment can be implemented by establishing communication between the mobile device unit and the second Ap before leaving the current serving AP. In another method, 纟 can also be achieved by switching between WNs quickly so that there is no interruption in communication during telecommunications work. The soft signal handover can be achieved, for example, when the second Ap uses the design as an outward communication and is traditionally listening to one of the current mobile devices 20. In the opposite example, where the mobile device unit is active, the mobile device may use a time slot that is designed to listen to an active adjacent system. There are many methods discussed below to implement soft signal delivery within a WN. a) Soft network control signal delivery without the assistance of a regional wireless mobile device 69 200307428 Inventory In this implementation, the second receiver in the adjacent wireless network measures the reception of the signal transmission requested by the user . The second receiver may be a separate receiver or for this purpose some time slot in the normal Ap receiver control scheme. 5 Network control provides accurate parameters of the new service AP to the mobile device and provides signal delivery control to the new service WN, so there is no interruption in telecommunication services. i. b) Mobile devices with soft network control signal delivery assistance In this implementation, wireless mobile devices in the area search for additional channels to measure and determine the communication conditions of other networks and send this information to change the Ap, It maintains the information regionally or sends the information to the CP based on the centralized or decentralized infrastructure. The HS network (centralized or decentralized) now selects a new service WN based on the information provided by the mobile device and the operating status of its WNs. 15 The network control provides accurate parameters of the new service AP to the mobile device and provides signal handover control to the new service WN. To ensure uninterrupted communication, the mobile device now establishes communication within the new service WN without cutting off its old WN communication. Once m communication is established, the mobile device is disconnected from the WN that has served it. A variation -20 implementation allows the mobile device to send a reminder before leaving the WN. c) Mobile device for soft signal handover control In this implementation, the wireless mobile device in the area searches for additional channels when the quality of the service is gradually not satisfied, or (ii) when it receives a command to perform signal handover To a preferred channel in a different WN. 70 200307428 发明 、 Explanation of the invention / 4 sets of 4 and then performs the search and measurement of all wireless networks, and then, can receive and determine which is the best network to be switched. Conditions that determine the best WN to be switched may include the traffic or network load being measured. 5 Move the device and then prompt the network controller to indicate which one it chooses. Briefly hand it over as a signal and wait for a confirmation or the end of time, in which it establishes communication with the 4 new WN without cutting off the current one. After the communication has been established, " Hai mobile phone is separated from the WN which has been served. The choice is reserved for the mobile device to send out a reminder signal 10 before leaving the WN. " Child C) Network command, set «Set soft signal delivery. This method is always used when the network control existing in the cp or Ap is determined to violate the service WN cannot support the mobile service communication conditions. The network control may or may not determine possible neighboring networks with support service capabilities; if the 15 capabilities are determined, the network control (via the AP communication) delivers information on the communication parameters of the available WNs Wireless mobile devices in the area. Once the mobile device has the possible WNs, the procedure continues as in the previous example (soft signal handover of action control). The intra-hot spot handoff of non-heavy WNs operating with the same technology. Please refer to FIG. 22, which is a simplified schematic diagram showing one of two sub-overlapping WNs within the same hot spot, and it is connected to a single center point 100. The hotspot may include additional WNs. When a mobile device unit is disconnected from a WN communication, and at the same time, the communication conditions are not allowed to establish communication with 71 200307428, invention description Another WN, it is assumed that the use is not within the scope of the hotspot. It may be that the hotspot actually covers the mobile device unit, but it cannot be supported now, however, this example is best handled in the same way as the mobile device is usually outside the covered area. However, the pause time can be constant or changeable, and the logical communication of the mobile device unit can be maintained or frozen. The pause can be defined differently according to circuit switching communication and packet communication, or sound and data. -Until the end of the suspension, communication with the mobile device unit is assumed to be lost. 10 If the mobile device unit accesses another WN while the communication is continuing, the hotspot is best to immediately control the time horizon as the first signal handover example defined above (at the telecommunication working level, continuous wireless Powerful switching of network communication). Operating with different technologies, the internal hotspot signal delivery between WNs 15 # —The embodiment is also described by Figure 22, the difference is that in this example, the WNs operate with different technologies, such as 8 〇 2ub wireless network (Wi-Fi) and Bluetooth. Because different technologies are used, it has no effect on whether these WNs overlap or not; the assumption is that the mobile device unit will perform signal delivery before another WN establishes communication. 20 Preferably, the signal delivery is performed in the same technical operation as described in detail above. The overlapping WNs are often performed in a similar manner and are described in detail above. As before, the mobile unit is not considered as if it has been disconnected from a network. Instead, for a fixed or adjustable time-out period of 72,200,300,428, 发明, invention description and 3, the logical communication of the mobile device unit is retained or frozen, which is maintained during the telecommunications work period. Request status. The pause can give different definitions to the switching circuit communication and the block communication. At the end of the suspension, communication with the mobile unit was assumed to be lost. Tongtong Rou was defined as missing and a new communication was re-established. The hot spot controller, or any connection logic on it, checks the user's mobile device unit to establish communication during the requested telecommunications work period. If the hotspot connection logic successfully establishes and maintains the communication unit (working period) of the mobile device unit, the hotspot control immediately regards 10 as a continuous wireless network at the level of the telecommunication working period. An example of the handover of the signal as defined above for the strong switching of communications, and the telecommunication working period or such telecommunication working periods are re-established within a short period of time without loss of data. Internal hotspot signal delivery between overlapping hotspots using the same or different technology15 The signal delivery embodiment defined above can be extended to include the mobile meta access to _WN belonging to different hotspots, rather than by A new WN controlled by the same hot spot is the overlapping wNs shown in FIG. 23 and the non-overlapping WNs shown in FIG. 24. In the example of Figure 24 (overlapping WNs), the signal handover is considered to have many similarities as described by the signal handoff between 20 pairs of these WNs in the same hot spot. All the signal handing techniques mentioned above are used in this example as well as hard and soft signal handing. Internal hotspot signal delivery between non-overlapping hotspots with the same or non-overlapping technology-The embodiment is provided with internal hotspot signal delivery when the hotspot is non-overlapping. 73 200307428 玖 Example of invention description. This example is shown in Figure 24, which shows a hotspot controller 110 and two non-overlapping hotspots HS1 and HS2. Within each hotspot is a wireless LAN, WN1 and WN2, respectively. The hotspot can use the same or different technologies. This embodiment operates in the same way as an example of 5 non-overlapping WNs within the same hotspot, as described above with respect to Figure 23, and when the mobile device unit is outside the scope of any view. Described by the temporary loss of communication. The above solution can also be applied to the example in Fig. 24. The hotspot controller 110 is to control any one of these hotspots or to exchange at least information between the hotspots such as 10, which ensures that the mobile device unit's telecommunications working period is maintained; Not lost. On the other hand, the hotspot that served the mobile device unit last time maintained the telecommunication working period in a conscientious state. Keeping the telecommunications working period open can be performed by not providing instructions for communication with the mobile device. The other components in the system 15 ensure that as long as no such information is provided, and at least for the time required for the suspension, these telecommunication work periods can be truly maintained in this frozen state. Please refer to FIG. 24, which assumes that the mobile device was last served in the wireless network wm, and the wireless network network side is located within the 20 hotspot HS1. After the mobile device loses the communication or service in the side, and then when it comes to the area covered by the car in the hot spot HS2, it establishes communication with this wireless network. Information related to the establishment of this communication is delivered to the hotspot controller 11 whether the controller is processed in a centralized or decentralized manner. A search is then performed to determine whether there is a freeze telecommunication operation period of the mobile device M. If a frozen telecommunications operation is discovered during the period, it is re-established to ensure that no communications are lost. The selected communication technology supports this signal handover procedure with the same example of signal handover between W N s in the same hot spot. 5 This embodiment therefore ensures that transmissions between WNs of the same hot spot or different hot spots maintain the same seamless characteristics. The internal PLMN signal delivery between overlapping PLMNs operated by different technologies is shown in FIG. 25, which is a simplified summary diagram for explaining the signal delivery between overlapping PLMNs. It is a network with two honeycomb cells. road. 10 Two PLMNs, PLMN1 120 and PLMN2 122 overlap. Each PLMN has an access point 124 and 126, respectively, and the access point is finally connected to a common logic controller 128. Now referring to an embodiment shown in FIG. 25, an improved method is provided to provide a mobile device unit that can receive 15 of the two PLMNs within the area covered by the two PLMNs that it is currently in. signal. That is, the two PLMNs use the same technology or the mobile device unit can be connected using two technologies. The data communications used by this mobile device (including voice over IP VoIP) are now served by PLMN1 120. The quality of the service became difficult to accept, and the mobile device was instructed to search, or it searched on its own, another service. The result of this search indicates that it is to be serviced by PLMN2 122. According to this embodiment, the mobile device unit is preferably served by the service controller 128. The service controller is typically operated by a service that is not one of the PLMNs 75 200307428 (Invention Description), although in some examples it may actually belong to one of the PLMN bearers. As will be explained later, the embodiment will provide simultaneous and continuous services at the same time. If the mobile device can be configured to maintain synchronous communication with both PLMNs 5 'and for the simpler example, the mobile device leaves communication with the PLMN1. And then establish communication with PLMN2. When the service provided to the mobile device within PLMN1 becomes unreachable, whether due to poor communication conditions, load or other conditions within pLMN1, the mobile device unit searches for another service. The service controller freezes the ongoing telecommunication work period of the mobile device to become the longest transient state of a preset pause, where the pause can be fixed or can be set. The logical communication of the mobile device unit is therefore retained or frozen, while the physical communication is not operating or is being re-established. The pause can be defined differently by sound or different types of data. Prior to the suspension, communication with the mobile device was assumed to be lost. Subsequent selective techniques were proposed to use the signal handover between these pLMNs. 1. Continuously perform strong switching of wireless network communication at the time of telecommunication work. 2 When the PLMN, service controller or mobile device unit recognizes the communication conditions, the opposite end will abandon the communication when it cannot be received. The flood season abandoned by the service controller is best to let the mobile device unit decide that the communication must be switched by transmitting a control signal to a mobile device unit or by interrupting the telecommunication work flow. The mobile device unit can then be switched as long as 76 200307428 发明, description of the invention without communication and search for another PLMN, or the PLMN1 stops service to effectively disconnect from the mobile device unit. In these two cases, the mobile device unit found that another PLMN exists in the area and tried to join its network, in this case it is PLMN2. Once the communication is re-established, the service 5 controller recognizes that one or more requested telecom working periods exist in the reconnected mobile device unit and the telecom working period (or such telecom working periods) is therefore identified as an automatic Join. Another embodiment uses the service control logic present in the PLMN. In this example, the PLMN accepting the mobile device unit discovers whether the mobile device unit has been subsequently served and has requested (frozen) the telecommunication work period by contacting the PLMNs operating within the 10 area; on the other hand A PLMN that maintains an open working period may notify neighboring PLMNs. 2. Mobile device unit assisted by hard network control signal delivery In yet another embodiment, the mobile device unit searches for and identifies another acceptable PLMN before leaving the PLMN, where the PLMN is now acceptable or Available for use. The mobile device then sends a notification to the service controller or to another entity to control the logic of its entity communication. This entity then instructs the mobile device to switch to the new PLMN, where the new PLMN is determined to be acceptable for each defined logical condition (working relationship, 20 load conditions, mobile device service application contract, etc.). The wireless mobile unit in the area searches for the range covered by another PLMN when any of the following conditions are met: a) The mobile unit is programmed to perform the search normally. The search interval can be preset via the service controller or communication logic controller instructions. 77 200307428

10 1510 15

玖、發明說明 先設定或控制。 b)該行動裝置被該服務控制器或通訊邏輯控制器來命 令去搜尋額外的通道。此典型發生在當後者決定信號交遞 是需要的時後。 該服務邏輯(或等效的通訊控制邏輯)而後可以決定該 行動單元是否健康地可以真正地進行信號交遞至另一 PLMN。此一決定是基於該被回覆通訊條件,該參與的 PLMN之負載條件及被該行動裝置所需要的服務。如果此 一信號交遞是被視為值得的時,該PLMN會被提示。 該行動裝置最好是以下列兩種方法中的一種來由該服 務的WN交給該接收的WN : a) 如果該行動裝置可以接受無線網路選擇控制,則其 被命令交出給該被選擇(接收)PLMN。此一信號交遞最好 包括有該PLMN通訊參數之傳送以加速該交出程序; b) 如果該行動裝置不能接受無線網路選擇控制,則由 於該網路拒絕提供服務給它而脫離該服務PLMN。 1 ·硬信號交遞控制的行動裝置 在又一實施例中,該區域無線行動裝置搜尋另一 PLMN覆蓋在當 20 ⑴服務品質逐無被視為不能滿足之時,或 (ii)當其接收來自該服務控制器128或類似的通訊控制 邏輯的一指令要求換到一較佳通訊服務時。 該行動裝置而後執行它可以偵測到所有PLMNs之搜尋 及量測及決定那一個是可以切換的最佳PLMN。決定那一 78 200307428 玖、發明說明 個是要被切換的最佳PLMN之可能條件包括有被測量的通 訊條件特性或可以被該特定PLMN所提供的任何其他相關 的參數。 該行動裝置脫離現在正服務它的該PLMN。在一最佳 5 實施例中,該行動裝置單元在脫離該PLMN之前送出一提 示,以加速該信號交遞程序。 在由該現在服務PLMN脫離之前,該行動裝置單元試 著加入已經被選擇用來信號交遞之該PLMN。該服務控制 器128辨識該行動裝置單元已經由前一服務的PLMN信號交 10 遞至一新的PLMN,典型地是藉由匹配它至如先前的一請 求工作時期,及經由該新的PLMN來重新啟動它的工作時 期。 在上述信號交遞方法之一較佳實施例中,沒有網路協 助是需要的。然而,在另一實施例中,網路協助被使用。 15 網路協助典型地被提供給下列任一: ⑴可接受的相鄰PLMNs之辨識,亦即它們的通訊參數 的提供,例如避免嘗試登錄至因為其它限制在該區域之内 操作但不可以被接受的PLMNs ; (ii) 負載條件之資訊或其他相鄰PLMNs之可使用參數 20 ;及 (iii) 在該服務PLMN之期網負載條件上的資訊。 1.網路命令,行動控制硬信號交遞 一再一實施例包括有一硬信號交遞,其是為一網路命 令但被該行動裝置單元所控制。本實施例是實施於當存在 79 200307428 玖、發明說明 於該服務控制器或其他通訊控制邏輯之該電信工作時期邏 輯決定該服務PLMN不能支援該行動裝置通訊條件時。網 路控制會或不會決定具由支援該服務之能力之鄰近網路之 可能可利用性。如果一能力被辨識,而後該網路控制最好 5傳送與可能的PLMN之通訊參數有關之資訊給該區域無線 行動裝置單元。 該行動裝置而後搜尋可以支援其服務要求的其他 PLMNs。在此發明的較佳實施例中,該行動裝置單元時間 跟著在δ亥服務PLMN之通訊來多工搜尋相鄰的網路,因此 10將該信號交遞服務的影響降到最低。當信號交遞是不可行 時,對於該行動裝置單元之一選擇是脫離服務的pLMN# 取及搜尋取代以相鄰的PLMNs。在這兩個例子中,該行動 電話可以使用先前由該服務控制器網路所提供的搜尋或其 可執行一任意搜尋。 15 基於該搜尋,該行動裝置決定期是否執行信號交遞至 另一PLMN及試著存取此plmN。 如果該行動裝置沒有成功的存取該被選擇的pLMN, 該行動裝置試著存取下一個最佳PLMN如由其搜尋結果所 指示者,以此類推。 20 在存取已經被成功地完成之後,該服務控制器確認該 連接實際上是電信工作時期之除重新啟動及藉此可以减保 5亥電“工作時期的連續。 2·軟信號交遞(s〇ft Handoff) 上述使用硬信號交遞之四個實施例中的三個實施例也 80 200307428 玖、發明說明 可以使用軟信號交遞來實現。如上述,在此所用的該用語 “軟信號« m當由-PLMN轉換至另_ plmn時維持 無縫連續的通訊,而且不會影響到在區域無線行動裝置之 内的電信卫作時期活動,包括有那些依據限時的連續通訊 。也就是說,其存在有限時通訊的限制,例如TCP,及限 時應用’例如’訊號流。關於該軟信號交遞是沒有電信工 作時期被凍結,因此不會感覺到有服務被降級。 ίο 15 由本實%例所支援之軟信號交遞可以藉由在脫離與現 在服務的PLMN之前來建立該行動裝置單元與該第二 PLMN的通訊來加以實現。另一方面,其可以藉由切換 PLMNs快速到在電信工作時期通訊中沒由中斷來達成。為 了支援後者的條件,該服務控制器128可以提出先前資料 給該行動裝置單元。該先前資料可以在信號交遞期間暫時 地維持在該服務中。行動裝置邏輯也可以切換至需要較少 資料之一降級的模式,以在該行動裝置單元之使用者可以 接受情況下延伸為提供連續服務之該緩衝器所支援的時間 如果共同的服務在二PLMN網路之間是可以使用的, 至少在該行動裝置之傳送的方向上是可以使用的,則該信 20號交遞可以是軟的。以使得在該信號交遞真正發生之前, 該候選的PLMN可以使其自身的資源來聽取該行動裝置; 或相反地’當該行動裝置開始負責該軟信號交遞時,而後 仍然連接在該第一 PLMN之該行動裝置單元可以使用其自 身的資源來監視該相鄰的PLMN。 81 200307428 玖、發明說明 許多種方法藉由下列的實施例來代表實施此軟信號交 遞· a) 沒有行動裝置協助的軟網路控制信號交遞 在此實施例中,在該相鄰(候選)PLMN之内的第二接 5 收器在其已經被該行動裝置之服務控制器提示其可能需要 . 被交出之後,其測量來自該行動裝置之接收信號。該第二 接收器可以是一專用接收器,其可以包括有暫時可利用的 # 資源或簡單地為此目的在該PLMN工作計劃之内的一些時 槽。 10 該服務控制器提供該新的PLMN的參數給該行動裝置 單元,使其在服務中不會有中斷。 b) 行動裝置協助軟PLMN信號交遞 一再一實施例包括有由PLMN至另一具有來自該行動 裝置單元協助的PLMN之一軟信號交遞。在此實施例中, 15 該行動裝置搜尋額外的通道來測量及決定其他PLMN之通 ® 訊條件及遞送出該資訊給該服務控制器或類似的通訊控制 邏輯。 該服務控制器或類似的通訊控制邏輯無論是中心化的 或分散的現在基於該行動裝置單元及該等PLMNs之操作狀 ,20 態選擇新的服務PLMN。較佳地,該等PLMNs提供此狀態 資訊給該服務控制器/通訊邏輯來支援該行動裝置。 該服務控制器而後提供該新的服務PLMN之參數給該 行動裝置。再者,如果新的服務PLMN可以接收的話。該 服務控制器提供信號交遞控制/指示給該新的服務PLMN。 82 200307428 玖、發明說明 為了確保不中斷的通訊,該行動裝置單元現在建立在 該新服務PLMN之内的通訊而不會中斷舊的PLMN通訊。 一旦通訊被建立之後,該行動裝置脫離該舊的PLMN。在 變動中,該行動裝置單元在脫離該PLMN之前送出一提示 5 信號。 c)行動裝置控制軟信號交遞 一再一實施例是關於在該行動裝置單元的完全控制下 由一 PLMN至另一 PLMN的軟信號交遞,相較於前一實施 例只是行動裝置協助而已。再該實施例中,該行動裝置單 10 元本身搜尋額外PLMNs之通道在當 (i)服務的品質逐漸不能滿足及其不能在現在的PLMN 之内獲的較佳的服務,或 (Π)其接收到一指令要進行信號交遞至另一PLMN。 該行動裝置而後執行該搜尋及參與測量它可以接收的 15 所有的無線網路。由該測量的結果,其可以決定那一個是 要切換最佳網路。決定要被切換之最佳PLMN之條件包括 有被測量的通訊特性及如果有來自該服務控制器之傳播或 有服務控制器可用時的網路負載。 該行動裝置而後提示該服務控制器/通訊邏輯128,那 20 一個PLMN是它選擇來作該信號交遞及等待一確認或時間 結束,那一點是它建立與該新的PLMN通訊而不會與該現 在的PLMN中斷。在通訊被建立之後,該行動裝置單元脫 離已經服務它的該PLMN。在變動中,該行動裝置在脫離 該PLMN之前送出一提示信號。 83 200307428 玖、發明說明 d)網路命令,行動控制軟信號交遞 一再一實施例包括一網路命令信號交遞,一但被該網 路所命令已經在該行動裝置單元之控制之下完全實施之時 。該方法是在當該行動裝置服務控制/通訊邏輯控制器決 5 定該服務PLMN不能支援該行動裝置服務通訊條件之時被 加以實施。服務控制可能會或不會決定具有支援服務能力 之可能相鄰PLMN網路。如果該能力被加以決定,而後該 •ί 服務控制傳送可使用的PLMN之通訊參數上的資料至該區 域無線行動裝置。 10 —但該行動裝置擁有該候選PLMN,該程序繼續如先 前行動控制軟信號交遞實施例一樣。 在此要注意,上述PLMN觀念可以被擴充至任何型式 的無線廣域網路(WWAN)。此等擴充使用是可預期的包括 在本發明之範圍之内。 15 在非重疊PLMNs以不同技術操作的交互PLMN信號交遞 0 現請參考第26圖,其是為說明具有共同服務/通訊邏 輯控制器之二非重疊PLMN網路之一簡化概要圖。二網路 PLMN1 130及PLMN2 132,每一個具有個別的存取點134 ' 及136。一行動裝置單元138是在該PLMN1覆蓋的邊緣上, - 20 及PLMN2的覆蓋是在附近但沒有任何真正的重疊。為了說 明目的,其可以是該等PLMNs在某些區域具有重疊但不包 括有現在的MS區域,但只要該行動裝置單元138可以到達 時,此不影響到操作。邏輯控器140是位在該PLMN網路二 者可以存取的一點上。 84 200307428 玖、發明說明 在第26圖的例子中處理信號交遞之實施例是該重疊 PLMN信號交遞之一特別說明例子。 一旦該行動裝置MS與一 PLMN脫離通訊時,在此範例 為PLMN1,其工作時期被該服務控制器14〇所保持(凍結) 5 。该服務控制器凍結該正在進行的行動裝置電信工作時期 最常至一預選的最大時間長度。因此,該行動裝置單元之 邏輯通訊將被保持或凍結,而該實際的通訊是被不可以操 作的或正在被建立。該最大的時間長度可以針對聲音及不 同型式的資料來被加以定義。在該暫停結束之時,與該行 10動裝置單元丨38之通訊被假定是遺失的。 在與該現在的PLMN之通訊被遺失之時,典型地在該 行動裝置單元中的每一邏輯,其連續或間續地接觸另一 PLMN服務。當它進入另一 PLMN之覆蓋範圍之内時,在 此例為PLMN2,其與該PLMN2建立通訊,然而在該較佳 15實施例之内,該行動裝置單元在加入該PLMN網路之後提 供它的服務控制器之位址。 δ亥#號父遞程序在此例子中是被實施在該電信工作時 期位準,而不會牵涉到該PLMN。當該行動裝置單元再建 立與該服務控制器140之通訊時,該服務控制器檢查該行 20動裝置仍然請求的任何電信工作時期,亦即,那些暫停已 經結束及沒有被它們所被保持的參與者切斷的電信工作時 期。該唯一的要求是該行動裝置可以經由現在正使用來通 訊的該PLMN達成與該服務控制器的通訊。 85 200307428 玖、發明說明 在無線區域及無線廣域網路之間的信號交遞 更進一步的實施例是有關於自在無線LAN及WAN之間 的信號交遞。更特別地,本發明額外的實施例一方面說明 用於具有存取像是一 PLMN(例如GPRS)之一無線廣域網路 5之雙模式行動裝置的最佳服務的信號交遞,另一方明說明 由一或多個無線區域網路像是802.11 WLAN或一藍芽所支 援之一位置的一熱點(Hot Spot),該區域網路是由一或多 個存取點所服務。此等廣域或區域網路在此是指使用該用 語“通訊模式(communication modes),,。該相意的情節是在 10 第18圖中被加以說明。 如先前,該行動裝置單元經由為服務控制器所設計的 一邏輯實體連接,該服務控制器是負責蕪持該行動通訊信 工作時期。 在此例中,該信號交遞的目的是支援使用在該行動裝 15置之最佳通汛,每一定義的系統服務條件受制於該w WAN 及该WLAN之限制。典型的服務系統條件是最佳服務品質 最低成本,然而其他的條件可以被使用在控制該通訊流向 的该貫體之内·該行動裝置客戶端,該服務控制器及該通 訊網路(該WWAN及該WLAN)。將要瞭解,因為熱點是完 20全在該WWAN之的範圍之内,掉落到臨界水準之下的服務 品質之問題並不會發生。 另一實施例考慮一行動裝置單元具有搜尋另一通訊模 式之旎力的例子,及考慮其再一次具有搜尋另一通訊模式 的能力,但只藉由中斷該現在的通訊模式。 86 200307428 玖、發明說明 使用在現在的較佳實施例之邏輯簡單地藉由優先的自 動與該WLAN連接相關來操作。此意為無論何時該熱點連 接及PLMN連接是可獲得,該熱點連接是較受歡迎的。 在本實施例中,一行動裝置單元在當其偵測到一 5 WLAN存在之時被連接至一 PLMN。當該WLAN服務有優 先權,該行動裝置單元試著連接該WLAN。該行動裝置單 元驗證該WLAN可否使用及經由該WLAN建立與其服務控 制器通訊之方法是如上述及在此不再加以重覆。 在一信號交遞的過程中,該行動裝置單元與該新的網 10 路連接及再一次與該服務控制器建立通訊。另一方面,該 服務控制器建立與該行動裝置單元之通訊。該打開的蜂巢 細胞電信工作時期只要在需要,其被加以維持,及至少直 到該再連接的行動裝置被辨識或執到暫停時間已經達到。 維持該工作時期於一蜂巢細胞資料服務意為該蜂巢細 15 胞資料協定被使用及使用者資料是經由被使用的任何存取 通道,例如在WLAN中,來真正的被傳送。此確保該蜂巢 細胞服務在即使一非蜂巢細胞通道被使用在行動裝置存取 時也不會受到影響。如果加以考慮,實際上被使用的該存 取通道可以是實際賞可以被想到型式的通道,特別是區域 20 LAN可以使用者。為進一步澄清此點,一 GPRS網路之電 信服務使用者可以經由以上討論之一閘道器來存取其蜂巢 細胞服務。在此例中的該服務控制器可以被實現在該 GPRS閘道器之内或是作為一分離的個體。 該行動裝置使用該WLAN存取,只要該WLAN的服務 87 200307428 玖、發明說明 品質是可以接受的,在該行動裝置客戶端之内所定義的每 一條件,該服務控制器或二者。 當該行動裝置偵測到在該WLAN熱點之内的服務品質 疋不可以接受時’或當其服務控制器這樣指示時,其最後 5進行WWAN存取的搜尋。如果通訊仍然在WLAN中可以使 用’該行動裝置可以提示它的服務控制器關於信號交遞及 其搜哥不同存取路徑的需求,包括有WWAN存取。一不同 的實施例具有指示該行動裝置單元應信號交遞至該WWAN 之該服務控制器。其可以是一般性的指令或可以是特定為 1〇期待操作在行動裝置位置所在的區域之内的一 WWAN存取 。由無線區域回到無線廣域網路之信號交遞因此總是或幾 乎總是發生在當該行動裝置的WLAN連接被嚴重的降級或 成乎遺失及該行動裝置偵測可以使用的WWAN(例如, PLMN,GPRS)。大體而言其意為該行動裝置單元是簡單 15 地移出該WLAN的範圍。 在上面經討論的多種信號交遞方法大體上可以使用在 目月’j的WLAN至WWAN例子。五種不同的實施例被討論如 後: 1 ·具有在電信工作位準連續《無線網路之強力切換 20 纟第—實施例’當熱點控制器,服務控制器或行動裝 置辨識通訊條件不能接受時,該相對端放棄通訊。被該服 務控制器所放棄的通訊將是藉由傳送一信號交遞控制信號 至該行動裝置或藉由中斷該電信工作時期流至引起該行動 裝置單元決定通訊必需被切換的該點。該ms而後簡易地 88 200307428 玖、發明說明 放棄通訊及尋找要切換的一 WWAN存取,或在當其不再獲 得來自該WLAN之服務時放棄通訊。在任一例子中,如果 該MS發現在該區域中有一 WWAN活動,其會試著登錄於 其中。一但通訊被再一次建立時,該服務控制器辨識對該 5 行動裝置單元之一或多個請求電信工作時期及該被辨識的 電信工作時期(或多個電信工作時期)是自動地被再加入。 本發明之另一實施例是有關於服務控制邏輯存在於嘎 WLAN熱點之内的例子。在此例中,在該WLAN之内的該 服務控制器是藉由接觸該WLAN控制器來發現該行動裝置 10 是否隨後已經被服務及藉由此無請求(凍結)的電信工作時 期。 2.行動裝置協助應網路控制信號交遞 在本實施例中,該行動裝置在脫離仍連被連接且儘管 在一不可以接受的服務品質下該WLAN之逐漸降級服務之 15 前搜尋及辨識一可接受的WWAN之操作。此行動裝置而後 送出其為該服務控制器所產生的身份資料的詳細細節至該 服務控制器,或至實際控制該實際通訊之邏輯之另一實體 。如果其決定是為可接受的每一定義邏輯條件時(漫遊協 定,負載條件,行動裝置電信服務合約等),該實體而後 20 指示或使該行動裝置切換至該WWAN。 該行動裝置由該服務的WLAN交到該接收WWAN是以 下列兩種方式中的一種: a)如果該行動裝置可以接收無線網路選擇控制,其被 命令交接至該WWAN。較佳地,如果可能且需要,傳送包 89 200307428 玖、發明說明 括有該WWANit訊趣,藉此加速錢程序。 b)如果行動裝置不能接受無線網路選擇控制,其簡 易地藉由中斷服務來脫離該服務的WLAN ;在那時,該行 動裳置單元試著登錄至該WWAN及接觸到它的服務控制邏 5 輯。 — 3·行動裝置控制硬信號交遞 在再實例中,該行動裝置單元搜尋WWAN覆蓋在 > 當: ⑴服務的品質逐漸不能滿足時;及 1〇 (11)當其接收來自該服務控制器或類似通訊控制邏輯 的一私令要彳§號交遞至另一較佳通訊服務時。 该行動裝置而後執行關於其可以偵測的一或多個 WWANs之之—搜尋,及決定那—個是要被切換的最 佳者。優先選擇通常是由其原先電信服務供應者來授與, 15但在該行動客戶專内的特定邏輯或來自該WLAN之控制可 _ 以改變此優先權。 該行動裝置而後脫離已經服務它的,如果其 尚未被切斷。在本實施例之一變化實施中,該行動裝置在 脫離該WLAN之前遞送出一提示以加速信號交遞程序及改 * 20 善系統及電信工作期間控制。 在由該服務WLAN脫離之後,該行動裝置單元試著加 入被選擇來進行信號交遞之。該服務控制器最好 決定該行動裝置單元已經由先前服務的WLAN被信號交遞 至該WWAN,辨識該相應電信工作時期及允許該工作時期 90 200307428 玖、發明說明 或該等工作時期經由新的連接重新開始。 雖然在此信號交遞方法之較佳實施例中並不需網路協 助,其有一額外實施例被提供來實施具有網路協助的信號 交遞。網路協助可以被下列任一提供: 5 ⑴可接受相鄰WWANs之身份,亦即,提供它們的通 訊參數,例如避免試著登錄已知操作在此區域之内但因為 其他因素不可以被接受的WWANs ;发明, description of the invention First set or control. b) The mobile device is instructed by the service controller or communication logic controller to search for additional channels. This typically occurs when the latter decides that signal delivery is needed. The service logic (or equivalent communication control logic) can then determine if the action unit is healthy enough to actually hand over the signal to another PLMN. This decision is based on the response communication conditions, the load conditions of the participating PLMNs, and the services required by the mobile device. If this signal is deemed worthwhile, the PLMN will be prompted. The mobile device is preferably handed over to the receiving WN by the service's WN in one of two ways: a) If the mobile device can accept wireless network selection control, it is ordered to hand over to the device. Select (receive) PLMN. This signal delivery preferably includes the transmission of the PLMN communication parameters to speed up the handover process; b) if the mobile device cannot accept the wireless network selection control, it is removed from the service because the network refuses to provide it to it PLMN. 1 · Mobile device controlled by hard signal handover In another embodiment, the wireless mobile device in the area searches for another PLMN coverage when the 20⑴ service quality is considered as unsatisfactory, or (ii) when it receives When a command from the service controller 128 or similar communication control logic is requested to switch to a better communication service. The mobile device then executes it to search and measure all PLMNs and determine which one is the best PLMN that can be switched. Determining which 78 200307428 发明, invention description The possible conditions for the best PLMN to be switched include the characteristics of the measured communication conditions or any other relevant parameters that can be provided by that particular PLMN. The mobile device is disconnected from the PLMN which is now serving it. In a preferred embodiment, the mobile unit sends a prompt to speed up the signal delivery process before leaving the PLMN. Before leaving the serving PLMN, the mobile device unit attempts to join the PLMN that has been selected for signal delivery. The service controller 128 recognizes that the mobile device unit has passed 10 from the previous serving PLMN signal to a new PLMN, typically by matching it to a previous requested work period, and via the new PLMN. Restarted its working period. In one of the preferred embodiments of the signal handover method described above, no network assistance is needed. However, in another embodiment, network assistance is used. 15 Network assistance is typically provided to any of the following: ⑴ Acceptable identification of adjacent PLMNs, that is, the provision of their communication parameters, such as avoiding attempts to log in to other areas that operate within the area but cannot be Accepted PLMNs; (ii) information on load conditions or other applicable parameters of adjacent PLMNs 20; and (iii) information on the load conditions of the serving PLMN's network. 1. Network Command, Action Control, Hard Signal Handover One embodiment again includes a hard signal handover, which is a network command but is controlled by the mobile device unit. This embodiment is implemented when there is 79 200307428 (the invention description in the service controller or other communication control logic during the telecommunication work period logic determines that the service PLMN cannot support the mobile device communication conditions). Network control may or may not determine the possible availability of nearby networks with the capability to support the service. If a capability is identified, then the network control preferably transmits information related to possible PLMN communication parameters to the wireless mobile unit in the area. The mobile device then searches for other PLMNs that can support its service request. In the preferred embodiment of the present invention, the mobile unit unit time follows the communication of the PLMN service in the delta-hailing service to multiplex search for adjacent networks, so the impact of the signal delivery service is minimized. When signal delivery is not feasible, one option for this mobile device unit is to take out of service pLMN # and search for it instead of using adjacent PLMNs. In both examples, the mobile phone can use a search previously provided by the service controller network or perform an arbitrary search. 15 Based on the search, the mobile device decides whether to perform signal delivery to another PLMN and tries to access this plmN. If the mobile device does not successfully access the selected pLMN, the mobile device attempts to access the next best PLMN as indicated by its search results, and so on. 20 After the access has been successfully completed, the service controller confirms that the connection is actually restarted during the telecommunication operation period and thereby can reduce the continuity of the "operating period." 2. Soft signal delivery ( s〇ft Handoff) Three of the above four embodiments using hard signal handover are also 80 200307428 玖, invention description can be implemented using soft signal handover. As mentioned above, the term "soft signal" used herein «MMaintain seamless and continuous communication when switching from -PLMN to another_plmn, and will not affect the telecommunication satellite activities within the regional wireless mobile device, including those based on time-limited continuous communication. That is to say, there are restrictions on time-limited communication, such as TCP, and time-limited applications' such as signal flow. Regarding the soft signal handover, no telecommunications work period was frozen, so there would be no perceived service degradation. 15 The soft signal delivery supported by this example can be implemented by establishing communication between the mobile device unit and the second PLMN before leaving the PLMN that is currently serving. On the other hand, it can be achieved by switching the PLMNs so fast that there is no interruption in communication during telecommunication work. To support the latter condition, the service controller 128 may submit previous data to the mobile device unit. This previous information can be temporarily maintained in the service during the signal delivery. The mobile device logic can also switch to a mode that requires one of the lesser data to extend the time supported by the buffer to provide continuous services if the user of the mobile device unit can accept it. If the common service is in the second PLMN It can be used between networks, at least in the direction of the mobile device's transmission, then the letter 20 delivery can be soft. So that the candidate PLMN can use its own resources to listen to the mobile device before the signal handover actually occurs; or conversely, when the mobile device starts to be responsible for the soft signal handover, and then still connected to the first The mobile device unit of a PLMN may use its own resources to monitor the neighboring PLMN. 81 200307428 发明, description of the invention Many methods represent the implementation of this soft signal delivery through the following embodiments: a) Soft network control signal delivery without mobile device assistance In this embodiment, in this adjacent (candidate ) The second receiver within PLMN has been prompted by the service controller of the mobile device that it may need it. After being handed over, it measures the received signal from the mobile device. The second receiver may be a dedicated receiver which may include temporarily available # resources or simply some time slots within the PLMN work plan for this purpose. 10 The service controller provides the parameters of the new PLMN to the mobile device unit so that there is no interruption in service. b) Mobile device assists soft PLMN signal handover. One further embodiment includes soft signal handover from a PLMN to another PLMN with assistance from the mobile device unit. In this embodiment, the mobile device searches for additional channels to measure and determine communication conditions of other PLMNs and delivers the information to the service controller or similar communication control logic. Whether the service controller or similar communication control logic is centralized or decentralized, based on the operating status of the mobile device unit and the PLMNs, a new service PLMN is selected in 20 states. Preferably, the PLMNs provide this status information to the service controller / communication logic to support the mobile device. The service controller then provides the parameters of the new service PLMN to the mobile device. Furthermore, if the new service PLMN can receive it. The service controller provides signal handover control / indication to the new service PLMN. 82 200307428 发明. Description of the invention In order to ensure uninterrupted communication, the mobile device unit now establishes communication within the new service PLMN without interrupting old PLMN communication. Once communication is established, the mobile device is disconnected from the old PLMN. In a change, the mobile unit sends a reminder 5 signal before leaving the PLMN. c) Control of soft signal handover by mobile device One embodiment is related to soft signal handover from one PLMN to another PLMN under the full control of the mobile device unit. Compared with the previous embodiment, it is only mobile device assistance. In this embodiment, the mobile device searches for a channel of additional PLMNs by itself when (i) the quality of the service gradually fails to meet the better service that it cannot obtain within the current PLMN, or (Π) its Receive a command to signal delivery to another PLMN. The mobile device then performs the search and participates in measuring all 15 wireless networks it can receive. From the results of this measurement, it can be decided which one is to switch the best network. The conditions that determine the best PLMN to be switched include the measured communication characteristics and the network load if there is propagation from the service controller or when the service controller is available. The mobile device then prompts the service controller / communication logic 128, then 20 PLMNs it chooses to do the signal delivery and wait for a confirmation or time is over, that point is that it establishes communication with the new PLMN without The current PLMN is interrupted. After the communication is established, the mobile unit is detached from the PLMN that has served it. In a change, the mobile device sends an alert signal before leaving the PLMN. 83 200307428 玖. Description of the invention d) Network command, mobile control soft signal handover. One embodiment includes a network command signal handover, but once commanded by the network is completely under the control of the mobile device unit At the time of implementation. This method is implemented when the mobile device service control / communication logic controller determines that the service PLMN cannot support the mobile device service communication conditions. Service control may or may not determine possible adjacent PLMN networks with support service capabilities. If the capability is determined, the service control then transmits the data on the available communication parameters of the PLMN to the wireless mobile device in the area. 10 — But the mobile device owns the candidate PLMN, and the process continues as in the previous mobile control soft signal handover embodiment. It should be noted here that the above PLMN concept can be extended to any type of wireless wide area network (WWAN). Such extended use is anticipated to be included within the scope of the present invention. 15 Interactive PLMN signal delivery with non-overlapping PLMNs operating with different technologies. 0 Please refer to Figure 26, which is a simplified schematic diagram illustrating one of two non-overlapping PLMN networks with a common service / communication logic controller. Two networks PLMN1 130 and PLMN2 132, each with individual access points 134 'and 136. A mobile device unit 138 is on the edge covered by the PLMN1, and the coverage of -20 and PLMN2 is nearby without any real overlap. For illustrative purposes, it may be that the PLMNs have overlap in some areas but do not include the current MS area, but as long as the mobile device unit 138 can be reached, this does not affect operation. The logic controller 140 is located at a point where both of the PLMN networks can access. 84 200307428 发明. Description of the invention The embodiment for processing signal handover in the example in Fig. 26 is one of the special description examples of the overlapping PLMN signal handover. Once the mobile device MS is out of communication with a PLMN, it is PLMN1 in this example, and its working period is maintained (frozen) by the service controller 14 5. The service controller freezes the ongoing mobile device telecommunications operating period, most often to a preselected maximum length of time. Therefore, the logical communication of the mobile device unit will be maintained or frozen, while the actual communication is inoperable or is being established. The maximum time length can be defined for sound and different types of data. At the end of the suspension, communication with the bank's mobile unit 38 was assumed to be lost. When communication with the present PLMN is lost, each logic in the mobile device unit typically contacts another PLMN service continuously or intermittently. When it enters the coverage of another PLMN, in this example PLMN2, it establishes communication with the PLMN2, but within the preferred 15 embodiment, the mobile device unit provides it after joining the PLMN network The address of the service controller. The δH # parent transfer procedure is implemented in this example at the telecommunication working time level without involving the PLMN. When the mobile device unit re-establishes communication with the service controller 140, the service controller checks any telecommunication work periods that the bank 20 mobile device still requests, that is, those suspensions that have ended and have not been maintained by them Participants cut off telecommunications work periods. The only requirement is that the mobile device can communicate with the service controller via the PLMN which is now in use for communication. 85 200307428 (ii) Description of the invention Signal handover between wireless area and wireless wide area network A further embodiment is related to signal handover between free wireless LAN and WAN. More specifically, an additional embodiment of the present invention illustrates on one hand the signal delivery for a dual-mode mobile device with access to a wireless wide area network 5 like a PLMN (e.g. GPRS), and the other explicitly A hot spot in a location supported by one or more wireless local area networks, such as 802.11 WLAN or a Bluetooth, is served by one or more access points. These wide area or local area networks are referred to herein using the term "communication modes,". The plot of interest is illustrated in Figure 10 and Figure 18. As before, the mobile device unit is The service controller is designed to connect with a logical entity. The service controller is responsible for supporting the working period of the mobile communication. In this example, the purpose of the signal delivery is to support the use of the best communication device in the mobile device. In the flood, each defined system service condition is limited by the w WAN and the WLAN. The typical service system conditions are the best service quality and the lowest cost, but other conditions can be used to control the communication flow of the system. Within the mobile device client, the service controller and the communication network (the WWAN and the WLAN). It will be understood because the hotspots are all within the range of the WWAN and fall below the critical level The problem of service quality does not occur. Another embodiment considers an example in which a mobile device unit has the power to search for another communication mode, and considers that it has the ability to search for another communication again. Mode, but only by interrupting the current communication mode. 86 200307428 玖, invention description The logic used in the presently preferred embodiment simply operates by preferentially automatically correlating with the WLAN connection. This means that regardless of When the hotspot connection and PLMN connection are available, the hotspot connection is more popular. In this embodiment, a mobile device unit is connected to a PLMN when it detects the presence of a 5 WLAN. When the The WLAN service has priority, and the mobile device unit attempts to connect to the WLAN. The method by which the mobile device unit verifies whether the WLAN can be used and establishes communication with its service controller via the WLAN is as described above and will not be repeated here. During a signal delivery process, the mobile device unit is connected to the new network 10 and establishes communication with the service controller again. On the other hand, the service controller establishes communication with the mobile device unit. The opening Of the hive cell telecommunications work period is maintained as long as it is needed, and at least until the reconnected mobile device is identified or suspended The maintenance of this working period in a hive cell data service means that the hive cell data protocol is used and user data is truly transmitted via any access channel used, such as in WLAN. This To ensure that the hive cell service will not be affected even when a non-hive cell channel is used in mobile device access. If considered, the access channel that is actually used can be a channel of the actual type that can be thought of, In particular, the area 20 LAN can be used by users. To further clarify this, a telecommunications service user of a GPRS network can access its cellular service via one of the gateways discussed above. The service controller in this example Can be implemented within the GPRS gateway or as a separate entity. The mobile device uses the WLAN to access, as long as the service of the WLAN 87 200307428 玖, description of the invention The quality is acceptable, for each condition defined within the mobile device client, the service controller or both. When the mobile device detects that the service quality within the WLAN hotspot is “unacceptable” or when it is instructed by its service controller, its last 5 searches for WWAN access. If the communication is still in the WLAN, it can be used. The mobile device can prompt its service controller about the requirements of signal delivery and its search for different access paths, including WWAN access. A different embodiment has the service controller instructing the mobile device unit to deliver a signal to the WWAN. It can be a general command or it can be a WWAN access specifically designated to operate within the area where the mobile device is located. Handover of signals from the wireless area back to the wireless wide area network therefore always or almost always occurs when the mobile device's WLAN connection is severely degraded or lost and the mobile device detects the WWAN (e.g., PLMN) that can be used , GPRS). In general, it means that the mobile unit is simply out of range of the WLAN. The various signal handover methods discussed above can generally be used in the WLAN-to-WWAN example of the month. Five different embodiments are discussed as follows: 1. Having continuous "powerful switching of wireless networks 20 in telecom working level"-Embodiment-When the hotspot controller, service controller or mobile device recognizes that the communication conditions are unacceptable At that time, the opposite end gives up communication. The communication abandoned by the service controller will be by transmitting a signal to hand over the control signal to the mobile device or by interrupting the telecommunication working period to the point at which the mobile device unit determines that communication must be switched. The ms is then simply 88 200307428 (ii) Description of the invention Abandon communication and look for a WWAN access to switch, or abandon communication when it no longer obtains services from the WLAN. In either case, if the MS finds a WWAN activity in the area, it will try to log in to it. Once the communication is established again, the service controller recognizes that the requested telecommunication working period for the one or more of the 5 mobile device units and the identified telecommunication working period (or telecommunication working periods) are automatically re-renewed. Join. Another embodiment of the present invention relates to an example in which service control logic exists in a WLAN hotspot. In this example, the service controller within the WLAN discovers whether the mobile device 10 has been subsequently serviced by contacting the WLAN controller and thereby has unrequested (frozen) telecommunication working hours. 2. The mobile device assists in handing over network control signals. In this embodiment, the mobile device is still connected and disconnected from the WLAN, and searches and recognizes before the gradual degradation of service of the WLAN despite an unacceptable service quality. An acceptable WWAN operation. The mobile device then sends the details of the identity data it generated for the service controller to the service controller, or to another entity that actually controls the logic of the actual communication. If its decision is to define logical conditions for each acceptable (roaming agreement, load conditions, mobile device telecommunications service contract, etc.), the entity then instructs or causes the mobile device to switch to the WWAN. The handover of the mobile device from the service's WLAN to the receiving WWAN is in one of two ways: a) If the mobile device can receive wireless network selection control, it is ordered to handover to the WWAN. Preferably, if possible and needed, the transmission package 89 200307428 (ii), the description of the invention includes the WWANit news, thereby speeding up the money process. b) If the mobile device cannot accept the wireless network selection control, it simply disconnects from the service's WLAN by interrupting the service; at that time, the mobile unit attempts to log in to the WWAN and access its service control logic. 5 series. — 3. Mobile device control hard signal handover. In a further example, the mobile device unit searches for WWAN coverage in: > when: 逐渐 the quality of the service gradually fails to meet; and 10 (11) when it receives from the service controller Or a private order similar to the communication control logic is required to be delivered to another preferred communication service. The mobile device then performs one of a search for one or more WWANs that it can detect, and decides which one is the best to be switched. Priority selection is usually granted by its original telecommunications service provider, 15 but specific logic within the mobile client or control from the WLAN can change this priority. The mobile device is then detached from what has served it if it has not been switched off. In a variant implementation of this embodiment, the mobile device sends out a prompt to speed up the signal delivery process and improve the control during system and telecommunication work before leaving the WLAN. After being disconnected by the serving WLAN, the mobile device unit attempts to add to the selection for signal delivery. The service controller preferably decides that the mobile device unit has been signaled to the WWAN from the previously served WLAN, identifies the corresponding telecommunication working period and allows the working period 90 200307428 玖, invention description or such working period via a new Connection restarted. Although network assistance is not required in the preferred embodiment of the signal delivery method, an additional embodiment is provided to implement network-assisted signal delivery. Network assistance can be provided by any of the following: 5 ⑴ Accept the identity of neighboring WWANs, that is, provide their communication parameters, such as avoiding attempts to log into known operations within this area but not acceptable due to other factors WWANs;

(ii) 服務條件之資訊或相鄰WWANs之其他可用參數, 例如,如果在該區域中它們的服務已知或可預期具有問題 10 ;及 (iii) 在該服務WLAN之期望可使用的資訊。 4.網路命令,行動裝置控制硬信號交遞(ii) information on service conditions or other available parameters of neighboring WWANs, such as if their services are known or expected to have problems in the area 10; and (iii) the expected availability of WLANs in that service. 4. Network command, mobile device control hard signal delivery

一再一實施例是有關於一網路命令信號交遞。遵循著 該命令,該信號交遞本身是被該行動裝置單元所控制。該 15 方法是實現在當存在於該服務控制器或其通訊控制邏輯之 中之該電信工作時期控制決定該服務W L A N不能支援行動 服務通訊條件。網路控制可以被使用來決定在該服務區域 之内可能可使用的WWANs,但此並非必要的。如果此一 可使用者被決定,網路控制傳送與候選WWANs相關之通 20 訊參數的資訊給該行動裝置單元。 該行動裝置單元現在搜尋可以支援它的服務請求的任 一 WWAN。在本方法的較佳實施例中,該行動裝置單元分 時多工搜尋它WWANs,而同時試著維持與該WLAN之通 訊以提供它的使用者具有一預定水準的服務,因此將該信 91 200307428 玖、發明說明 號交遞服務影響降到最小。當此不可行時,一變化實施允 許該行動裝置脫離該WLAN存取而只搜尋WWAN服務。在 兩個實施例中,該行動裝置可以使用先前由該服務控制器 網路所提供之資料或進行一任意搜尋。 5 基於該搜尋,該行動裝置決定是否有一位置可以執行 — 信號交遞至該WWAN,及,如果如此,其試著存取該 WWAN。 # 如果該行動裝置不能成功地存取所嘗試的該第一 WWAN,而後其會試著存取在它搜尋結果中的下一最佳 10 WWAN,以此類推。 在存取被成功地完成之後,該服務控制器確認此為前 一電信工作時期或先前多數個電信工作時期的重新開始, 以確保該電信工作時期的繼續。 5.軟信號交遞 15 相關於硬信號交遞之上述四個實施例中的三個實施例 • 也可以被實現來提供軟信號交遞。如上所解釋,在此所使 用之該用語軟信號交遞是指當由該WLAN轉換至WWAN時 維持通訊的無縫連續,而不會影響到在該區域無線行動裝 置之内的電信工作時期活動,包或有那些視限時連續通訊 - 20 者。此差別是其沒有電信工作時期被凍結,及因此服務上 不會有降級被察覺。 被本發明所支援之軟信號交遞可以藉由在脫離與該服 務WLAN之前建立與該WWAN之行動裝置單元通訊,或藉 由加入該WWAN快速到脫離該WLAN時不會在電信工作時 92 200307428 玖、發明說明 期通訊中斷。為了支援後者條件,該服務控制器可以先提 供資料給該行動裝置。該先前提供資料可以被暫存以維持 在信號交遞期間的服務。行動裝置邏輯也可以切換至需要 較少資料之一降級模式,以延長該緩衝器所支援之時間以 5 為該行動裝置單元之使用者可以接收的連續服務。 該軟信號交遞實施例之一變化實施例考慮到該行動裝 置單元可以在脫離該WLAN之前加入該WWAN及有效地進 行該信號交遞。 軟信號交遞可以是網路控制或行動裝置控制的。 10 a)網路控制軟信號交遞 在該網路控制實施例中,該行動裝置單元搜尋它自己 的每一邏輯,或來自該服務/通訊控制WWAN通道之每一 指令,以測量及決定它們的通訊可使用性。可使用性資料 而後被轉送至該服務控制器或類似的通訊控制邏輯,其中 15 如上述可已是中心化或分散的。 該服務控制器或類似通訊控制邏輯現可以基於該行動 裝置單元所提供的資料及該WWANs之操作狀態來選擇該 新的服務WWAN。後者可以藉由該WWANs提供此狀態資 料至該服務控制器或通訊邏輯支援該行動裝置來實現。 20 該服務控制器可以提供該新的服務WWAN之參數給該 行動裝置或信號交遞控制/指示至該被選擇的WWAN。 為了確保不中斷的通訊,該行動裝置單元最好在切斷 它的WLAN連接之前,建立在該WWAN之内的通訊。 b)行動裝置控制軟信號交遞 93 200307428 玖、發明說明 在該行動裝置控制實施中,該行動裝置單元搜尋活動 的WWANs之通道在當 (i) 有指示服務的品質變的不能滿足;或 (ii) 其接收一指令來進行信號交遞至一 WWAN。該後 5 者可能發生在當該服務控制器接受到該WLAN服務要被脫 離之先前通知指示。Another embodiment is related to the delivery of a network command signal. Following this order, the signal delivery itself is controlled by the mobile device unit. The 15 method is to implement control during the telecommunication work period that exists in the service controller or its communication control logic to determine that the service W L A N cannot support mobile service communication conditions. Network control can be used to determine the WWANs that may be available within the service area, but this is not necessary. If this user is determined, the network control sends information about communication parameters related to the candidate WWANs to the mobile device unit. The mobile unit is now searching for any WWAN that can support its service request. In a preferred embodiment of the method, the mobile device unit searches for its WWANs in a time-multiplexed manner, while trying to maintain communication with the WLAN to provide its users with a predetermined level of service. 200307428 发明, the impact of the invention description delivery service is minimized. When this is not feasible, a change implementation allows the mobile device to get out of the WLAN access and only search for WWAN services. In both embodiments, the mobile device may use data previously provided by the service controller network or perform an arbitrary search. 5 Based on the search, the mobile device decides if there is a place to perform — the signal is delivered to the WWAN, and if so, it tries to access the WWAN. # If the mobile device cannot successfully access the first WWAN attempted, it will then try to access the next best 10 WWAN in its search results, and so on. After the access is successfully completed, the service controller confirms that this is a restart of the previous telecommunications work period or the previous majority of telecommunications work periods to ensure that the telecommunications work period continues. 5. Soft Signal Handover 15 Three of the above four embodiments related to hard signal handover • It can also be implemented to provide soft signal handover. As explained above, the term soft signal handover used here refers to maintaining a seamless and continuous communication when switching from the WLAN to the WWAN, without affecting the activities of the telecommunication work period within the wireless mobile devices in the area , Package or those with limited time continuous communication-20 persons. The difference is that no telecommunications work period is frozen and therefore no degradation in service is noticed. The soft signal delivery supported by the present invention can be established by establishing communication with the mobile device unit of the WWAN before leaving the service WLAN, or by joining the WWAN so fast that it will not work in telecommunications when leaving the WLAN. 92 200307428通讯 Communication was interrupted during the description period of the invention. To support the latter condition, the service controller may first provide data to the mobile device. This previously provided information can be temporarily stored to maintain service during the signal delivery. The mobile device logic can also switch to a degraded mode that requires less data to extend the time supported by the buffer. The continuous service that 5 users of the mobile device unit can receive. One variation of the soft signal handover embodiment considers that the mobile device unit can join the WWAN and effectively perform the signal handover before leaving the WLAN. Soft signal delivery can be network-controlled or mobile-controlled. 10 a) Network control soft signal delivery In the network control embodiment, the mobile device unit searches each of its own logic or each command from the service / communication control WWAN channel to measure and determine them. Communication usability. Usability information is then forwarded to the service controller or similar communication control logic, of which 15 can be centralized or decentralized as described above. The service controller or similar communication control logic can now select the new service WWAN based on the data provided by the mobile device unit and the operating status of the WWANs. The latter can be achieved by the WWANs providing this status information to the service controller or the communication logic supporting the mobile device. 20 The service controller can provide parameters of the new service WWAN to the mobile device or signal delivery control / instruction to the selected WWAN. To ensure uninterrupted communication, the mobile device unit preferably establishes communication within the WWAN before disconnecting its WLAN connection. b) Mobile device control soft signal delivery 93 200307428 发明, invention description In the implementation of the mobile device control, the channel of the WWANs search activity of the mobile device unit is when (i) there is an indication that the quality of the service has not been met; ii) It receives a command to deliver a signal to a WWAN. The latter five may occur when the service controller receives a previous notification indication that the WLAN service is to be disconnected.

該行動裝置而後最好執行關於現在可以街收的所有可 用的無線網路之搜尋,及決定那一個網路是要切換的最佳 者。決定那一個是要切換的最佳WWAN之條件可以包括有 10 被測量的通訊特性及網路負載,如果來自該服務控制器之 廣播或可由該服務控制器取得的話。The mobile device would then preferably perform a search for all available wireless networks that are now available on the street, and decide which one is the best one to switch to. The conditions that determine which is the best WWAN to switch over may include 10 measured communication characteristics and network load, if broadcast from the service controller or is available from the service controller.

該行動裝置單元而後提示該服務控制器/通訊邏輯那 一個WWAN已經被選擇用於該信號交遞及等待一確認或一 暫停結束(最小暫停可能為零),其中其建立於該WWAN之 15 通訊而不會與該WLAN中斷。在通訊已經被建立之後,該 行動裝置脫離已經服務它的WLAN。在一變化實施例中, 該行動裝置在脫離該WLAN之前遞送出一提示。 由該WWAN至WLAN的信號交遞反向程序是類似的。 然而,如上述,在此例中,信號交遞不需要是因為來自該 20 WWAN之服務品質已經下降而被啟動。其分別被敘述如下: 該行動裝置需要週期地檢查其對於可使用的WLAN所 定義的邏輯。此是由於該部份的WLAN覆蓋在該WWAN服 務範圍之内。另一方面,一熱點本身可包括有偵測區域行 動裝置傳送之裝置,以自動地引導指令發送至該行動裝置 94 200307428 玖、發明說明 單元以尋找該WLAN。 由該WWAN至該WLAN之信號交遞很少需要損失 WWAN通訊。然而,所討論的該信號交遞技術包括有該行 動裝置加入該WLAN及經由該WLAN在切斷該WWAN(該最 5 終軟信號交遞)之前與服務控制器建立通訊的情形,以及 該行動裝置遺失WWAN連接及在一些時後成功地建力與該 WLAN之通訊以及重新建立其電信工作時期的情形。 該等實施例是包括有,在WLAN與WWAN之間的信號 交遞除了該中間媒體之正常通訊協定的建立之外,必需額 10 外的支援該行動裝置單元被信號交遞的活動。此等支援性 活動可以是一 WWAN著冊或一不同的加密程序,因此被該 WWAN接受的該行動裝置可以依據認證及不能由該 WLANs通訊成續所傳送過來的加密來決定。 在無線廣域網路及網際網路之間的信號交遞 15 信號交遞的概念被擴充到一如GPRS通訊裝置單元之 搭配WWAN行動裝置有時後可以經由網際網路或其他有線 網路來存取該WWAN服務控制器及WWAN服務。 該等實施例包括有同時連接WWAN及網際網路及一連 接被完成而另一連接被脫離的例子。 20 對於上述實施例,變化實施可以使用所有先前的信號 交遞方法。 再者,安裝在該行動裝置客戶端或該服務/通訊控制 器之内的邏輯可以在當WWAN及網際網路連接同時可取得 時提供優先順序。在該較佳實施例中,該網際網路連接是 95 200307428 玖、發明說明 較佳的及該WWAN流量在此例中是經由該網際網路傳送至 該服務/控制器。 適於在該二網路之間切換的錢交遞技術包括有下列·· ,在電么工作時期位準連續的強力切換網路通訊 5 冑該行動裝置單元或該服務控制貞測職服務在- 較高優先順序的網路之内可取得,例如,在上述較佳實例 中的該網際網路,該行動裝置脫離該較低優先順序網路之 IΛ而後w亥行動裝置試著加入其他的網路及與該服務控 制為連接。一但通訊被再建立,該服務控制器邏輯辨識其 10有對該行動裝置單元之一或多個請求電信工作時期,及該 工作時期或該等工作時期是自動地被繼續。 2·>又有行動裝置協助之硬網路控制信號交遞 在違貫施例中’該行動裝置單元經由該二網路建立通 訊而不用控制電信工作時期路徑。該服務控制器可以經由 15較低優先順序網路來控制在服務位準上的脫離,藉此強迫 行動裝置嘗試及經由該較高優先順序網路來建立服務。該 服務控制器而後提示該行動裝置它的決定,及許多變化實 施可以實施如下。 由一網路至另一網路來信號交遞該行動裝置的決定因 20 此只視該服務控制器而定。 a)如果該行動裝置可以接受來自它的服務/通訊控制器 之網路選擇控制,其可以被命令信號交遞至該被選擇(接 收)網路。其可以額外地被送出通訊參數以加速信號交遞 程序。 96 200307428 玖、發明說明 b)如果該行動裝置不能接受無現網路選擇控制,則簡 單的藉由拒絕服務來脫離該服務網路;而強迫它嘗試及登 錄另一網路。 3 ·行動裝置協助硬網路控制信號交遞 5 在此實施中,該區域無線行動裝置搜尋另一服務的可 能性及決定在另一網路之内的通訊條件。其而後送出被該 服務/通訊控制器(SCC)128或140所收集的資訊。 該行動裝置單元搜尋該另一網路在當下列條件之一符 合時: 3 a)該行動裝置單元被程式化來執行正常區間的搜尋。 該搜巡屈間可以被預先程式化或經由來自該scc 128之命 令來控制。 b)—硬體指示被提供來提示一另一服務可以取得。一 範例可以是l〇〇BasedT有效的一硬體指示。 > e)該行動裝置被該3(:(: ι28命令來搜尋另一網路。此 典型地發生在當-外部服務決定由該行動裝置所提供的每 一資訊中的此可取得的可能性。 5亥仃動裝置單元由其前一服務網路信號交遞至該被選 擇的網路以下列兩種方式之一: 1如果該行動裝置可以接受scc控帝j,則其被命令信 戒乂遞至該被選擇網路,包括有如果該通訊參數 送來加速該信號交遞程序; 月匕傳 —)如果忒行動裝置不能接受該無線網路選擇控制,其 猎由中斷該服務來脫離該服務網路。在此例中,該行動裝 97 200307428 玖、發明說明 置試著經由其他的網路連接,直到其接觸到該scc及該電 信工作時期被再建立為止。 4·行動裝置控制硬信號交遞 在行動裝置控制硬信號交遞中,該行動裝置搜尋另一 5 網路連接在當 (0其偵測一較高優先順序網路之可取得, (ii)網路的品質逐漸不能滿足,或 (m)當其接收一命令要信號交遞至上述所定義的另一 網路。The mobile device unit then prompts the service controller / communication logic which WWAN has been selected for the signal delivery and waits for a confirmation or the end of a pause (minimum pause may be zero), which is established on 15 communications of the WWAN Without interruption with that WLAN. After communication has been established, the mobile device is disconnected from the WLAN that has served it. In a variant embodiment, the mobile device sends a prompt before leaving the WLAN. The reverse procedure for handing over signals from this WWAN to WLAN is similar. However, as mentioned above, in this example, the signal delivery need not be initiated because the service quality from the 20 WWAN has been degraded. They are described as follows: The mobile device needs to periodically check its defined logic for available WLANs. This is because that part of the WLAN is covered by the WWAN service range. On the other hand, a hotspot itself may include a device transmitted by a mobile device in a detection area to automatically send instructions to the mobile device. 94 200307428 玖 Description of the invention unit to find the WLAN. Signal delivery from the WWAN to the WLAN rarely requires loss of WWAN communication. However, the signal handover techniques discussed include situations where the mobile device joins the WLAN and establishes communication with the service controller via the WLAN before disconnecting the WWAN (the 5th final soft signal handover), and the action The situation where the device loses its WWAN connection and successfully builds communication with the WLAN sometime later and re-establishes its telecommunications working period. These embodiments include, in addition to the establishment of the normal communication protocol of the intermediate media, the signal delivery between the WLAN and the WWAN must additionally support the activity of the mobile device unit being signaled. These supporting activities can be a WWAN book or a different encryption program, so the mobile device accepted by the WWAN can be determined based on authentication and encryption that cannot be transmitted by the WLANs communication. Signal handover between wireless WAN and Internet15 The concept of signal handover has been extended to a WWAN mobile device such as a GPRS communication device unit, which can sometimes be accessed later via the Internet or other wired networks The WWAN service controller and WWAN service. The embodiments include an example in which the WWAN and the Internet are connected simultaneously and one connection is completed while the other connection is disconnected. 20 For the above embodiment, the variation implementation can use all previous signal delivery methods. Furthermore, the logic installed in the mobile device client or the service / communication controller can provide priority when WWAN and Internet connections are available at the same time. In the preferred embodiment, the Internet connection is 95 200307428 (the invention is preferred) and the WWAN traffic is transmitted to the service / controller via the Internet in this example. The money delivery technologies suitable for switching between the two networks include the following: · Strongly continuous switching of network communications during the working period of the mobile phone 5 胄 The mobile device unit or the service controls the test service -Available within higher priority networks. For example, in the above preferred example of the Internet, the mobile device is disconnected from the IΛ of the lower priority network and then the mobile device tries to add another Network and control of connection to the service. Once the communication is re-established, the service controller logic recognizes that it has requested one or more telecommunication work periods for the mobile device unit and that the work period or those work periods are automatically continued. 2 > Mobile-device-assisted hard-network control signal delivery In a non-compliant embodiment, the mobile device unit establishes communication via the two networks without controlling the path of the telecommunication work period. The service controller can control the disengagement at the service level via 15 lower priority networks, thereby forcing mobile devices to try and establish services via the higher priority network. The service controller then prompts the mobile device for its decision, and many variations can be implemented as follows. The decision to signal the delivery of the mobile device from one network to another is therefore dependent only on the service controller. a) If the mobile device can accept the network selection control from its service / communication controller, it can be commanded to the selected (receiving) network. It can be additionally sent with communication parameters to speed up the signal delivery process. 96 200307428 (ii) Description of the invention b) If the mobile device cannot accept the control of non-existent network selection, then simply deny the service to leave the service network; and force it to try and log in to another network. 3 · Mobile device assists handover of hard network control signals 5 In this implementation, the possibility of wireless mobile devices in the area searching for another service and determining communication conditions within another network. The information collected by the service / communication controller (SCC) 128 or 140 is then sent. The mobile device unit searches the other network when one of the following conditions is met: 3 a) The mobile device unit is programmed to perform a normal interval search. The search room can be pre-programmed or controlled by a command from the SCCC 128. b) —Hardware instructions are provided to indicate that another service is available. A paradigm may be a hardware indication that 100BasedT is valid. > e) The mobile device is searched for another network by the 3 (:(: ι28) command. This typically occurs when the -external service decides this available possibility in every piece of information provided by the mobile device. The mobile device unit is handed over from its previous service network signal to the selected network in one of two ways: 1 If the mobile device can accept the SCCC controller, it is ordered to To send to the selected network, including if the communication parameters are sent to speed up the signal delivery process; month transmission—) If the mobile device cannot accept the wireless network selection control, its hunting is interrupted by the service Disconnect from the service network. In this example, the mobile device 97 200307428 (the invention description) tries to connect via other networks until it contacts the scc and the telecommunications work period is re-established. 4. Mobile device Controlling hard signal handover In mobile device control hard signal handover, the mobile device searches for another 5 network connections when (0 it detects the availability of a higher priority network, (ii) the quality of the network Gradually dissatisfied, or ( m) When it receives a command, the signal is delivered to another network as defined above.

該行動裝置單元執行該搜尋及由其決定信號交遞優先 順序來獲得另一網路取得之測量。在此測量的一範例中, 該行動裝置可以真對-被定義的ip及測量響應的延遲。 该行動裝置而後脫離已經服務它的網路及經由該被選 擇的另一網路來連接。在一變化實施中,該行動裝置在脫 離它現在的服務網路之前遞送出一提示,以加速信號交遞 的程序。 當該行動裝置試著加入它已經選擇作為信號交遞之網 路時,该系統決定該行動裝置已經由其先前服務網路信號 父遞至該新的服務網路,及期望重新開始它可以辨識的既 20存的電信工作時期或多個電信工作時期。 雖然在此信號交遞方法之較佳實施例中沒有網路協助 的需要,一變化實施被包括有以網路協助來執行此信號交 遞。網路協助可由以下任一來提供: (〇可能可取得網路參數之身份,包括有該WWANs之 98 200307428 玖、發明說明 較佳存取通道及支援一較佳分散scc基本架構的網際網路 存取之代理ip ; (η)負載條件或不同存取網路或進入點之其他可取得 參數之資訊(例如,存取網際網路的不同電話號碼”及 5 (iii)該服務網路之期網負載條件上的資訊(例如,對於 一些内部網路連接者) 5.網路命令,行動裝置控制硬信號交遞 網路命令行動裝置控制硬信號交遞是在實現在當該 SCC 128及140中的任一發現通訊條件不能接受或具有需要 1〇對較高優先順序連接之週期性檢查時。網路控制可能會或 可能不會決定具有支援服務能力的可能另一網路。如果此 能力被決定,該SCC 128送出在可取得網路之通訊參數或 網路存取之資訊給該行動裝置單元。 該行動裝置而後搜尋可以支援其服務請求之網路。在 15本方法的較佳實施例中,該行動裝置搜尋另一網路而不會 中斷其現在的連接,因此將信號交遞的影響降到最低。一 範例是要撥許多個網際網路存取號碼來在脫離一無線 GPRS連接之前決定可使用該網際網路。當此是不可行時 ,一選擇提供該行動裝置首先脫離它的服務網路及只在隨 2〇後搜尋另一網路。在該二實施例中,該行動裝置可使用該 網路所先前提供的資料或、進行任意搜尋。 基於此搜尋,該行動裝置決定那一網路要被進行信號 父遞及试者存取此網路。 如果該行動裝置沒有成功存取此被選擇網路,而後其 99 200307428 玖、發明說明 器來控制 康’、搜尋,、Ό果4著存取下—最佳網路,以此類推。此等 開始及接㈣絲冑料好〇可料或預総式之計時 在存取已經完全成功及與該SCC 128及14G之連接已經 5被建理之後,該SCC確認該新的連接是前一電信工作時期 或先前多個電信工作時期的重新開始,最好是以先前所述 之方法之一,藉此確保該電信工作時期的連續。 6·軟信號交遞 具有硬信號交遞之上述先前五個方法中的四個方法也 10可以使用軟信號交遞來實施。如上述,在此使用的該用語 “軟信號交遞”是指當由一網路存取至另一網路之轉換時, 維持通訊的無縫連續,而不會對在該區域無線行動裝置之 内的電信工作時期活動有影響,包括有依據限時連續通訊 者0 15 被本實施例所支援的軟信號交遞可以藉由在脫離與現 在服務網路之前經由一新的服務網路來建立與該sec J28 及140之行動通訊。另一方面,軟信號交遞可以藉由切換 網路連接快速到足以在電信工作時期通訊中沒有中斷來達 成。 20 s午多種方法在後面被討論來實現軟信號交遞。 a)行動裝置協助軟體網路控制信號交遞 在第一軟體信號交遞實施例,該區域無線行動裝置搜 尋另一網路及決定通訊條件。而後傳送可使用資訊至該 SCC 128,140 〇 100 200307428 玖、發明說明 該SCC接、續著作決定那一網路及何時要執行該信號交 遞。其提供信號交遞參數給該行動裝置;及選擇性的提供 信號交遞控制給一代理巧節點或控制在該WWANi内的實 體。在如果有進一步資料建議該連接即將遺失,或由於在 5健全情況下失真的辨識或者支援該通訊之該等實體中的一 個實體即將被被去除的資訊時,該後者可能是需要的,藉 此以確保連續的通訊。因此,為了確保不中斷的通訊,該 行動裝置最好現在建立在該新的服務網路之内的通訊而不 會中斷它現在的網路通訊。一但與新的網路的通訊被建立 10通達該SCC 128及140,該行動裝置脫離已經服務它的網路 。在一變化實施中,該行動裝置在脫離此網路之前送出一 提示。 b)行動裝置控制軟信號交遞 在一第二軟信號交遞實施例中,此時被該行動裝置單 15元控制,該行動裝置搜尋額外的通道在當 (i) 一較高優先順序網路條件被偵測到; (ii) 服務品質漸漸不能滿足;或 (出)當其接收一指令作信號交遞至一另一網路時。 該行動裝置單元本身執行一搜尋,其執行對預先定義 2〇或程式化優先順序的不同網路的測量及將它們分等為決定 的優先順序以選擇-較佳網路來切換。在—變化例中,該 行動裝置不需要搜尋所有可能替換網路,只需要搜尋知 個可使用的網路中最頂端的n個網路。在一特定實施例中 ,㈣。決定要切換的最佳網路之條件可以包括有量測到 101 200307428 玫、發明說明 的通訊特性及網路負載。 该行動單元提示該SCC那一個網路已經被選擇來進行 該信號交遞及等待一確認或暫停時間的結束,其中其建立 與新的網路之通訊而沒有與現在服務的網路脫離。在通訊 5被建立之後,該行動裝置脫離已經服務它的網路。在一變 化實施中,該行動裝置在脫離它現在服務網路之前送出一 提示信號。 c)網路命令,行動裝置控制軟信號交遞 一再一實施例包括有被網路命令但緊接著行動裝置控 10制的一軟信號交遞。該信號交遞是在當該SCC決定該服務 網路不能支援該行動裝置服務通訊條件時被加以執行。該 SCC可能會或可能不會辨識具有支援通訊服務給該行動裝 置之能的可能的替換網路。如果此等能力被辨識,則該 SCC而後送出在因此被辨識網路之通訊參數上的資訊至該 15 行動裝置單元。 一但該行動裝置擁有可能替換網路之存取資料,該程 序繼續如先前實施例之行動裝置控制軟信號线一樣。 信號交遞之結論 上述所有的實施祿提供目前在無線區域網路之内可取 20 的功能。 該軟信號交遞解決方案有可能提供較順暢的連續服務 ’然而因為所有的解決方暗是基於該行動裝置端的分封, 連續服務可以由軟及硬信號交遞實施例來達到。 102 200307428 玖、發明說明 混合網路認證 行動通訊提供一較高層度的個人化。例如,GSM電話 提供一 SIM卡,其提供每一使用者具有與其行動電話服務 供應商之帳號有關的個人化通訊功能。CDMA型的型動裝 5 置有授予類似的個人化功能。根據本發明之實施例,一使 用者被賦予透過任何未加密或加密裝置在他的存款裏設定 一交易’該交易是透過他/她的行動電話被確認或授權。 授權可以如是透過傳送至他的行動電話之一 SMS訊息來要 求他送出一簡單的回覆。另一方面,該使用者可以由他自 10己的行動電話送出一SMS訊息至一專屬他的號碼。該交易 而後對該行動電話帳戶予以收費。不像是信用卡或其他帳 號,對一行動電活帳戶收取費用的一個優點是該電話帳戶 是為在單一時間收取小額費用所專門設立的。該等實施例 因此提供一種在網際網路上提供低成本產品及服務之方法 15 ,先前使其困難的是因為信用卡公司收取小數目費用。 該實施例也被使用來提供在一非認證及一認證裝置之 間的結合。一但該非認證裝置已經被授權,則密秘認證資 料可以被安裝在其中。此認證資料可以進一步被用來提供 在非認證裝置及該PLMN認證裝置之間的鏈結。此方法可 20以被使用來啟動一虛擬SIM(請參考先前敘述)。 現請參考第27圖所示,其是為顯示根據本發明之一第 -較佳實施例之-認證機構的簡化方塊圖。在第27圖中, 其顯示-通訊器11〇’典型地是為—蜂巢細胞網際網路入 口,包括有-SMS入口。選擇性地,此網際網路入口除了 103 200307428 玖、發明說明 該SMS入口之外還可以包括有一 WAP入口,或是取代SMS 入口。該通訊器可以透過一認證鍵結114,像是一 GSM或 CDMA及任何延伸型式的鏈結,與一第一個人化裝置112 來達成通訊。GSM等鏈結提供不只是認證也包括有加密的 5 功能,此功能最好是具備但非本發明的必要條件。一基本 的實施例只需要該傳輸的認證及非拒絕。一般而言,該通 訊是為一數位通訊,像是SMS或GPRS資料訊息,雖然, g 如將在後予以解釋者,聲音也可以被使用。 該通訊最好利用使用者認證,其是GSM或CDMA之一 10 特徵。額外的認證可以藉由一鏈結114及該裝置112額外的 支援加密來被提供。除此之外,其提供一關聯器116,其 可以執行該第一個人化裝置112之正面身份資料,及可以 串聯該認證與一個別的活動或由一伺服器118或類似裝置 經由一非認證鏈結120所接收來自一請求裝置122的活動 15 的請求。在本文中,一非認證鏈結是經由使用者或請求裝 # 置不能正面地辨識之一鏈結,及特別地包括有一般的網際 網路鏈結。不能辨識該請求裝置可能是因為沒有很強的認 證機構像是一 SIM卡,或因為該鏈結本身是未加密的,而 〜 允許且竊聽及仿照或其他理由。 - 20 第27圖的機構因此允許藉由透過一可認證鏈結來請求 一額外的通訊來解決該未保密的問題。一般而言,行動電 話裝置是可被認證的個人化裝置,及藉由透過一行動電話 鏈結來請求一額外行程的通訊,一電信服務供應商可以決 定一請求是真正的。除此之外,該行動電話是與收費帳戶 104 200307428 玖、發明說明 有關,及所提供的服務是允許直接對被辨識的該客戶收費 。如將在後面解釋,該通訊的認證鏈結行程可以在該非認 證行程之前或之後,只要該二行程可以被成功地相關,及 一非詳盡表列的變化程序將在後面被加以描述。除此之外 5 ,許多非認證行程可以與一單一認證行程相關。當然,本 發明並不受限於只用在行動電話及任何透過一保密鏈結使 其不能被仿造來通訊之加密個人化裝置可以被使用。 該關聯器116最好被連接至一認證通訊器123用以指示 該伺服器11 8 —給定的活動請求被核准。另一方面,該認 10 證通訊器123可以傳送該認證至與該非認證裝置有關的一 外部代理伺服器或閘道器。在進一步的變化實施,該認證 通訊器可以傳送該認證至負責管理理請求目的之活動之任 何裝置或網路節點。在一又一實施例中,該認證通訊器 123可以藉由使用對在一路由器上的路徑表之改變來傳送 15 認證。 除了 GSM及CDMA之外,一非完整表列可以用來提供 加密鏈結之的其它系統包括有IS-136,PDC,EDGE, WCDMA,GPRS,Irdium,及 GlobalSta 等。該用語 CDMA 包含有該IS-95表準及其2.5及3G版本,此為熟知相應於 20 1XRTT 及 3XRTT。 現請參考第28圖所示,其是為顯示像是行動電話之一 GSM裝置124。該GSM裝置124包括有一包含有一或多個積 體電路之一 SIM,該等積體電路中的至少一個包括有支援 對該保密鏈結之認證,加密及解密的該個人化資料。該 105 200307428 玖、發明說明 SIM通時辨識該行動電話及使其不會讓其他的裝置來仿造 該電話,因此提供認證及保密存取一相應於該個別行電話 使用者之一收費帳戶。 雖然在上述中,該假設是建立在該訊息傳送本身是為 5 一橐料訊息傳送,但本發明並不以此為限。該保密鏈結 114也被加密用於聲音通訊及其可以提供自動聲音訊息建 立功能於該通訊器1 10中以由預錄訊息區段中建立訊息。 除此之外,其可以提供一人造聲音。無論是那種方法,一 聲音訊息可以透過該保密鏈結被送到該個人化裝置。該聲 1〇音訊息例如可以辨識該交易及可以請求該使用按下一按鍵 ’藉此完成一肯定的回覆。 在本發明之一特別的較佳實施例中,相應於一服務之 可能使用者之一裝置透過該未保密鏈結來請求該服務。該 未保密鏈結可以是任何型式的網路,特別是一開放網路像 15疋I罔際網路,或其他數位或類比網4,及可以凹括有一 LAN,一無線LAN(WLAN),特別地是相應於該IEEE 802.11標準之任何WLAN,包括有8〇211,8〇2,爪, 8〇2.11a...g等等。 在。亥登錄程序期間,其辨識它的保密鏈結,例如藉由 20給定-相關行動電話號碼。該身份資料可以由該儲存記憶 中取出或由該使用者手動輸入。該關聯器116接收該身 二料(例如,行動電話號碼)。其可能需要轉譯該被接收 的身知貝料成為適於該通訊器1〇〇之不同的身份資料,及 作可以藉由該關聯器本身來執行或經由外部轉譯 106 200307428 玖、發明說明 服務來執行,壢如藉由存取—住家位置暫存器(h_ —register:HLR)。該關聯器116而後使用該通訊器 110來以適當的方式與該行動電話接觸連絡…計時器123 被操作,其定該行動電話的使用者—固定時間來回覆及確 認該使用者的身份。除此之外或另_方面,—錯誤計數器 124計次未成功建立認證的次數,在當—臨界次數達到時 停止該認證操作。 在,憂化貫把例中,5亥操作是同時開始於與該祠服器 職觸之非認證裝置122,及與該通訊^職觸之該個人 10化裝置112。該關聯器116在該二通訊之間建立一鏈結,及 對该非認證裝置之服務被授權。確保該使用者認證不被竊 取的種方法疋在回覆時提供一密碼給該可以認證的裝置 112。該密碼而後被該使用者輸入於該非認證裝置a],因 此澄清該非認證裝置122之使用者是與該認證裝置之使用 15者疋相同的及此動作是特意完成的。如果此密碼實施例被 使用,該認證鏈結最號被加密,使得不會曝露該密碼。另 一方面,该密碼只被使用在有限次數,例如只有一此,在 其例中該認證鏈結不需要被加密。 如在後被加以解釋,因為被該非認證裝置使用之登錄 20名稱是該MSISDN,也就是說該行動電話號碼,其可能讓 欺騙的使用者來探知不同的MSISDN值。此探聽可能會使 該行動電話接收到服務的請求,及如果該使用者沒有警覺 到時’該使用者可能不經意地授權服務給那些欺騙的使用 者。该問題可以藉由請求該非加密裝置除了該MSISDN之 107 200307428 玖、發明說明 外再使用一密碼來加以降低。另一種解決方案是由該行動 裝置單元來開始§亥§忍證序列·該使用者送出一 sms至該通 Λ器,其接著以對該電信工作時期之一暫時密碼來響應給 忒工作時期。該使用者使用該pDA或其它非認證裝置透過 5網際網路來連接至該伺服器118,及進入他的使用者名稱 • · (MSISDN)及該暫時的密碼。另一方面,該通訊器提供一 暫時識別號及密碼,以確保使用者匿明及該使用者進入此 Φ 暫時識別號及密語對。 由該認證裝置至該非認證裝置之識別號的傳送可以是 10手動或是經由一些區域有線或無線通訊鏈結。 忒相關器或該通訊器確認被提供的該存取資料,像是 該暫時密碼或身份資料,在當與該MSISDN相關及服務被 授權時。 較佳地,在此一實施例中,SMS傳輸在該行動終端機 15 (個人數位助理機,膝上型電腦等)被啟動之前被完成。 ® 在對上述者的進一步變化實施中,該SMS可以包括有 一準隨機數,其中該使用者需要複製或被傳送至他的非認 證裝置還完成該認證,藉此降低竊取認證的危險。該被請 • -γ 求的活動可以是一網際網路瀏覽活動。與一收費帳號相關 "20的5亥保岔鏈結之使用允許小數目的被收費,迄今網際網路 的一問題是傾向於回覆在信用卡上。該被請求活動可以是 該瀏覽本身,或其可以包括有與像是購買,使用付費服務 等有關的活動。因此,該使用者可以到網路書局或類似者 藉由輸入他的行動電話號碼而不是他的信用卡號碼來完成 108 200307428 玖、發明說明 蹲物。其而後在他的行動電話上收到一訊息及回覆該訊息 來疋成該筆交易。該網際網路活動可以另外是FTp型活動 或不會牽涉倒瀏覽之活動,像是連續資料申請,電子郵件 等。 5 在另一實施例中,該非認證裝置122可以是一信用卡 或一智慧卡,及該被請求活動可以是銷售活動點,像是使 用-atm。在此連接中,可以參考第29圖,其是為顯示具 有一記憶體單元130之一卡片128之簡化圖,像是一智慧卡 或信用卡。該記憶體單元130可以是在一智慧卡上的一積 1〇體電路之一部份,或其可以是如在傳統信用卡上的一磁條 。較佳地,該記憶體單元130包括有該標準的交易資訊像 是一 ATM號碼,及除此之外再一組進一步號碼來允許該行 動電話號碼的認證,然而此有一缺點是一錯誤的電話號碼 可能被輸入。在另一實施例中,該進一步號碼是該行動電 15話號碼之一編碼版本。該編碼版本是一加密版本,其中一 力月b被用來解选邊電話號碼。另一方面,一密碼可以被使 用,其是為在一對照表中的一簡單的帳號。後者版本特別 具有保密的效果,因為電腦駭客如果知道在該對照表上的 碼時,其只可以替代一不同的電話號碼。該使用者以一般 20的方式插入它的信用卡至該ATM中。該卡片傳送該使用者 的電話號碼,或相對於電話號碼之一密碼,其被使用來產 生一電話撥叫至該使用者的行動電話。該使用者藉由回覆 該行動電話或輸入該ATM—組要被用在該通訊中的特別產 生的PIN號碼。在該較佳實施例中,該使用同時回覆及輸 109 200307428 玖、發明說明 入該PIN號碼。 該被請求活動可以如存取一網路,也就是說,該使者 請求存取一LAN或存取該網際網路或類似者。其因此使其 可以提供漫遊網際網路,及在當旅行或不在其自己的網際 網路供應商的相鄰區之内使用區域資源來登錄至該網際網 路的能力。 ·, ίο 特別地,存取可能被請求的該網路可以是透過一無線 LAN存取點或紅外線存取點或透過藍芽存取點之一網路。 無線LAN或紅外線或藍芽是要提供對所有在該等存取點鄰 近的所有的裝置具有彈性網路存取,及本實施例允許可能 的使用者要被辨識及對該服務被收費。 15 在更進一步的實施例中,在該使用者已經傳送該準隨 機數字或該密碼至他自己的非認證裝置之後,該數字或密 語可以被使用多次來授權一活動。因為該數字或密碼多次 的傳送被曝露在重播的攻擊,該多次授權可以該準數字/ 密碼作為對一挑戰回應協定之一種子鑰匙。例如,如果一 虛擬SIM被安裝在該非認證裝置中,而後該虛擬SIMiKi( 請參考上面對SIM的描述)可以被設定成為該準數字/密碼 (Ki是被始用在SRES之產生,及Kc來自RAND)。 - 20 另一具有較高保密水準之變化例是要使用上述的準數 字/密碼來認證一保密通道的建立(藉由Ipsec,tls,SSL ’ SSH等)。該鑰匙Ki可以在該關聯器與該非認證資料之間 被傳送,及而後可以被使用作為該挑戰響應執行之種子。 如上所討論,該通訊器最號獲得一電話號碼,無論是 110 200307428 玖、發明說明 簡明文字,或是來自該非認證裝置之該電話號碼之編码或 加密版本。該號碼最好被使用來建立與該保密行動裝置之 通訊。然而,在那些實施例中,通訊是由該保密行動裝置 所啟動,該電活號碼最好被使用在連結已經被建立的今保 5 费及非認證連結。 根據上述,該非認證裝置可以是一信用卡,一智慧卡 ,一紅外線裝置’一藍芽裝置,一 pda,一耐用電腦,一 行動電腦,一固定電腦,及電腦網路或任何可以使用紅外 線或藍芽或無線LAN或HomeRF或有線或其他型式的通訊 〇 來建立一通訊。 現請參考第30圖所示,其是為顯示根據本發明之驗證 裝置之再一實施例之一簡化方塊圖,其元件被更詳細的顯 不。像是一 PDA 130之一非認證裝置透過一網路存取點無 線通訊至一 LAN/WAN 134,其本身可以是有線或是無線的 5亥LAN可以直接(或間接)被連接至一蜂巢細胞網際網路 認證入口 136,及可以是提供該使用者存取該網際網路或 任何期他網路或服務之裝置。該入口 ι36最好是讓該pdA 130作為可以正常登錄之一標準網際網路認證裝置。該登 錄程序可以是手動執行或在需要時自動執行。該使用者的 行動電活號碼可以被用來作為登錄使用者名稱或作為該登 錄程續的一分離部份。該入口開始執行一計時器在一預定 時間限制後去暫停該認證。選擇地,該入口也可以設定一 計數器來限制登錄嘗試的次數以降低被駭客入侵的次數。 遠入口被直接或間接連接至一短訊息服務中心SMS-C 138 111 200307428 玖、發明說明The mobile device unit performs the search and determines the signal delivery priority order to obtain measurements obtained by another network. In one example of this measurement, the mobile device can be true-to-defined ip and measure the response delay. The mobile device then disconnects from the network that has served it and connects via the selected other network. In a variant implementation, the mobile device sends out a reminder to speed up the signal delivery process before leaving its current service network. When the mobile device tries to join the network it has chosen to hand over as a signal, the system determines that the mobile device has been handed over from its previous serving network signal parent to the new serving network, and expects to restart that it can recognize 20 existing telecom working periods or multiple telecom working periods. Although there is no need for network assistance in the preferred embodiment of this signal delivery method, a variation implementation is included to perform this signal delivery with network assistance. Network assistance can be provided by any of the following: (0 identity of network parameters may be obtained, including 98 200307428 of the WWANs, invention description better access channel, and Internet supporting a better decentralized SCCC infrastructure Accessing proxy ip; (η) load conditions or other accessible parameters of different access networks or access points (e.g. different telephone numbers to access the Internet "and 5 (iii) the service network Information on the load conditions of the future network (for example, for some internal network connections) 5. Network command, mobile device control hard signal delivery Network command mobile device control hard signal delivery is implemented when the SCC 128 and Any one of 140 finds that communication conditions are unacceptable or have a periodic check that requires 10 higher priority connections. Network control may or may not determine a possible alternative network with support service capabilities. If this The capability is determined, and the SCC 128 sends information on the available network communication parameters or network access to the mobile device unit. The mobile device then searches for information that can support its service request. Network. In a preferred embodiment of this method, the mobile device searches for another network without interrupting its current connection, thereby minimizing the impact of signal delivery. An example is to dial many Internet A network access number to decide to use the Internet before disconnecting from a wireless GPRS connection. When this is not possible, one option is to provide the mobile device first to disconnect from its service network and only search for another after 20 minutes. A network. In the two embodiments, the mobile device can use the data previously provided by the network or perform any search. Based on this search, the mobile device determines which network is to be signaled and tested. If the mobile device does not successfully access the selected network, then the 99 200307428 玖, invented the explainer to control Kang ', search, and fruit 4 access-the best network And so on. The start and connection are expected. The expected or pre-timed timing is that after the access has been completely successful and the connection to the SCC 128 and 14G has been established, the SCC confirms that New connection is the previous The resumption of the telecommunications working period or previous multiple telecommunications working periods is best done in one of the previously described ways to ensure the continuity of the telecommunication working period. 6. Soft signal handovers with hard signal handovers Four of the five methods can also be implemented using soft signal handover. As mentioned above, the term "soft signal handover" as used herein refers to the conversion when accessed from one network to another. In order to maintain the seamless and continuous communication, it will not affect the activities during the telecommunication work period of the wireless mobile devices in the area, including continuous communication based on the time limit. 0 15 The soft signal delivery supported by this embodiment can Mobile communications with the sec J28 and 140 are established through a new service network before leaving and the current service network. On the other hand, soft signal handover can be achieved by switching the network connection fast enough to enable communication without interruption during telecommunication operations. 20 s noon methods are discussed later to implement soft signal handover. a) Mobile device assists software network control signal delivery In the first software signal delivery embodiment, the wireless mobile device in the area searches for another network and determines communication conditions. Then send usable information to the SCC 128, 140 〇 100 200307428 玖, description of the invention The SCC connection and continuation works determine which network and when to perform the signal delivery. It provides signal handover parameters to the mobile device; and optionally provides signal handover control to a proxy node or an entity controlled within the WWANi. The latter may be needed if there is further information suggesting that the connection is about to be lost, or due to distorted identification under 5 robust conditions, or that one of the entities supporting the communication is about to be removed, thereby To ensure continuous communication. Therefore, in order to ensure uninterrupted communication, the mobile device preferably establishes communication within the new service network without interrupting its current network communication. Once communication with the new network is established 10 access to the SCC 128 and 140, the mobile device is disconnected from the network that already serves it. In a variant implementation, the mobile device sends a reminder before disconnecting from the network. b) The mobile device controls the soft signal handover in a second soft signal handover embodiment, which is now controlled by the mobile device for 15 yuan. The mobile device searches for additional channels when (i) a higher priority network Road conditions are detected; (ii) the service quality is gradually not being met; or (out) when it receives a command as a signal for delivery to another network. The mobile device unit itself performs a search, which performs measurements on different networks with pre-defined 20 or stylized priorities and categorizes them into a determined priority order to switch between select-better networks. In a variation, the mobile device does not need to search all possible replacement networks, it only needs to search the top n networks among the available networks. In a specific embodiment, ㈣. The conditions for determining the best network to switch to may include the measurement of 101 200307428, the communication characteristics of the invention, and the network load. The mobile unit indicates that the SCC network has been selected for the signal delivery and waits for the end of a confirmation or pause time, in which it establishes communication with the new network without disconnecting from the network currently serving. After communication 5 is established, the mobile device is disconnected from the network that has served it. In a variant implementation, the mobile device sends an alert signal before leaving the network it is currently serving. c) Network command, mobile device controls soft signal handover. One embodiment includes a soft signal handover commanded by the network but followed by the mobile device. The signal delivery is performed when the SCC determines that the service network cannot support the mobile device service communication conditions. The SCC may or may not identify possible alternative networks with capabilities to support communication services to the mobile device. If these capabilities are identified, the SCC then sends information on the communication parameters of the identified network to the 15 mobile device units. Once the mobile device has access data that could replace the network, the procedure continues as the mobile device controls the soft signal line of the previous embodiment. Signal Handling Conclusions All of the above implementations provide features currently available within wireless LANs. The soft signal handover solution may provide smoother continuous services. However, since all the solutions are based on the decapsulation of the mobile device side, continuous service can be achieved by the soft and hard signal handover embodiments. 102 200307428 发明. Description of the invention Hybrid network authentication Mobile communication provides a higher level of personalization. For example, a GSM phone provides a SIM card, which provides each user with a personal communication function associated with his mobile phone service provider's account. CDMA-type mobile devices have similar personalization features. According to an embodiment of the invention, a user is given the ability to set a transaction in his deposit via any unencrypted or encrypted device ', the transaction being confirmed or authorized via his / her mobile phone. Authorization can be as simple as asking him to send a simple reply via an SMS message sent to one of his mobile phones. On the other hand, the user can send an SMS message from his own mobile phone to a unique number for him. The transaction then charges the mobile phone account. Unlike a credit card or other account, one advantage of charging a mobile account is that the phone account is specifically set up to charge a small amount of money at a single time. These embodiments therefore provide a way to provide low-cost products and services on the Internet 15, which previously made it difficult because credit card companies charge small amounts of fees. This embodiment is also used to provide a combination between a non-authenticated and an authenticated device. Once the non-authenticated device has been authorized, secret authentication information can be installed in it. This certification data can be further used to provide a link between the non-certified device and the PLMN certified device. This method can be used to activate a virtual SIM (please refer to the previous description). Reference is now made to Fig. 27, which is a simplified block diagram showing a certification authority according to a first preferred embodiment of the present invention. In Fig. 27, it is shown that the communicator 110 'is typically a honeycomb cell Internet portal, including an SMS portal. Optionally, this Internet portal may include a WAP portal in addition to or instead of 103 200307428 (Invention Note) The SMS portal. The communicator can communicate with a first personalization device 112 through an authentication key 114, such as a GSM or CDMA and any extended type of link. Links such as GSM provide not only authentication but also encryption 5 functions. This function is preferably provided but not a necessary condition of the present invention. A basic embodiment only requires authentication and non-rejection of the transmission. Generally speaking, this communication is a digital communication, such as an SMS or GPRS data message, although, as will be explained later, voice can also be used. The communication preferably utilizes user authentication, which is one of the characteristics of GSM or CDMA. Additional authentication can be provided by a link 114 and the device 112 with additional support for encryption. In addition, it provides a correlator 116 that can perform the positive identity information of the first personalization device 112, and can connect the authentication with another activity or a server 118 or similar device via a non-authentication chain The node 120 receives a request for activity 15 from a requesting device 122. In this article, a non-authenticated link is a link that cannot be positively identified by the user or the requesting device, and specifically includes a general Internet link. The inability to identify the requesting device may be because there is no strong certification authority like a SIM card, or because the link itself is unencrypted, and ~ allowed and eavesdropped and imitated or other reasons. The mechanism of Figure 27 therefore allows the unclassified problem to be solved by requesting an additional communication through an authentiable link. In general, a mobile phone device is a personalizable device that can be authenticated, and by requesting an extra trip of communication through a mobile phone link, a telecommunications service provider can determine that a request is genuine. In addition, the mobile phone is related to the charging account 104 200307428, invention description, and the service provided is to allow the identified customer to be charged directly. As will be explained later, the communication link journey of the communication may be before or after the non-certification journey, as long as the two journeys can be successfully related, and a non-exhaustive list of changes will be described later. Beyond this, many non-certified trips can be associated with a single certified trip. Of course, the present invention is not limited to use in mobile phones and any encrypted personalization device that cannot be imitated to communicate through a secure link. The correlator 116 is preferably connected to an authentication communicator 123 to instruct the server 11 8-a given activity request is approved. On the other hand, the authentication communicator 123 may transmit the authentication to an external proxy server or gateway related to the non-authentication device. In a further variation implementation, the authentication communicator may send the authentication to any device or network node responsible for managing the activities of the request purpose. In yet another embodiment, the authentication communicator 123 may transmit 15 authentications by using changes to the routing table on a router. In addition to GSM and CDMA, a non-complete list of other systems that can be used to provide encryption links includes IS-136, PDC, EDGE, WCDMA, GPRS, Irdium, and GlobalSta. The term CDMA includes the IS-95 standard and its 2.5 and 3G versions, which are well known and correspond to 20 1XRTT and 3XRTT. Please refer to FIG. 28, which shows a GSM device 124 like one of the mobile phones. The GSM device 124 includes a SIM including one or more integrated circuits, and at least one of the integrated circuits includes the personalized data supporting authentication, encryption, and decryption of the secure link. The 105 200307428 发明, description of the invention SIM identifies the mobile phone and does not allow other devices to imitate the phone, so it provides authentication and confidential access to a charging account corresponding to one of the individual phone users. Although in the above, the assumption is based on the fact that the message transmission itself is a message transmission, the present invention is not limited to this. The security link 114 is also encrypted for voice communication and can provide an automatic voice message creation function in the communicator 110 to create a message from a pre-recorded message section. In addition, it can provide an artificial sound. Either way, an audio message can be sent to the personalized device through the secure link. The 10-tone message can, for example, identify the transaction and can request the use of a button press to complete a positive response. In a particularly preferred embodiment of the present invention, a device corresponding to a possible user of a service requests the service through the unsecured link. The unsecured link can be any type of network, in particular an open network like 15 疋 Internet, or other digital or analog networks4, and can include a LAN, a wireless LAN (WLAN), In particular, any WLAN corresponding to the IEEE 802.11 standard includes 80211, 802, claw, 802.11a ... g, and so on. in. During the login process, it identifies its secret link, for example by 20 given-related mobile phone number. The identity information can be retrieved from the storage memory or manually entered by the user. The correlator 116 receives the data (e.g., a mobile phone number). It may need to translate the received personal information into different identity information suitable for the communicator 100, and it can be performed by the correlator itself or through external translation 106 200307428, invention description service to Implementation, such as by accessing-home location register (h_ — register: HLR). The correlator 116 then uses the communicator 110 to contact the mobile phone in an appropriate manner ... The timer 123 is operated, which determines the user of the mobile phone-to reply and confirm the identity of the user at a fixed time. In addition or in other respects, the —error counter 124 counts the number of times that authentication has not been successfully established, and stops the authentication operation when the —critical number is reached. In this example, the operation of Wu Hai is started at the same time with the non-authentication device 122 that is in contact with the temple server and the personal device 112 that is in contact with the communication server. The correlator 116 establishes a link between the two communications and authorizes service to the non-authenticated device. One way to ensure that the user authentication is not stolen is to provide a password to the authenticateable device 112 in response. The password is then entered by the user in the non-authentication device a], so it is clarified that the user of the non-authentication device 122 is the same as the user of the authentication device 15 and this action is intentionally completed. If this password embodiment is used, the authentication link number is encrypted so that the password is not exposed. On the other hand, the password is only used a limited number of times, such as only one, in which case the authentication link need not be encrypted. As explained later, because the login 20 name used by the non-authenticated device is the MSISDN, that is, the mobile phone number, it may allow a spoofed user to detect different MSISDN values. This snooping may cause the mobile phone to receive a service request, and if the user is not alert, the user may inadvertently authorize the service to those fraudulent users. The problem can be reduced by requesting the non-encrypted device to use a password in addition to the MSISDN 107 200307428 (invention description). Another solution is for the mobile device unit to start the §Hai§tolerance sequence. The user sends an sms to the communication device, which then responds to the 忒 working period with a temporary password for one of the telecommunication working periods. The user uses the pDA or other non-authenticated device to connect to the server 118 via the 5 Internet, and enters his username • (MSISDN) and the temporary password. On the other hand, the communicator provides a temporary identification number and password to ensure that the user is obscured and the user enters the Φ temporary identification number and secret phrase pair. The transmission of the identification number from the authentication device to the non-authentication device can be manual or via some regional wired or wireless communication links. The correlator or the communicator confirms that the access information, such as the temporary password or identity information, is provided when the MSISDN related and service is authorized. Preferably, in this embodiment, the SMS transmission is completed before the mobile terminal 15 (personal digital assistant, laptop, etc.) is activated. ® In a further implementation of the above, the SMS may include a quasi-random number, in which the user needs to copy or be transmitted to his non-authenticated device to complete the authentication, thereby reducing the risk of stealing the authentication. The requested event can be an Internet browsing event. The use of the 5 Haibao fork link associated with a toll account " 20 allows a small number of tolls. One problem with the Internet so far has been the tendency to reply to credit cards. The requested activity may be the browsing itself, or it may include activities related to purchases, use of paid services, and the like. Therefore, the user can go to an online bookstore or the like and complete it by entering his mobile phone number instead of his credit card number. 108 200307428 发明, invention description Squat. He then received a message on his mobile phone and responded to the message to complete the transaction. The Internet activity can be another FTP-type activity or an activity that does not involve backward browsing, such as continuous data application, email, etc. 5 In another embodiment, the non-authentication device 122 may be a credit card or a smart card, and the requested activity may be a point of sale activity, such as using -atm. In this connection, reference may be made to FIG. 29, which is a simplified diagram of a card 128 having a memory unit 130 for display, such as a smart card or credit card. The memory unit 130 may be part of a 10-body circuit on a smart card, or it may be a magnetic strip such as on a conventional credit card. Preferably, the memory unit 130 includes the standard transaction information such as an ATM number, and a further set of numbers in addition to allow authentication of the mobile phone number. However, this has the disadvantage of a wrong phone number. The number may be entered. In another embodiment, the further number is an encoded version of one of the mobile phone number. The coded version is an encrypted version, in which one month b is used to deselect the side phone number. On the other hand, a password can be used, which is a simple account number in a lookup table. The latter version is particularly confidential because if a computer hacker knows the code on the lookup table, it can only substitute a different phone number. The user inserts his credit card into the ATM in the usual way. The card transmits the user's telephone number, or a password relative to the telephone number, which is used to generate a telephone call to the user's mobile phone. The user either responds to the mobile phone or enters the ATM—group of specially generated PIN numbers to be used in the communication. In the preferred embodiment, the use is to reply and enter at the same time 109 200307428 玖, invention description Enter the PIN number. The requested activity may be, for example, access to a network, that is, the messenger requests access to a LAN or access to the Internet or the like. It therefore makes it possible to provide the ability to roam the Internet and use regional resources to log in to the Internet while traveling or not in the neighborhood of its own Internet provider. · In particular, the network to which access may be requested may be through a wireless LAN access point or an infrared access point or through one of the Bluetooth access points. Wireless LAN or infrared or Bluetooth is to provide flexible network access to all devices in the vicinity of such access points, and this embodiment allows potential users to be identified and charged for the service. 15 In a further embodiment, after the user has transmitted the quasi-random number or the password to his own non-authenticated device, the number or password may be used multiple times to authorize an event. Because multiple transmissions of the number or password are exposed to replay attacks, the multiple authorization can use the quasi-number / password as a seed key to a challenge response agreement. For example, if a virtual SIM is installed in the non-authenticated device, then the virtual SIMiKi (refer to the description of the SIM above) can be set as the quasi-number / password (Ki is originally used in the generation of SRES, and Kc From RAND). -20 Another variation with a higher level of security is to use the above-mentioned quasi-numbers / passwords to authenticate the establishment of a secure channel (by IPsec, tls, SSL ’SSH, etc.). The key Ki can be transferred between the correlator and the non-certified data, and can then be used as a seed for the execution of the challenge response. As discussed above, the communicator gets a phone number, whether it is 110 200307428, the concise description of the invention, or an encoded or encrypted version of the phone number from the non-certified device. This number is preferably used to establish communication with the secure mobile device. However, in those embodiments, the communication is initiated by the secure mobile device, and the mobile number is preferably used for premium and non-certified links where links have been established. According to the above, the non-authentication device can be a credit card, a smart card, an infrared device, a Bluetooth device, a pda, a durable computer, a mobile computer, a fixed computer, and a computer network or any other device that can use infrared or blue Or wireless LAN or HomeRF or wired or other types of communication to establish a communication. Reference is now made to Fig. 30, which is a simplified block diagram showing still another embodiment of a verification device according to the present invention, the elements of which are shown in more detail. Like a PDA 130, a non-authenticated device communicates wirelessly to a LAN / WAN 134 via a network access point. The LAN itself can be wired or wireless. The LAN can be directly (or indirectly) connected to a honeycomb cell The Internet authentication portal 136 may be a device that provides the user with access to the Internet or any other network or service. The entrance ι36 preferably allows the pdA 130 as a standard Internet authentication device that can log in normally. This login procedure can be performed manually or automatically when needed. The user's mobile phone number can be used as the login user name or as a separate part of the login process. The portal starts executing a timer to suspend the authentication after a predetermined time limit. Alternatively, the portal can also set a counter to limit the number of login attempts to reduce the number of intrusions by hackers. The remote entrance is directly or indirectly connected to a short message service center SMS-C 138 111 200307428 玖, description of the invention

,其是為管理SMS訊息的網路單位。該SMS-C 138透過 MSC 140,BSC 142,及蜂巢細胞基地台144送出一 SMS訊 息至被行動電話146所保護的SIM。該使用者因此接收到一 請求告訴他要按下回覆已啟動它的網路連接。在進一步的 5 強調,該使用者可以被要求提供一密碼。該SMS本身通常 是被加密及該SIM支援認證使其清楚的只有該預期的行動 電話在回覆。該行動電話回覆至該SMS。所有的SMS訊息 具有一原始的位置,被傳送的該SMS訊息可以具有該認證 者的電話號碼,以允許一回覆可以道達該認證者。該使用 10 者而後透過該LAN被認證存取該網際網路或其他資料網路 ,及他使用的LAN而後可以對他的行動電話收費。, Which is a network unit for managing SMS messages. The SMS-C 138 sends an SMS message to the SIM protected by the mobile phone 146 through the MSC 140, the BSC 142, and the cellular cell base station 144. The user thus receives a request telling him to press reply to activate its network connection. In a further 5 it is emphasized that the user can be asked to provide a password. The SMS itself is usually encrypted and the SIM supports authentication to make it clear that only the intended mobile phone is responding. The mobile phone responded to the SMS. All SMS messages have an original location, and the SMS message being transmitted may have the phone number of the authenticator to allow a reply to reach the authenticator. The user who uses the LAN is then authenticated to access the Internet or other data networks through the LAN, and the LAN he uses can then charge his mobile phone.

現請參考第31圖所示,其是為顯示根據本發明之一實 施例透過一認證通道之一非認證通道的驗證。在第3 1圖中 ,認證該鏈結包括步驟:透過具有一認證裝置之一認證鏈 15 結來通訊,驗證使用該鏈結之認證程序,其中該通訊是與 一預期的行動電話裝置,透過一非認證第二通道或鏈結來 設立一第二鏈結。一階段是接著透過一非認證裝置來結合 或關聯該驗證與一活動請求。一但該二通道或鏈結已經被 結合,而後在該第一鏈結上的認證被使用來允許在另一鏈 20 結上的請求如上述,藉此允許該非認證裝置之活動請求。 結合的步驟可以藉由使用由該認證裝置所提供的一辨識電 話號碼來被加以執行。認證的步驟最好包括有傳送一訊息 至該認證行動裝置,其中一回覆可以如上述解釋被期待。 如上所述,對於本發明而言,該二鏈結中的那一個被 112 200307428 玖、發明說明 先完成或是它們是否同時完成#1舌面 — 了疋风亚不重要。每一可能性伴隨 著優點及缺點來提供本發明之一正當的實施例。 5 10 在-種情況中,通訊是由非認證裝置開始。該系統送 出-訊息至該相關認證裝置以請求核准。該裝置使用者送 回他的核准及該認證是在此完成或者該系統送出-密碼至 該認證裝置。該使用者接收到該密碼及輸人或複製或傳送 該密碼至該非認證裝置’因此完成該認證。 在另-情況中,-通訊請求是由該認證裝置所開始。 該系統送«碼或㈣的使㈣名稱及密碼給該認證裝置 。該密碼’或使用者及密碼,被複製或傳送至該非認證裝 置,及該非認證裝置轉達該密碼回到㈣統已建立該認證 〇 上述程序只被使用在一剛開始通訊建立,或在一特別 々施例中’、使用在_啟動通訊。此後,—保密通訊通道被 15 ,立在該系統及非認證裝置之間,其使用額外的辨識碼/ 夕數個辨識碼以提供下次存取該系統。在未來的存曲期間 ,該系統加入額外的辨識碼/密碼,及對該認證裝置的選 擇性提示。此一較佳實施例節省了在第一次通訊之後需要 用來與該認證裝置設定認證通道的需要。 2〇 在該較佳實施例中,該認證方法不需要任何特定的硬 體或軟體安裝在該PDA 13〇上。該pDA使用一標準瀏覽器 及標準網路介面單元來工作。 在另貫施例中,軟體被安裝來支援該被定義的程序 及協助或省去手動使用者動作,像是位址的輸入及在該認 113 200307428 5 玖、發明說明 證及非認證資料之間的資料傳送。 該電信服務使用者不需要知道任何新的號碼及密碼, 及該行動電話號碼(MSISDN)可以被使用來作為一使用者 名稱。 該行動裝置終端機46是一標準的認證單元。該終端機 • 可以是只有聲音,只有SMS,只有WAP,只有GPRS,只 有3 G,任合其他資料通訊或一組合。 對該被請求服務之認證需要擁有該使用者特定的SIM 或USIM或類似的裝置。 10 該服務不需要提供任何特別提供的資料庫。該使用者 身份是該MSISDN或類似的識別碼(像是IMIS)。沒有新的 密碼需要由使用者提供或記憶。然而,一變化實施例需要 資料庫的提供,例如當使用一 RADIUS伺服器時。一 RADIUS伺月艮器是使用來認證存取一通訊系統之認證使用 15 • - ή 者,其中認證是基於該RADIUS或遠端認證撥入使用者伺 服器協定。 一單一網路伺服器122可以被使用來支援許多電信服 務供應商。 要注意的是本發明的某些特徵為了清楚起見是以分別 -, 20 的實施例說明,其也可以組合使用在一單一實施例中。相 反地,本發明的許多特徵為了簡潔起見是以單一時施例說 明,其也可以提供分離或其他合適的次組合。 本發明因此提供一種包括有使用一行動電話保密通道 來保密傳送可能會被使用來授權一些其他服務之一授權碼 114 200307428 玖、發明說明 之認證系統。 實施例之結論 在上述中,其提供一連串的實施例,其中在其之間提 供在該蜂巢細胞或PLMN環境及該無線LAN環鏡之間的一 5 無縫介面。該介面允許蜂巢細胞致能單元可以由一環境移 至另一環境而不需要該使用者注意到它,因此可以利用有 較高資料率及在當可取得時可以利用無線LAN之區域資源 。非蜂巢細胞致能單元被致能連接該無線LAN及透過該 LAN存取該蜂巢細胞環境。 10 為了清楚說明起見以個別的實施例說明之本發明特徵 也可以為組合成的單一實施例。相反地,為了簡潔起見, 在單一實施例之說明的本發明不同的特徵也可以為分離或 任何適當的次組合。 熟習该項技術人士應可瞭解,本發明並不受限於以上 15所顯示及描述者。然而,本發明之範圍是藉由後附的申請 專利範圍所定義及包括有上述不同特徵的組合及次組合, 以及熟習該項技術者在讀過前面之描述之後可以作變化及 修飾。 【囷式簡單說明】 20 第1圖是一 SIM之簡化表示, 第2圖是顯示一 SIM之功能操作之一簡化方塊圖, 第3圖是根據本發明之一第一實施例顯示一客戶端裝 置透過一虛擬SIM閘道器連接至一非PLMN網路及由那裏 連接至一 PLMN網路之一簡化概要圖, 115 200307428 玖、發明說明 第4a圖是更詳細地顯示第3圖之實施例之一簡化方塊 圖,包括一模擬SIM閘道器之次系統, 第4b圖是顯示另一解決方法透過一非PLMN網路提供 PLMN服務之一簡化比較圖,該服務是為習知技藝, 5 第4c圖是一示範圖式,顯示一掌上型裝置及一可插入 其中的一卡片,使其適於與藍芽及類似的非PLMM網路使 用,Please refer to FIG. 31, which is a diagram illustrating verification through a non-authentication channel of an authentication channel according to an embodiment of the present invention. In FIG. 31, the authentication of the link includes the steps of communicating through an authentication chain 15 having one of the authentication devices, and verifying the authentication procedure using the link, wherein the communication is with an expected mobile phone device through A non-certified second channel or link to establish a second link. One stage is then combining or associating the verification with an activity request through a non-authentication device. Once the two channels or links have been combined, then authentication on the first link is used to allow requests on the other link 20 as described above, thereby allowing activity requests for the non-authenticated device. The combined steps can be performed by using an identification telephone number provided by the authentication device. The authentication step preferably includes sending a message to the authentication mobile device, and a reply can be expected as explained above. As mentioned above, for the present invention, it is not important which one of the two links is completed by 112 200307428, the description of the invention is completed first, or whether they are completed at the same time # 1 舌面. Each possibility is accompanied by advantages and disadvantages to provide a legitimate embodiment of the invention. 5 10 In one case, communication was initiated by a non-authenticated device. The system sends a message to the relevant authentication device to request approval. The user of the device returns his approval and the authentication is done here or the system sends a password to the authentication device. The user receives the password and inputs or copies or sends the password to the non-authentication device 'and thus completes the authentication. In another case, the communication request is initiated by the authentication device. The system sends a «code or your messenger name and password to the authentication device. The password 'or user and password are copied or transmitted to the non-authentication device, and the non-authentication device relays the password back to the system and the authentication has been established. The above procedures are only used in the initial communication establishment, or in a special 々In the example, ', used in _ to start communication. After that, the —secure communication channel was set up between the system and the non-authentication device, and it used additional identification codes / numbers to provide access to the system next time. During the future song storage, the system adds additional identification codes / passwords and optional prompts for the authentication device. This preferred embodiment saves the need to set up an authentication channel with the authentication device after the first communication. 20 In the preferred embodiment, the authentication method does not require any specific hardware or software to be installed on the PDA 13o. The pDA works using a standard browser and a standard web interface unit. In another embodiment, the software is installed to support the defined procedure and assist or eliminate manual user actions, such as address entry and identification in the certificate 113 200307428 5 发明, certificate of invention and non-certified information. Data transfers. The telecommunications service user does not need to know any new numbers and passwords, and the mobile phone number (MSISDN) can be used as a username. The mobile device terminal 46 is a standard authentication unit. This terminal can be only voice, only SMS, only WAP, only GPRS, only 3 G, and any other data communication or a combination. Authentication of the requested service requires possession of the user-specific SIM or USIM or similar device. 10 The service does not require any specially provided database. The user identity is the MSISDN or similar identification code (like IMIS). No new password needs to be provided or remembered by the user. However, a variant embodiment requires the provision of a database, such as when using a RADIUS server. A RADIUS server is an authentication server used to authenticate access to a communication system. The authentication is based on the RADIUS or remote authentication dial-in user server protocol. A single web server 122 can be used to support many telecommunications service providers. It should be noted that certain features of the present invention are described in the embodiments of -20 for clarity, and they can also be used in combination in a single embodiment. Conversely, many features of the invention have been illustrated in a single instance for the sake of brevity, which may also provide separation or other suitable sub-combinations. The present invention therefore provides an authentication system including the use of a mobile phone secure channel to secretly transmit an authorization code 114 200307428 which may be used to authorize some other services. Conclusion of the Embodiment In the above, it provides a series of embodiments in which a seamless interface between the honeycomb cell or PLMN environment and the wireless LAN ring mirror is provided therebetween. This interface allows the hive cell enabling unit to be moved from one environment to another without requiring the user to notice it, so it can utilize regional resources with higher data rates and wireless LAN when available. The non-honeycomb cell enabling unit is enabled to connect to the wireless LAN and access the hive cell environment through the LAN. 10 The features of the invention described in the individual embodiments for the sake of clarity may also be combined into a single embodiment. Conversely, for the sake of brevity, the different features of the invention described in a single embodiment may also be separate or any suitable subcombination. Those skilled in the art should understand that the present invention is not limited to those shown and described in 15 above. However, the scope of the present invention is defined by the scope of the attached patent application and includes combinations and sub-combinations of the above-mentioned different features, and those skilled in the art can make changes and modifications after reading the foregoing description. [Brief description of the formula] 20 FIG. 1 is a simplified representation of a SIM, FIG. 2 is a simplified block diagram showing a functional operation of a SIM, and FIG. 3 is a diagram showing a client according to a first embodiment of the present invention The device is connected to a non-PLMN network through a virtual SIM gateway and connected to a PLMN network from there. A simplified schematic diagram, 115 200307428 玖, description of the invention Figure 4a is an embodiment showing Figure 3 in more detail One is a simplified block diagram, which includes a secondary system that simulates a SIM gateway. Figure 4b is a simplified comparison diagram showing another solution for providing a PLMN service through a non-PLMN network. Figure 4c is an exemplary diagram showing a handheld device and a card that can be inserted into it, making it suitable for use with Bluetooth and similar non-PLMM networks.

第5圖是為根據本發明之一實施例之一簡化流程圖, 顯示透過一非PLMN網路連接一非SIM裝置經一虛擬SIM閘 10 道器連接至一 PLMN網路, 第6圖是顯示一典型PLMN網路基礎架構之概要圖, 第7圖是根據本發明之一實施例之一概要圖,其顯示 使用一虛擬基地台控制器作為至該PLMN網路之一介面,Fig. 5 is a simplified flowchart according to an embodiment of the present invention, showing a non-SIM device connected through a non-PLMN network to a PLMN network through a virtual SIM gateway 10, and Fig. 6 is a display A schematic diagram of a typical PLMN network infrastructure. FIG. 7 is a schematic diagram according to an embodiment of the present invention, which shows the use of a virtual base station controller as an interface to the PLMN network.

第8圖是根據本發明之一較佳實施例之一概要圖,其 15 顯示在一無線LAN及一PLMN網路之間的協定層及分封資 料認證, 第9圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一 LAN與一 PLMN網路之間的協定層及交換電路資 料認證, 20 第1〇圖是根據本發明之一較佳實施例之一概要圖,其 顯示與在GPRS及一無線LAN之間的連接相關的協定層, 第11圖是根據本發明之一較佳實施例之一概要圖,其 顯示與透過PLMN及無線網路之交換電路支援服務的提供 有關之協定層, 116 200307428 玖、發明說明 第12圖是根據本發明之一較佳實施例之一概要圖,其 顯示一虛擬SGSN+被使用作為在一無線LAN及一PLMN之 間的一介面, 第13圖是根據本發明之一較佳實施例之一概要圖,其 5 顯示在一無線LAN及一 PLMN網路之間的協定層及分封資 料認證’ 第14圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一 PLMN之間的分封支援服務的提供 之協定層, 10 第15圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一 PLMN之間的交換電路支援服務的 提供之協定層, 第16圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一 PLMN之間的提供分封資料流量管 15 理之協動層, 第17圖是根據本發明之一較佳實施例之一概要圖,其 顯示覆概共同區域及結合連接一熱點中心點之二無線網路 ,其可以被用來協調在網路之間的交接, 第18圖是根據本發明之一較佳實施例之一概要圖,其 20 顯示一無線網路存在於一蜂巢細胞或PLMN網路之覆蓋區 域之内, 第19圖是根據本發明之一較佳實施例之一概要流程圖 ,其顯示在二網路之間作為信號交遞之整個原理, 第20圖是根據本發明之一較佳實施例之一概要流程圖 117 200307428 玖、發明說明 ,其說明由行動裝置單元的觀點之信號交遞, 第21圖是根據本發明之一較佳實施例之一概要流程圖 ’其顯示信號交遞程序的另一實施例, 第22圖是一簡化概要圖,說明具有一共同中心點之二 5 非重疊WLANs, 第23圖是一簡化概要圖,說明二重疊WLANst的每一 個是一不同熱點的一部份及在該等熱點範圍之外有一共同 中心點, 第24圖是第23圖情節的一變化例,其中該熱點沒有重 10 疊, 第25圖說明二重疊的plmN網路, 第26圖說明二非重疊PLMN網路, 第27圖是根據本發明之又一較佳實施例之一簡化方塊 ,其顯示一認證機構, 15 第28圖是顯示使用在第27圖之保密鏈結之一裝置之一 簡化插圖, 第29圖是顯示使用在第27圖之非保密鏈結之一裝置之 一簡化插圖, 第3 0圖是根據本發明之一認證機構之另一實施例之一 2〇 Μ化方塊圖’特別地允许控制存取至一有線或無線LAN, 及 第31圖是第27圖之該認證機夠之操作之一簡化流程圖 ’其中該設定可由任一裝置開始,保密或非保密,包括有 由一不同的裝置來設定。 118 200307428 玫、發明說明 【圖式之主要元件代表符號表】 10…訂購者身份模組(SIM) 12.. .51.卡載體及讀取器 14…蜂巢細胞電話裝置 16…認證次系統 18…加密次系統 20…連接裝置 22··.非PLMN網路 24…模擬SIM閘道器(SSG) 26…PLMN/蜂巢細胞網路 28.. .資料庫次系統 30.. .存取次系統 32··.交互工作次系統 34.. .PLMN次系統 36". GPRS存取卡 38.. .藍芽存取卡 40···基地台系統(BSS) 42.. .行動裝置FIG. 8 is a schematic diagram of a preferred embodiment of the present invention, and FIG. 15 shows a protocol layer and packet data authentication between a wireless LAN and a PLMN network, and FIG. 9 is a comparison according to one of the present invention. A schematic diagram of one of the preferred embodiments, which shows the protocol layer and switching circuit data authentication between a LAN and a PLMN network, FIG. 10 is a schematic diagram of a preferred embodiment according to the present invention. Shows the protocol layers related to the connection between GPRS and a wireless LAN. FIG. 11 is a schematic diagram according to a preferred embodiment of the present invention. It shows the support services for switching circuits through PLMN and wireless networks. Provide the relevant protocol layer, 116 200307428. Description of the invention. Figure 12 is a schematic diagram of a preferred embodiment of the present invention, which shows that a virtual SGSN + is used as an interface between a wireless LAN and a PLMN. FIG. 13 is a schematic diagram of a preferred embodiment of the present invention, and FIG. 5 shows a protocol layer and packet data authentication between a wireless LAN and a PLMN network. FIG. 14 is one of the present invention. One of the preferred embodiments The figure shows a protocol layer for providing packetization support services between a wireless LAN and a PLMN. 10 FIG. 15 is a schematic diagram showing a wireless LAN and a wireless LAN according to a preferred embodiment of the present invention. A protocol layer for providing switching circuit support services between a PLMN. FIG. 16 is a schematic diagram according to a preferred embodiment of the present invention, which shows a packet data flow management pipe provided between a wireless LAN and a PLMN. 15 Coordination layer of the management, FIG. 17 is a schematic diagram according to a preferred embodiment of the present invention, which shows a common area and a wireless network connected to a hotspot center point, which can be used to coordinate In the handover between networks, FIG. 18 is a schematic diagram of a preferred embodiment of the present invention. FIG. 20 shows that a wireless network exists within the coverage area of a cellular cell or a PLMN network. FIG. Is a schematic flowchart according to a preferred embodiment of the present invention, which shows the entire principle of signal transmission between two networks. FIG. 20 is a schematic flowchart according to a preferred embodiment of the present invention. Figure 117 200307428 玖2. Description of the invention, which illustrates the signal delivery from the viewpoint of the mobile device unit. FIG. 21 is a schematic flowchart according to one of the preferred embodiments of the present invention, which shows another embodiment of the signal delivery procedure. The figure is a simplified outline diagram illustrating two non-overlapping WLANs with a common center point. Figure 23 is a simplified outline diagram illustrating that each of the two overlapping WLANsts is a part of a different hot spot and the range of these hot spots. There is a common center point outside. Figure 24 is a variation of the plot in Figure 23, where the hotspot does not have 10 stacks, Figure 25 illustrates two overlapping PLMN networks, and Figure 26 illustrates two non-overlapping PLMN networks. FIG. 27 is a simplified block diagram showing a certification authority according to another preferred embodiment of the present invention. FIG. 28 is a simplified illustration showing one of the devices used in the security link of FIG. 27. The figure is a simplified illustration showing one of the devices used in the non-secure link of Fig. 27. Fig. 30 is a 20M block diagram of a further embodiment of a certification authority according to the present invention. Controlling access to one Or wireless LAN, and Figure 31 is a simplified flowchart illustrating one of the authentication machine 27 of FIG capable of operation 'wherein the setting means may be any of a start, confidential or non-confidential, including set by a different device. 118 200307428 Description of invention [Representative symbols of main components of the drawing] 10 ... Subscriber identity module (SIM) 12 .... 51. Card carrier and reader 14 ... Hive cell phone device 16 ... Authentication sub-system 18 … Encryption secondary system 20… connecting device 22… .non-PLMN network 24… simulation SIM gateway (SSG) 26… PLMN / honeycomb network 28 .. database subsystem 30 .. access subsystem 32..Interworking sub-system 34..PLMN sub-system 36 " .GPRS access card 38..Bluetooth access card 40 ... Base station system (BSS) 42..Mobile device

44.. .MSC 46…服務GPRS支援節點 (SGSN) 48··.非PLMN網路 50.. .虛擬基地台控制器 (VBSC) 52.. .遠端/行動裝置 54.. .存取點 56.. .51.伺服器 60.. .無線LAN網路 62.. .虛擬基地台控制器 (VBSC) 64".Gb介面 66···服務GPRS支援節點 (SGSN) 69.. .Gs 介面 7 0…協定 72.. . GPRS網路伺服器 74.. .Gn 介面 78 …AuC/HLR 80…連接管理器 82.. .區域伺服器 84.. .VSGSN+ 90 ...PLMN伺服器 100…熱點中心點 110.. .區域無線網路 112···廣域網路(WAN) 114.··存取點(AP) 116·..WAN 中心 119 20030742844 .. MSC 46 ... Serving GPRS Support Node (SGSN) 48 ... Non-PLMN Network 50 .. Virtual Base Station Controller (VBSC) 52 .. Remote / Mobile 54 .. Access Point 56 .. 51. Server 60 .. Wireless LAN network 62 .. Virtual base station controller (VBSC) 64 ". Gb interface 66 .. Service GPRS support node (SGSN) 69 .. Gs interface 7 0… protocol 72 .. GPRS network server 74 .. Gn interface 78… AuC / HLR 80… connection manager 82. .area server 84..VSGSN + 90 ... PLMN server 100… Hotspot center point 110 .. Area wireless network 112 .. Wide area network (WAN) 114. Access point (AP) 116 ... WAN center 119 200307428

玖、發明說明 123…認證通訊器 140...MSC 128…服務/通訊控制器 142...BSC (SCC) 144...基地台 130...個人數位助理器 146…行動電話 (PDA) 120,132...PLMN1 138...行動裝置 122,132...PLMN2 138…短訊息服務中心 134,136···存取點 (SMS-C) SU1〜SU6…電信服務使用者 140…服務/通訊控制器 單元 (SCC) WN1,WN2...區域無線網路发明, Description of the invention 123 ... Authentication communicator 140 ... MSC 128 ... Service / communication controller 142 ... BSC (SCC) 144 ... Base station 130 ... Personal digital assistant 146 ... Mobile phone (PDA) 120,132 ... PLMN1 138 ... Mobile device 122,132 ... PLMN2 138 ... Short message service center 134,136 ... Access point (SMS-C) SU1 ~ SU6 ... Telecom service user 140 ... Service / communication controller unit (SCC) WN1, WN2 ...

120120

Claims (2)

200307428 拾、申請專利範圍 1. 一種介面連接於一 PLMN網路與非PLMN網路之間的 介面裝置,上述PLMN網路被架構來確認蜂巢細胞基 地台作為中繼連接至該蜂巢細胞行動裝置之節點,上 述非PLMN網路的每一個包括有中繼連接至網路相容 5 行動裝置之多數個存取點,上述網路相容行動裝置不 需要是蜂巢細胞行動裝置,上述介面裝置被架構來作 為上述PLMN之一節點以使得上述PLMN網路作為它 的一基地台及具有使非蜂巢細胞行動裝置連接至上述 非PLMN網路及用來存取上述網路之功能,藉此如同 10 蜂巢細胞行動裝置存取至上述PLMN網路一樣。 2. 如申請專利範圍第1項所述之介面裝置,包括有用來 通話的一交換電路介面及用來作資料及控制使用之一 分封介面。 3. 如申請專利範圍第1項所述之介面裝置,其中上述 15 PLMN網路是為具有一 A介面或一 Gb介面之一 GSM網 路,及上述交換電路介面可以操作使用上述A介面及 上述分封介面可以操作使用上述Gb介面。 4. 如申請專利範圍第1項所述之介面裝置,其中上述 PLMN網路是具有一 IuCS介面及一 IuPS介面之一200307428 Patent application scope 1. An interface device connected between a PLMN network and a non-PLMN network. The above PLMN network is structured to confirm that the cellular cell base station is connected as a relay to the cellular cell mobile device. Nodes, each of the aforementioned non-PLMN networks includes a plurality of access points that are relay-connected to the network compatible 5 mobile device, the network compatible mobile device does not need to be a cellular cell mobile device, and the interface device is structured As a node of the above PLMN so that the above PLMN network serves as a base station and has the function of connecting a non-honeycomb cell mobile device to the above non-PLMN network and accessing the above network, thereby acting like 10 honeycombs Cell mobile devices access the same PLMN network as described above. 2. The interface device described in item 1 of the scope of patent application includes a switching circuit interface for communication and a sub-encapsulation interface for data and control use. 3. The interface device described in item 1 of the scope of patent application, wherein the above 15 PLMN network is a GSM network with an A interface or a Gb interface, and the above-mentioned switching circuit interface can operate using the above-mentioned A interface and the above The decapsulation interface can operate using the above-mentioned Gb interface. 4. The interface device according to item 1 of the scope of patent application, wherein the PLMN network has one of an IuCS interface and an IuPS interface 20 . UMTS網路,及其中上述交換電路介面可以操作使用 上述IuCS介面及上述分封介面可以操作使用上述IuPS 介面。 5. 如申請專利範圍第1項所述之介面裝置,包括與上述 非PLMN網路之保密層相關之一模擬蜂巢細胞辨識閘 121 200307428 拾、申請專利範圍 道器及可操作來決定一連接裝置已經被上述非PLMN 網路所認證,及可操作響應一 PLMN網路認證佇列來 指示上述認證已經成功。 6. 如申請專利範圍第5項所述之介面裝置,其中上述模 5 擬蜂巢細胞辨識閘道器是一模擬SIM閘道器及上述 PLMN網路是一 GSM網路。20. The UMTS network and the above-mentioned switching circuit interface can operate using the above-mentioned IuCS interface and the above-mentioned decapsulation interface can operate using the above-mentioned IuPS interface. 5. The interface device described in item 1 of the scope of patent application, including a simulated honeycomb cell identification gate related to the security layer of the above-mentioned non-PLMN network 121 200307428, patent application scope and operable to determine a connection device Has been authenticated by the non-PLMN network, and is operable to respond to a PLMN network authentication queue to indicate that the authentication has been successful. 6. The interface device as described in item 5 of the scope of patent application, wherein the above-mentioned analog honeycomb cell recognition gateway is an analog SIM gateway and the above-mentioned PLMN network is a GSM network. 7. 如申請專利範圍第6項所述之介面裝置,其中上述模 擬蜂巢細胞辨識是一模擬ESN閘道器及上述PLMN網 路是為一 CDMA網路。 10 8. 如申請專利範圍第5項所述之介面裝置,其中上述非 PLMN保密層是包括有SSL,Ipsec,TLS,SRP,及 SSH之一群組中的一個,及其中上述群組之一的認證 需要允許上述模擬SIM閘道器來提供上述認證響應至 上述PLMN網路。 15 9. 如申請專利範圍第8項所述之介面裝置,其中上述保 密層可被架構設定一所需要的保密水準。 10.如申請專利範圍第1項所述之介面裝置,其更包括有 一傳聲器,其用來接收來自上述非PLMN網路之部份 傳聲信號用以傳聲使用,及接收來自上述PLMN網路 20 之被傳聲的聲音信號用以部份解碼。 11 ·如申請專利範圍第1項所述之介面裝置,其更包括有 一傳聲器,其用來接收來自上述非PLMN網路之部份 傳聲信號用以傳聲使用,及接收來自上述PLMN網路 之被傳聲的聲音信號用以部份解碼。 122 200307428 拾、申請專利範圍 12·如申請專利範圍第1項所述之介面裴置,其被架構使 得上述PLMN網路同時作為用於分封資料之一服務 GPRS支援節點(SGSN)及作為交換電路資料之一基地 台。 5 13·如申請專利範圍第12項所述之介面裝置,其更包括有 認證連接至上述非PLMN網路之一裝置的功能。 14·如申請專利範圍第13項所述之介面裝置,其更包括有 著冊連接至上述非PLMN網路之一裝置的功能。 15·如申請專利範圍第12項所述之介面裝置,其更包括有 〇 更新連接至上述非PLMN網路之一裝置之位置的功能。 16·如申請專利範圍第12項所述之介面裝置,其更包括有 支援允許連接上至上述非PLMN網路之一裝置產生服 務清求之功能。 17.如申請專利範圍第1項所述之介面裝置,其更包括有 5 提供具有為上述PLMN網路規袼化的連接控制資料之 上述PLMN網路可以整合相應活動至一完整帳單之功 能。 18·如申請專利範圍第12項所述之介面裝置,其被架構來 與上述非PLMN網路之一連接管理單元一起操作,藉 〕 此獲得來自連接使用者及被交換資料的品質之非 PLMN網路細節。 19.如申請專利範圍第18項所述之介面裝置,其更包括有 規格化所獲得的上述細節成為一 pLMN相容規格之功 123 200307428 拾、申請專利範圍 57. The interface device according to item 6 of the scope of patent application, wherein the above-mentioned simulated honeycomb cell identification is an analog ESN gateway and the above-mentioned PLMN network is a CDMA network. 10 8. The interface device according to item 5 of the scope of patent application, wherein the non-PLMN security layer is one of the group consisting of SSL, IPsec, TLS, SRP, and SSH, and one of the above groups The authentication needs to allow the analog SIM gateway to provide the authentication response to the PLMN network. 15 9. The interface device according to item 8 of the scope of patent application, wherein the security layer can be set to a required level of security by the architecture. 10. The interface device according to item 1 of the scope of patent application, further comprising a microphone for receiving a part of the sound transmission signals from the non-PLMN network for sound transmission and receiving from the above PLMN network. 20 of the transmitted sound signals are used for partial decoding. 11 · The interface device according to item 1 of the scope of patent application, further comprising a microphone for receiving a part of the sound transmission signals from the non-PLMN network for sound transmission and receiving from the above PLMN network The transmitted sound signal is used for partial decoding. 122 200307428 Scope of patent application 12. The interface Pei Zhi described in item 1 of the scope of patent application is structured so that the above PLMN network serves as a service GPRS support node (SGSN) and as a switching circuit for decapsulating data. Information of one base station. 5 13. The interface device according to item 12 of the scope of patent application, which further includes a function of authenticating a device connected to one of the above-mentioned non-PLMN networks. 14. The interface device according to item 13 of the scope of patent application, which further includes a function of registering to connect to one of the above non-PLMN networks. 15. The interface device according to item 12 of the scope of patent application, which further includes a function of updating the position of one of the devices connected to the non-PLMN network mentioned above. 16. The interface device as described in item 12 of the scope of patent application, which further includes a function that allows connection to a device connected to one of the above-mentioned non-PLMN networks to generate a service request. 17. The interface device according to item 1 of the scope of patent application, which further includes the function of providing the above-mentioned PLMN network with connection control data standardized for the above-mentioned PLMN network, which can integrate corresponding activities into a complete bill . 18. The interface device described in item 12 of the scope of the patent application, which is structured to operate with one of the connection management units of the non-PLMN network described above, thereby] obtaining non-PLMN from the quality of the connected user and the data exchanged Network details. 19. The interface device described in item 18 of the scope of patent application, which further includes the above-mentioned details obtained by standardization to become a pLMN compatible specification. 123 200307428 10 1510 15 20. —種使用在無線LAN的存取卡,包括有與其相關的一 蜂巢細胞辨識模組,用以提供PLMN保密功能,藉此 允許透過上述無線LAN存取一 PLMN網路。 21. 如申請專利範圍第20項所述之存取卡,其中上述蜂巢 細胞辨識模組是安裝在上述存取卡上。 22. 如申請專利範圍第20項所述之存取卡,其中上述蜂巢 細胞辨識模組是可以反向地安裝在上述存取卡。 23. 如申請專利範圍第20項所述之存取卡,其中上述蜂巢 細胞辨識模組是一 SIM。 24. 如申請專利範圍第23項所述之存取卡,其同時包括有 一 SIM載體及一 SIM讀取器。 25. 如申請專利範圍第20項所述之存取卡,其中上述蜂巢 細胞辨識模組是一垂直蜂巢細胞辨識模組。 26. 如申請專利範圍第25項所述之存取卡,其中上述垂直 蜂巢細胞辨識模組是包括有SIM功能之一垂直模組。 27. 如申請專利範圍第20項所述之存取卡,包括有與一 LAN閘道器交換認證信號之功能,藉此達到網路認證。 28. 如申請專利範圍第27項所述之存取卡,其中上述認證 信號被規格化可以在上述閘道器及上述PLMN網路之 間傳遞,藉此來獲得PLMN認證。 29. —種經由使用非PLMN裝置之非PLMN網路來存取 PLMN網路的方法,包括有: 提供上述非PLMN裝置具有匹配於上述非PLMN 網路之一存取卡, 124 -.20 200307428 拾、申請專利範圍 提供上述存取卡具有一蜂巢細胞辨識模組,及 提供上述非PLMN網路具有閘道器功能,以保留 蜂巢細胞辨識信號於上述非PLMN裝置與上述PLMN 網路之間。 5 30. —種經由使用非PLMN裝置之非PLMN網路來存取 PLMN網路的方法,包括有: 提供上述非PLMN網路具有用來認證上述非 PLMN裝置之一保密認證單元,及 提供上述非PLMN網路具有與上述保密認證單元 10 相關之閘道器功能,以操作上述認證單元及保留響影 於上述非PLMN網路之認證的蜂巢細胞辨識信號給上 述PLMN網路。 3 1 · —種在一 PLMN網路與一非PLMN網路之間操作一保 密閘道器來使非PLMN裝置可以認證使用在PLMN連 15 接之方法,該方法包括有: 藉由一第一認證協定來認證上述非PLMN網路, 及 透過一蜂巢細胞認證協定來與上述PLMN網路交 換信號,其包括有透過上述第一協定來指示緊接著認 20 證來作裝置認證。 32. —種在一 PLMN網路與一非PLMN網路之間操作一保 密閘道器來使非PLMN裝置可以認證使用在PLMN連 接之方法,該方法包括有: 透過一蜂巢細胞認證協定來與上述PLMN網路交 125 200307428 拾、申請專利範圍 換信號,藉此認證上述非PLMN網路來連接至上述裝 置。 33· —種管理行動裝置單元之信號交遞(hand〇ff)i信號交 遞管理器,其使用在一第一行動裝置網路存取點及一 第彳亍動裝置網路存取點之間的一可辨識電作工作時 期來通訊,其中上述第一存取點屬於一第一網路,及 上述第二存取點屬於一第二網路,上述管理器可以共 同地存取每一網路及包括有·· 行動裝置單元匹配器’用以執行在具有未與一 網路切斷之行動裝置單元及具有連接其他網路之間的 匹配;及 一電信工作時期維持器,與上述行動裝置單元匹 配器搭配用來傳送在該等因此配對之行動裝置單元之 間的工作時期,藉此在該等網路之間進行信號交遞。 34·如申請專利範圍第33項所述之信號交遞管理器,包括 有在一單一區域之一單元。 35.如申請專利範圍第33項所述之信號交遞管理器,包括 有位在多數個内部網路及交互網路上的分散功能。 ^ •如申請專利範圍第33項所述之信號交遞管理器,其中 上述網路中的一個網路是為一 PLMN網路。 37 •如申請專利範圍第33項所述之信號交遞管理器,其中 上述網路中的一個網路是一無線LAN網路。 8 , cb σ月專利範圍第36項所述之信號交遞管理器,其中 上述網路中的一個網路是一無線LAN網路。 126 200307428 拾、申請專利範圍 39·如申請專利範圍第33項所述之信號交遞管理器,更包 括有一電信工作時期主動管理單元,在當連接品質臨 界標準不能達到時,由一現在被使用網路來決定,用 以指示上述行動裝置單元搜尋周圍的網路及決定它的 5 連接參數,以由上述參數中辨識出一最加網路及指示 上述行動裝置單元連接上述最佳網路。 40·如申請專利範圍第39項所述之信號交遞管理器,其中 上述電指工作時期主動管理單元與上述行動裝置單元 匹配器一起使用,藉此使用上述指示來協助上述的匹 10 配。 41.如申請專利範圍第39項所述之信號交遞管理器,其中 上述電信工作時期主動管理單元可操作決定上述被指 示的匹配疋否已經成功,及在沒有成功連接時,其可 操作指示上述行動裝置單元連接至下一最佳網路。 15 42· h申請專利範圍第39項所述之信號交遞管理器,其中 上述電信工作時期主動管理單元可操作繼續指示上述 行動裝置單元來連接至下一最佳單元直到一成功的連 接被指示為止。 43· %申請專利範圍第33項所述之信號交遞管理器,更包 -〇 括有一電信工作時期被動管理單元,用以在當連接品 質臨界值不能符合時,由上述行動裝置單元來決定, 、才曰不上述行動裝置單元搜尋附近網路及決定它的連 妾多數,以由上述參數辨識一最佳網路及指示上述行 動放置單元連接至上述網路。 127 307428 拾、申請專利範圍 料· T申請專利範圍第33項所述之信號交遞管理器,更可 2 #不上述仃動裝置單元來由-第-網路切斷及接 著連接至一最佳網路。 5 + °月專利範圍第33項所述之信號交遞管理器,更可 -θ示上術行動裝置單元連接至一最佳網路及接著 由現在的網路切斷。 6·如申请專利範圍第33項所述之信號交遞管理器,其可 知作降低在-現在網路上的連接品質,藉此強迫上述 ι〇 仃動裝置單元由其切斷並找尋另一網路。 10 47mf專利範圍第33項所述之信號交遞㈣器,其緊 接選擇-最佳網路用來再連接,以降低在現在網路上 〇連接^ ’及傳送—指示至上述行動單元以連接至 上述被選擇的最佳網路。 1 48·如申請專利範圍第%項所述之信號交遞管理器,其更 才呆作提供給多數個可能可使用網路之上述行動裝置單 元辨識碼。 士申π專利範圍弟3 3項所述之信號交遞管理器,其更 操作提供一個可能使用網路之上述行動裝置單元辯識 碼〇 2〇 C Λ 丄 , υ•如申請專利範圍第33項所述之信號交遞管理器,其中 上述參數包括有下列群組中之任一 ··一相對PLMN網路 之較佳存取通道,可以支援較佳分散ssc基本架構之 網際網路存取之代理巧之身份碼,上述可能可使用網 路之負載條件。上述可能可取得網路之一般性可取的 128 200307428 拾、申請專利範圍 、參數,網際網路存取之網路存取號碼,及在上述可能 可取得網路之期望負載條件上的資訊。 A如申請專利範圍第33項所述之信號交遞管理器,其中 上述第一行動裝置網路及上述第二行動裝置網路分別 疋早熱點(Hotspot)的無線LANs。 52·如申請專利範圍第51項所述之信號交遞管理器,其中 上述第一及第二網路是重疊網路及信號交遞之一行動 裝置單元位在上述網路之間重疊的一點上。 53·如申凊專利範圍第33項所述之信號交遞管理器,其中 1〇 上述第一及上述第二網路分別使用相同的網路協定。 54·如申請專利範圍第33項所述之信號交遞管理器,其中 上述第一及上述第二網路分別使用不同網路協定。 55.如申請專利範圍第51項所述之信號交遞管理器,其中 上述第一及第二網路是非重疊的。 15 56·如申請專利範圍第33項所述之信號交遞管理器,其中 上述第一網路及上述第二網路分別是不同的熱點。 57·如申請專利範圍第56項所述之信號交遞管理器,其中 上述不同的熱點具有一區域的重疊及其中信號交遞之 一行動裝置單元位在上述重疊區域。 20 58·如申請專利範圍第33項所述之信號交遞管理器,其中 上述該等熱點使用一單一通訊協定。 59.如申請專利範圍第33項所述之信號交遞管理器,其中 上述5亥荨熱點分別使用不同的通§Tl協疋。 60·如申請專利範圍第33項所述之信號交遞管理器,其中 129 200307428 拾、申請專利範圍 上述苐一網路及上述苐一網路分別是PLMN網路。 61.如申請專利範圍第6〇項所述之信號交遞管理器,其中 上述第一 PLMN及上述第二PLMN網路使用一單一通 訊協定。 62·如申請專利範圍第60項所述之信號交遞管理器,其中 上述第一 PLMN及上述第二PLMN網路分別使用不同 的通訊協定。 63·如申請專利範圍第6〇項所述之信號交遞管理器,其中 上述第一及上述第二通訊網路具有重疊區域及其中信 號父遞之一行動裝置單元是位在上述重疊區域中。 64.如申請專利範圍第33項所述之信號交遞管理器,其中 上述第一網路是一無線區域網路及上述第二網路是一 PLMN網路。 65·如申請專利範圍第33項所述之信號交遞管理器,其中 上述無線區域網路位在於上述PLMN網路覆蓋區域之 内。 66·如申請專利範圍第33項所述之信號交遞管理器,包括 有用來設定無線區域網路作為較上述pLMN具有較高 優先順序之一優先順序單元,使一行動裝置單元在位 在它的範圍之内時,自動地信號交遞至上述無線區域 網路。 67. —種仃動裝置單元之信號交遞方法,該行動裝置單元 在一通訊工作時期中通訊,上述信號交遞是在一第一 及一第一無線網路之間個別的存取點之間,該方法包 130 200307428 拾、申請專利範圍 括有: 提供共用於上述網路二者之位置上的一控制點; 在上述控制點決定行動裝置單元之身份,其中誰 的連接已經被中斷及獲得它的相對電信工作時期之資 5 料; 在上述控制點決定形成與行動裝置單元新的連接 之身份; 在上述控制點匹配上述身份,藉此匹配與一行動 裝置單元之一存在電信工作時期,其中該行動裝置單 10 元已經終止在一第一存取點上的連接及已經再連接於 一第二存取點。 6 8. —認證裝置,包括有: 一通訊器,與一認證行動裝置單元通訊; 一驗證器,與上述認證行動裝置單元共用來驗證 15 該通訊是在一預備的認證裝置;及 一關聯器,透過一非認證裝置關聯該驗證與該活 動請求,藉此認證該非認證裝置之活動請求。 69.如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一 GSM裝置及上述認證鏈結是一 GSM鏈結。 20 70.如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一 CDMA裝置及上述認證鏈結是一 CDMA鏈結。 71. 如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一 PDC裝置及上述認證鏈結是一 PDC鏈結。 72. 如申請專利範圍第68項所述之裝置,其中上述認證裝 131 200307428 拾、申請專利範圍 置是一 EDGE裝置及上述認證鏈結是一 EDGE鏈結。 73.如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一 WCDMA裝置及上述認證鏈結是一 WCDMA鏈 結。 5 74.如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一 GPRS裝置及上述認證鏈結是一 GPRS鏈結。 75.如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一銥網路(Iridium)裝置及上述認證鏈結是一銥網 路鍵結。 10 76.如申請專利範圍第68項所述之裝置,其中上述保密鏈 結牵涉到位在上述加密行動裝置之一電信服務使用者 身份模組。 77.如申請專利範圍第68項所述之裝置,其中上述保密鏈 結牽涉到位在上述認證裝置之一電信服務使用者身份 1520.-An access card for use in a wireless LAN includes a honeycomb cell identification module associated with it to provide a PLMN security function, thereby allowing access to a PLMN network through the wireless LAN. 21. The access card according to item 20 of the scope of patent application, wherein the honeycomb cell identification module is installed on the access card. 22. The access card according to item 20 of the scope of patent application, wherein the honeycomb cell identification module can be reversely installed on the access card. 23. The access card as described in claim 20, wherein the cellular identification module is a SIM. 24. The access card as described in item 23 of the patent application scope, further comprising a SIM carrier and a SIM reader. 25. The access card as described in item 20 of the patent application scope, wherein the honeycomb cell identification module is a vertical honeycomb cell identification module. 26. The access card according to item 25 of the scope of patent application, wherein the vertical honeycomb cell recognition module is a vertical module including a SIM function. 27. The access card described in item 20 of the scope of patent application includes the function of exchanging authentication signals with a LAN gateway to achieve network authentication. 28. The access card described in item 27 of the scope of patent application, wherein the authentication signal is standardized and can be transmitted between the gateway and the PLMN network to obtain the PLMN certification. 29. A method for accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing the non-PLMN device with an access card matching one of the non-PLMN networks, 124 -.20 200307428 The scope of the patent application is to provide the access card with a honeycomb cell identification module, and provide the non-PLMN network with a gateway function to retain the honeycomb cell identification signal between the non-PLMN device and the PLMN network. 5 30.-A method for accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing the non-PLMN network with a confidentiality authentication unit for authenticating the non-PLMN device, and providing the above The non-PLMN network has a gateway function related to the confidential authentication unit 10, so as to operate the authentication unit and retain the identification signal of the honeycomb cells that affects the authentication of the non-PLMN network to the PLMN network. 3 1 · —A method of operating a secure gateway between a PLMN network and a non-PLMN network to enable non-PLMN devices to authenticate and use the PLMN connection. The method includes: An authentication protocol for authenticating the non-PLMN network and exchanging signals with the PLMN network through a honeycomb cell authentication protocol includes instructing the device to perform device authentication by using the first protocol to instruct subsequent authentication. 32. A method of operating a secure gateway between a PLMN network and a non-PLMN network to enable non-PLMN devices to authenticate and use the PLMN connection, the method includes: through a honeycomb cell authentication protocol to communicate with The above-mentioned PLMN network was exchanged with the signal range of 125 200307428 and applied for a patent, thereby authenticating the above-mentioned non-PLMN network to connect to the above device. 33 · A kind of signal handover (i.e. signal handover manager) for managing mobile device units, which is used between a first mobile device network access point and a first mobile device network access point. The first access point belongs to a first network, and the second access point belongs to a second network. The managers can access each of them collectively. The network and includes a mobile device unit matcher 'for performing matching between a mobile device unit that is not disconnected from a network and a connection to other networks; and a telecommunications service period maintainer, similar to the above The mobile device unit matcher is used to transmit the working period between the paired mobile device units, thereby transmitting signals between the networks. 34. The signal delivery manager according to item 33 of the patent application scope, comprising a unit in a single area. 35. The signal delivery manager as described in item 33 of the scope of patent application, including decentralized functions on most internal networks and interactive networks. ^ The signal delivery manager according to item 33 of the patent application scope, wherein one of the above networks is a PLMN network. 37 • The signal delivery manager according to item 33 of the patent application scope, wherein one of the above networks is a wireless LAN network. 8. The signal delivery manager according to item 36 of the cb σ month patent scope, wherein one of the above networks is a wireless LAN network. 126 200307428 Patent application scope 39. The signal delivery manager described in item 33 of the patent application scope also includes an active management unit during the telecommunication work period. When the critical quality of the connection cannot be reached, it is now used. The network is used to instruct the mobile device unit to search the surrounding network and determine its 5 connection parameters, so as to identify an optimal network from the parameters and instruct the mobile device unit to connect to the best network. 40. The signal delivery manager as described in item 39 of the scope of patent application, wherein the active management unit of the electric finger is used together with the mobile device unit matcher, thereby using the above instructions to assist the above match. 41. The signal delivery manager as described in item 39 of the scope of patent application, wherein the active management unit during the telecommunication work period is operable to determine whether the indicated match has been successful, and when there is no successful connection, it can operate the instruction The above mobile device unit is connected to the next best network. 15 42 · h The signal delivery manager described in item 39 of the scope of patent application, wherein the active management unit during the telecommunication work period is operable to continue to instruct the mobile device unit to connect to the next best unit until a successful connection is indicated until. 43 ·% The signal delivery manager described in item 33 of the scope of patent application, including-passive management unit during telecommunication work period, used to determine by the above mobile device unit when the connection quality threshold cannot be met It is said that the above mobile device unit searches for a nearby network and determines its flail majority so as to identify an optimal network by the above parameters and instruct the above mobile placement unit to connect to the above network. 127 307428 The scope of application for patent application · The signal delivery manager described in item 33 of the scope of application for patent application, and more # 2 can be disconnected from the above-mentioned automatic device unit and connected to a network佳 网络. The signal transfer manager described in item 5 of the 5 + ° patent scope can be connected to an optimal network and then cut off by the current network. 6. The signal delivery manager as described in item 33 of the scope of the patent application, which can be known to reduce the connection quality on the current network, thereby forcing the aforementioned mobile device unit to cut off and find another network. road. 10 The 47mf patent scope of the signal delivery device described in item 33, its immediate selection-the best network for reconnection, to reduce the current network connection and transmission-instructions to the above mobile unit to connect To the best network selected above. 1 48. The signal delivery manager as described in item% of the scope of the patent application, which serves as a unit identification code for most of the above-mentioned mobile devices that may use the network. The signal delivery manager described in Item 33 of Shishen's patent scope, it also operates to provide an identification code for the above mobile device unit that may use the network. 〇2〇C Λ 丄, υ The signal delivery manager described in the above item, wherein the above parameters include any of the following groups: a better access channel relative to the PLMN network, which can support Internet access with a better decentralized ssc basic architecture The identity code of the agent, the above may use the load conditions of the network. The above may obtain the general and desirable 128 200307428 of the network, the scope of patent application, parameters, the network access number of the Internet access, and the information on the expected load conditions of the network that may be obtained above. A The signal delivery manager according to item 33 of the scope of patent application, wherein the first mobile device network and the second mobile device network are wireless LANs of Hotspot respectively. 52. The signal delivery manager according to item 51 of the scope of the patent application, wherein the first and second networks are one of the overlapping network and the signal delivery. The mobile device unit is located at a point where the above networks overlap. on. 53. The signal delivery manager as described in claim 33 of the patent scope, wherein the first and second networks mentioned above use the same network protocol, respectively. 54. The signal delivery manager according to item 33 of the scope of patent application, wherein the first network and the second network each use different network protocols. 55. The signal delivery manager according to item 51 of the scope of patent application, wherein the first and second networks are non-overlapping. 15 56. The signal delivery manager according to item 33 of the scope of patent application, wherein the first network and the second network are different hotspots. 57. The signal handover manager according to item 56 of the scope of patent application, wherein the different hotspots have an area overlap and a mobile device unit of the signal handover is located in the overlap area. 20 58. The signal delivery manager according to item 33 of the scope of patent application, wherein the above-mentioned hot spots use a single communication protocol. 59. The signal delivery manager as described in item 33 of the scope of the patent application, wherein the above-mentioned hot spots of the Haihe network respectively use different communication protocols. 60. The signal delivery manager as described in item 33 of the scope of patent application, of which 129 200307428, scope of patent application The above-mentioned first network and the above-mentioned first network are PLMN networks, respectively. 61. The signal delivery manager according to item 60 of the scope of patent application, wherein the first PLMN and the second PLMN network use a single communication protocol. 62. The signal delivery manager according to item 60 of the patent application scope, wherein the first PLMN and the second PLMN network use different communication protocols, respectively. 63. The signal delivery manager according to item 60 of the scope of the patent application, wherein the first and the second communication networks have an overlapping area and one of the mobile device units of the signal parent is located in the overlapping area. 64. The signal delivery manager according to item 33 of the patent application scope, wherein the first network is a wireless local area network and the second network is a PLMN network. 65. The signal delivery manager according to item 33 of the patent application scope, wherein the wireless local area network is within the coverage area of the PLMN network. 66. The signal delivery manager according to item 33 of the scope of patent application, including a unit for setting the wireless local area network as a priority order with a higher priority than the above pLMN, so that a mobile device unit is located in it. When it is within range, the signal is automatically delivered to the wireless LAN. 67. A signal handover method for a mobile device unit, the mobile device unit communicates during a communication work period, and the signal handover is between individual access points between a first and a first wireless network The method includes 130 200307428. The scope of patent application includes: providing a control point at a location common to both of the above networks; the above control point determines the identity of the mobile device unit, whose connection has been interrupted and Obtain information on its relative telecommunication working period; determine the identity of the new connection with the mobile device unit at the control point; match the identity at the control point to match the existence of the telecommunication working period with one of the mobile device units , Where the mobile device single 10 yuan has terminated the connection on a first access point and has been connected to a second access point. 6 8. —The authentication device includes: a communicator that communicates with a certified mobile device unit; a verifier that is used to verify with the certified mobile device unit 15 that the communication is a preliminary authentication device; and a correlator Associate the verification with the activity request through a non-authenticated device, thereby authenticating the activity request of the non-authenticated device. 69. The device according to item 68 of the scope of patent application, wherein the authentication device is a GSM device and the authentication link is a GSM link. 20 70. The device according to item 68 of the scope of patent application, wherein the authentication device is a CDMA device and the authentication link is a CDMA link. 71. The device according to item 68 of the scope of patent application, wherein the authentication device is a PDC device and the authentication link is a PDC link. 72. The device described in item 68 of the scope of patent application, wherein the above-mentioned authentication device is an EDGE device and the above-mentioned authentication link is an EDGE link. 73. The device according to item 68 of the scope of patent application, wherein the authentication device is a WCDMA device and the authentication link is a WCDMA link. 5 74. The device according to item 68 of the scope of patent application, wherein the authentication device is a GPRS device and the authentication link is a GPRS link. 75. The device according to item 68 of the scope of patent application, wherein the authentication device is an Iridium device and the authentication link is an Iridium network link. 10 76. The device according to item 68 of the scope of patent application, wherein the security link relates to a telecommunications service user identity module located in one of the encrypted mobile devices. 77. The device according to item 68 of the scope of patent application, wherein the above-mentioned confidential link involves the identity of a telecommunication service user located in one of the above-mentioned authentication devices 15 模組。 78. 如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一行動電話。 79. 如申請專利範圍第68項所述之裝置,其中上述通訊包 括有一電子資料通訊。 80. 如申請專利範圍第79項所述之裝置,其中上述電子資 料通訊包括電子訊息傳送。 81. 如申請專利範圍第68項所述之裝置,其中上述電子訊 息傳送包括有SMS訊息傳送。 82. 如申請專利範圍第80項所述之裝置,其中上述電子訊 132 200307428 拾、申請專利範圍 息傳送包括有WAP。 8 3.如申請專利範圍第8 0項所述之裝置,其中上述電子訊 息傳送包括有電子郵件。 84.如申請專利範圍第80項所述之裝置,其中上述電子訊 息傳送包括有EMS。 85·如申請專利範圍第80項所述之裝置,其中上述電子訊 息傳送包括有MMS。 86·如申請專利範圍第80項所述之裝置,其中上述通訊器 包括有藉由傳送來自上述認證裝置之一啟動訊號來啟 動上述通訊之功能,及具有接收對來自上述認證裝置 之上述啟使訊息之一回覆之功能,此外授權上述活動 請求。 87.如申請專利範圍第8〇項所述之裝置,其中上述通訊器 具有接收對來自上述認證裝置及上述非認證裝置之其 一的啟始通訊之功能,及具有對上述啟始訊息傳送一 回覆之功能,此外授權上述活動請求。 队如申請專利範圍第8〇項所述之農置,#中上述通訊器 包括有接收來自一外部裝置之一啟始通訊之功能,及 建立在上述認證裝置與上述非認證裝置之間的一鍵結 ’此為授權上述活動請求。 89·如申請專利範圍第80項所述之裝置,其中上述通訊器 牵涉到接收來自上述認證裝置之一訊息的功能及藉由 傳达-響應至上述保密認證震來完成上述通訊之功能 ’ It此授權上述活動請求。 133 200307428Module. 78. The device described in claim 68, wherein the authentication device is a mobile phone. 79. The device described in claim 68, wherein the communication includes an electronic data communication. 80. The device described in item 79 of the scope of patent application, wherein the electronic data communication includes electronic message transmission. 81. The device according to item 68 of the scope of patent application, wherein the above electronic message transmission includes SMS message transmission. 82. The device described in item 80 of the scope of patent application, in which the above-mentioned electronic newsletter 132 200307428, and patent application scope information transmission includes WAP. 8 3. The device according to item 80 of the scope of patent application, wherein the electronic message transmission includes an email. 84. The device as described in claim 80, wherein the electronic message transmission includes EMS. 85. The device according to item 80 of the scope of patent application, wherein the above-mentioned electronic message transmission includes MMS. 86. The device according to item 80 of the scope of patent application, wherein the communicator includes a function of activating the communication by transmitting an activation signal from one of the authentication devices, and having a function of receiving the activation of the communication from the authentication device. One of the functions of the reply is to authorize the above event request. 87. The device according to item 80 of the scope of patent application, wherein the communicator has a function of receiving start communication from one of the authenticated device and the non-authenticated device, and has a function of transmitting the start message. The function of reply, besides authorizing the above activity request. According to the farm equipment described in item 80 of the scope of the patent application, the communicator in # includes a function of receiving initiation communication from an external device, and a communication device established between the authentication device and the non-authentication device. Keying 'This is a request to authorize the above activity. 89. The device according to item 80 of the scope of patent application, wherein the communicator involves a function of receiving a message from one of the authentication devices and a function of completing the communication by transmitting-responding to the confidential authentication shock 'It This authorizes the above event request. 133 200307428 拾、申請專利範圍 如申請專利範圍第86項所述之裝置,其中上述通訊器 包括有插入-辨識碼於上述回覆給一請求端透過上述 非認證裝置輸入之功能,及其中上述驗證器更包括有 決定上述識別碼是否已經透過上述非認證裝被置接收 91. 如申請專利範圍第68項所述之裳 置’其中上述通訊器 92. 可以操作使用一自動聲音以與上述認證裝置通訊。 如申請專利範圍⑽項所述之裝置,其中上述認證襄 置是與一付費帳號一起使用 10 上述裝置更包括有向上 述請求活動對上述付費帳號收費的功能。 如申請專利範圍第68項所述之衷置,其中上述被請求 活動是一網際網路瀏覽活動或銷售點活動。 如申請專·IS第68項所述之裝置,其中上述被請求 活動是存取至一網路。 15 95·如申請專利範圍第68項所述之裝置,其可以透過藍芽 存取點來操作連接至上述非認證裝置。 • 20 93. 94. %如申請專利範圍第68項所述之裝置,其其可以透過至 > 一個WLAN存取點來操作連接至上述非認證裝置。 97·如申請專利範圍第68項所述之裝置,其可透過一 TCP/IP連接至上述非認證裝置。 98·如申請專利範圍第68項所述之裝置,其中上述通訊器 可操作由上述非認證裝置獲得用來與上述認證裝置通 訊之一電話號碼。 如申請專利範圍第68項所述之裝置,其中上述通訊器 134 200307428 拾、申請專利範圍 可知作獲得來自上述非認證裝置之身份資料用以形成 上述關聯。 100·如ΐ請專利範圍第68項所述之裝置,其中上述非認證 裝置是下列一群組中之一,包括有··一信用卡,一智 5 慧卡,一紅外線裝置,一藍芽裝置,一PDA,一攜帶 I電知’一固定電腦,及一電腦網路。 101.如申請專利範圍第68項所述之裝置,更包括有一計數 器,如果上述通訊沒有在一預定次數限制之内完成, 用以計算上述連接認證失敗。 Π) H)2_如φ請專利範圍第68項所述之裝置,更包括有用以登 錄該非認證裝置之一登錄功能。 肌如中請專利範圍第68項所述之裝置,其中上述關聯器 被連接至一認證者用以指示上述活動請求被允許。 刚·如中請專利範圍第⑻項所述之裝置,其中上述認證 15 $訊器可操作通訊上述認證至-與上述非認證裝置相 關之外部閘道器。 105.如中請專利範圍第1()3項所述之裝置,其中上述認證 通訊器可操作通訊上述認證至與上述請求活動相關的 一伺服器。 20 Η)6·如中請專利範圍第68項所述之農置,其中上述認證通 訊器藉由使用在一路由器上—路徑表上的改變來可操 作通訊上述認證。 107. -種與ATM機器相容的個人交易卡,包括有ΑΤΜ讀取 格式的一 ATM轉帳號碼及一行動電話號碼,上述行動 135 200307428The scope of the patent application is the device described in item 86 of the patent application scope, wherein the communicator includes a function of inserting an identification code in the above reply to a requester and inputting through the non-authentication device, and the verifier further includes It is determined whether the above identification code has been received through the above-mentioned non-authenticated device. 91. The above-mentioned communicator 92. can be operated using an automatic voice to communicate with the above-mentioned authentication device. The device described in item (1) of the patent application, wherein the authentication device is used with a paid account. 10 The device further includes a function of charging the paid account for the above requesting activity. As stated in item 68 of the scope of patent application, the requested activity is an Internet browsing activity or a point-of-sale activity. The device according to item 68 of the application, wherein the requested activity is access to a network. 15 95. The device according to item 68 of the scope of patent application, which can be connected to the above non-authenticated device via a Bluetooth access point. • 20 93. 94.% The device described in item 68 of the scope of patent application, which can be connected to the above non-authenticated device via a> WLAN access point. 97. The device according to item 68 of the scope of patent application, which can be connected to the non-authenticated device through a TCP / IP. 98. The device according to item 68 of the scope of patent application, wherein said communicator is operable to obtain a telephone number for said non-authenticated device to communicate with said authenticated device. The device described in item 68 of the scope of patent application, in which the above communicator 134 200307428, the scope of patent application, can be used to obtain identity information from the non-authenticated device to form the above association. 100 · The device described in item 68 of the patent scope, wherein the non-authentication device is one of the following groups, including: a credit card, a smart 5 smart card, an infrared device, a Bluetooth device , A PDA, a portable computer, a fixed computer, and a computer network. 101. The device according to item 68 of the scope of patent application, further comprising a counter, which is used to calculate the connection authentication failure if the communication is not completed within a predetermined number of times. Π) H) 2_ The device described in φPlease refer to item 68 of the patent scope, and further includes a login function for registering one of the non-authenticated devices. The device described in item 68 of the patent scope, wherein the correlator is connected to an authenticator to indicate that the activity request is allowed. The device as described in item (2) of the Chinese Patent Application, wherein the above-mentioned authentication device is operable to communicate with the above-mentioned authentication to an external gateway related to the above-mentioned non-authentication device. 105. The device described in item 1 () 3 of the patent scope, wherein the authentication communicator is operable to communicate the authentication to a server related to the request activity. 20 Η) 6. The farm equipment described in item 68 of the patent scope, wherein the authentication communicator is operable to communicate the authentication by using a router—a change in a path table. 107. A personal transaction card compatible with ATM machines, including an ATM transfer number and a mobile phone number in ATM reading format, the above action 135 200307428 10 1510 15 拾、申請專利範圍 電話號碼是與上述個人交易卡一起使用。 108. 如申請專利範圍第107項所述之個人交易卡,其中上 述號碼被儲存在一磁條中。 109. 如申請專利範圍第107項所述之個人交易卡,其中上 述號碼被儲存在一内部積體電路中。 110. —種認證方法,包括有: 透過一保密鏈結與一認證裝置通訊; 驗證該通訊是與一預期的認證裝置;及 透過一非認證裝置來關聯該驗證與一活動請求, 藉此認證該非認證裝置之活動請求。 111. 如申請專利範圍第110項所述之方法,其中上述認證 裝置是一 GSM裝置及上述認證鏈結是一 GSM鏈結。 112. 如申請專利範圍第110項所述之方法,其中上述認證 裝置是一 CDMA裝置及上述認證鏈結是一 CDMA鏈結。 113. 如申請專利範圍第110項所述之方法,其中上述認證 裝置是一 PDC裝置及上述認證鏈結是一 PDC鏈結。 114. 如申請專利範圍第110項所述之方法,其中上述認證 裝置是一EDGE裝置及上述認證鏈結是一 EDGE鏈結。 115. 如申請專利範圍第110項所述之方法,其中上述認證 裝置是一 WCDMA裝置及上述認證鏈結是一 WCDMA 鏈結。 116. 如申請專利範圍第110項所述之方法,其中上述認證 裝置是一 GPRS裝置及上述認證鏈結是一 GPRS鏈結。 117. 如申請專利範圍第110項所述之方法,其中上述認證 136 200307428 fe、申請專利範圍 裝置是-銀網路裝置及上述認證鏈結是一銀網路鏈結。 118.如中請專利範圍第11G項所述之方法,其中上述認證 鏈結包括有牵涉到位在上述認證裳置之内的一電信服 務使用者身份模組之一保密鏈結。 119·如申請專利範圍第⑴項所述之方法,其,上述保密 鏈結包括有牵涉到位在上述認證裝置之内的—電信服 務使用者身份模組。 如中請專利範«削項所述之方法,其中上述認證 裝置是一行動電話。 ίο 15 ⑵·如中請專利第11G項所述之方法,其中上述通訊 包括有電子資料通訊。 122. 如申請專利範圍第121項所述之方法,其中上述電子 資料通訊包括有電子訊息傳送或SMS訊息傳送。 123. 如申請專利範圍第122項所述之方法,包括有藉由傳 送一啟動訊息至上述認證裝置來啟動上述通訊及接收 對來自上述認證裝置之上述啟動訊息之回覆的功能, 此外授權上述活動請求。 124. 如申請專利範圍第123項所述之方法,其中上述通訊 牵涉到接收來自上述認證裝置之—訊息及藉由傳送一 回覆至上述認證裝置來完成上述通訊,藉此授權上述 活動請求。 入 如申請專利範圍第124項所述之方法,包括有插入一 ㈣至上述回覆給-請求端透過上述非認證裝置來輸 及決定上述密碼是否已經透過上述非認證裝置被 137 20 200307428 馨 ίο 15 20 拾、申請專利範圍 接收。 126. 如中請專利範圍第綱所述之方法’包括有使用— 自動聲音與上述認證通訊。 127. 如申請專利範圍第11〇項 之方法,其中上述認證 Γ 費帳號一起使用,上述方法更包括有對 上述凊求活動向該付費帳號收費。 128. 如申請專利範圍第110項所述之方法,其中上述請求 活動是「群組或動之一包括有—網際網路割覽活動, 銷售點活動及存取一網路。 129·如申請專利範圍第11〇項 义又方法,包括有使用一 紅外線或藍芽之其一。 13〇·如申請專利範圍第丨10項所述 K方法,其中上述非認 證中置是一TCP/IP鏈結。 131·如申請專利範圍第110項所述 <万法,包括有由上述 非認證裝置獲得與上述認證裝置 衣置通矾之一電話號碼。 •如申請專利範圍第110項所述之方法,其中上述非認 證裝置是下列-群組中的—個,包括有··—信用卡, -智慧卡,-紅外線裝置’―藍芽裝置,—PDA,一 攜帶型電腦,一固定電腦,及—電腦網路。 ⑴.如中請專利範圍第⑽項所述之方法,更包括有一計 數器,如果上述通訊沒有在—預定次數限制之内完成 ,用以計算上述連接認證失敗。 134·如申請專利範圍第〗1〇項所述 您方法,更包括有用以 登錄該非認證裝置之一登錄功能。 138 200307428 拾、申請專利範圍 135·如申請專利範圍第〗10項所述 ... 之方法,包括有輸出上 述活動请求已經被允許的指示。 136·如申請專利範圍第135項所述 不 θ ^ <方法,其中上述指 疋輸出至與相上認證裝置相關 J之—外部閘道器。 137. 如申請專利範圍第135項 不 曰 I之方法,其中上述指 是輸出至與上述被請求活動相關之_飼服器。 138. 如中請專利範圍第135項所述之方法,其中上述指 是藉由加人在—路由器上1禋表的改變來被輸出The scope of patent application and telephone number is used with the above personal transaction card. 108. The personal transaction card described in item 107 of the patent application scope, wherein the above number is stored in a magnetic stripe. 109. The personal transaction card described in item 107 of the scope of patent application, wherein the above number is stored in an internal integrated circuit. 110. An authentication method including: communicating with an authentication device through a confidential link; verifying that the communication is with an expected authentication device; and associating the authentication with an activity request through a non-authentication device to authenticate Activity request for the non-authenticated device. 111. The method as described in claim 110, wherein the authentication device is a GSM device and the authentication link is a GSM link. 112. The method according to item 110 of the scope of patent application, wherein the authentication device is a CDMA device and the authentication link is a CDMA link. 113. The method as described in claim 110, wherein the authentication device is a PDC device and the authentication link is a PDC link. 114. The method as described in claim 110, wherein the authentication device is an EDGE device and the authentication link is an EDGE link. 115. The method according to item 110 of the scope of patent application, wherein the authentication device is a WCDMA device and the authentication link is a WCDMA link. 116. The method as described in claim 110, wherein the authentication device is a GPRS device and the authentication link is a GPRS link. 117. The method as described in item 110 of the scope of patent application, wherein the above-mentioned authentication 136 200307428 fe, scope of patent application device is a silver network device and the above authentication link is a silver network link. 118. The method as described in item 11G of the patent scope, wherein the authentication link includes a confidential link that involves one of the telecommunication service user identity modules that is located within the authentication suit. 119. The method as described in item ⑴ of the scope of patent application, wherein the security link includes a telecommunications service user identity module that is involved in the authentication device. The method as described in the patent claim «paring item, wherein the authentication device is a mobile phone. ίο 15 ⑵ · The method described in item 11G of the Chinese patent, wherein the above communication includes electronic data communication. 122. The method described in item 121 of the scope of patent application, wherein the electronic data communication includes electronic message transmission or SMS message transmission. 123. The method described in item 122 of the scope of patent application includes the function of initiating the communication by receiving an activation message to the authentication device and receiving a reply to the activation message from the authentication device, and authorizing the above activities request. 124. The method according to item 123 of the scope of patent application, wherein the communication involves receiving a message from the authentication device and completing the communication by sending a reply to the authentication device, thereby authorizing the activity request. The method described in item 124 of the scope of patent application includes inserting a reply to the above-mentioned reply to the requester to input through the non-authentication device and determining whether the password has been passed through the non-authentication device. 137 20 200307428 20 Pick up and receive patent applications. 126. The method described in the Patent Scope, as described above, includes the use-automatic voice communication with the above authentication. 127. For the method of applying for item No. 110 of the patent scope, in which the above authentication Γ fee account is used together, the above method further includes charging the payment account for the above-mentioned solicitation activities. 128. The method described in item 110 of the scope of patent application, wherein the above request activity is "one of the group or activity includes-Internet browsing activity, point of sale activity, and access to a network. 129. If applying The method of patent scope No. 110 means using one of infrared rays or bluetooth. 13 〇 The method of K described in the patent scope No. 丨 10, wherein the above non-authentication center is a TCP / IP chain 131. As described in item 110 of the scope of patent application < Wanfa, including a telephone number obtained by the non-authentication device and the authentication device is placed in the same place. • As described in item 110 of the scope of patent application Method, wherein the above non-authentication device is one of the following groups, including:-credit card,-smart card,-infrared device '-Bluetooth device,-PDA, a portable computer, a fixed computer, and —Computer network. ⑴. The method described in item (2) of the patent scope includes a counter. If the communication is not completed within the predetermined number of times, it is used to calculate the connection authentication failure. 1 34. As described in item 10 of the scope of patent application, your method further includes a login function to log in one of the non-authentication devices. 138 200307428 Pick up, scope of patent application 135. As described in the scope of patent application 10th .. The method includes an instruction to output the above-mentioned activity request has been allowed. 136. The method of θ ^ < as described in item 135 of the scope of patent application, wherein the above-mentioned finger is output to the external authentication device related to the external- Gateway. 137. If the method of applying for patent No. 135 does not refer to the method I, where the above means output to the _feeder related to the requested activity. 138. As described in No. 135 of the patent scope Method, where the above refers to the output by adding a change to the table on the router 139139
TW091134023A 2001-05-16 2002-11-21 Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks TWI262005B (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US29096101P 2001-05-16 2001-05-16
US29096001P 2001-05-16 2001-05-16
US29096301P 2001-05-16 2001-05-16
US29095901P 2001-05-16 2001-05-16
US29556101P 2001-06-05 2001-06-05
PCT/IL2002/000382 WO2002093811A2 (en) 2001-05-16 2002-05-16 Access to plmn networks for non-plmn devices

Publications (2)

Publication Number Publication Date
TW200307428A true TW200307428A (en) 2003-12-01
TWI262005B TWI262005B (en) 2006-09-11

Family

ID=37987072

Family Applications (1)

Application Number Title Priority Date Filing Date
TW091134023A TWI262005B (en) 2001-05-16 2002-11-21 Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks

Country Status (1)

Country Link
TW (1) TWI262005B (en)

Also Published As

Publication number Publication date
TWI262005B (en) 2006-09-11

Similar Documents

Publication Publication Date Title
US8086855B2 (en) Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
US9847988B2 (en) Single-SSID and dual-SSID enhancements
Koien et al. Security aspects of 3G-WLAN interworking
KR101140497B1 (en) Heterogeneous wireless ad hoc network
US8769647B2 (en) Method and system for accessing 3rd generation network
US7450554B2 (en) Method for establishment of a service tunnel in a WLAN
CA2792490C (en) Key generation in a communication system
JP4409950B2 (en) Method and apparatus for switching access between mobile networks
KR101068424B1 (en) Inter-working function for a communication system
EP1693995B1 (en) A method for implementing access authentication of wlan user
US20090046861A1 (en) Security for a heterogeneous ad hoc mobile broadband network
Shi et al. IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
WO2009065347A1 (en) Security communication method, system and apparatus for home base-station
JP2007538470A (en) Method for managing access to a virtual private network of a portable device without a VPN client
WO2007097101A1 (en) Radio access system and radio access method
Yang et al. 3G and WLAN interworking security: Current status and key issues
TWI262005B (en) Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
Yang et al. A robust authentication protocol with non-repudiation service for integrating WLAN and 3G network
KR20070022268A (en) Methods and apparatus managing access to virtual private network for portable device without vpn client
Jaatun et al. Security in fast handovers
KR101068426B1 (en) Inter-working function for a communication system
Komarova Fast authentication and trust-based access control in heterogeneous wireless networks
Smithinunt The seamless access wireless LAN of a GSM network in Thailand

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees