TWI262005B - Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks - Google Patents

Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks Download PDF

Info

Publication number
TWI262005B
TWI262005B TW091134023A TW91134023A TWI262005B TW I262005 B TWI262005 B TW I262005B TW 091134023 A TW091134023 A TW 091134023A TW 91134023 A TW91134023 A TW 91134023A TW I262005 B TWI262005 B TW I262005B
Authority
TW
Taiwan
Prior art keywords
network
plmn
authentication
mobile device
communication
Prior art date
Application number
TW091134023A
Other languages
Chinese (zh)
Other versions
TW200307428A (en
Inventor
Eyal Katz
Stuart Jeffery
Iian Zorman
Dan Kolkowitz
Yair Karmi
Original Assignee
Flash Networks Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/IL2002/000382 external-priority patent/WO2002093811A2/en
Application filed by Flash Networks Ltd filed Critical Flash Networks Ltd
Publication of TW200307428A publication Critical patent/TW200307428A/en
Application granted granted Critical
Publication of TWI262005B publication Critical patent/TWI262005B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Interface device for interfacing between a PLMN network and a non-PLMN network, the PLMN network being configured to recognize cellular base stations as nodes thereof through which to mediate connections to cellular mobile devices, the non-PLMN networks each comprising a plurality of access points for mediating connections to network compatible mobile devices, and for which the network compatible mobile devices are not required to be cellular devices. The interface device is configured as a node of the PLMN network to appear to the PLMN network as a standard cellular base station, and comprises functionality to make non-cellular devices connecting to the non-PLMN network and attempting to access the PLMN network through the non-PLMN network appear as cellular devices to the PLMN network.

Description

1262005 玖、發明說明 (發明說明應敘明:發明所屬之技術領域、先前技術、内容、實施方式及圖式簡單說明) L發明所屬之技術領域3 發明領域 本發明是關於提供使非PLMN裝置可接達PLMN網路 5 及提供PLMN網路與非PLMN網路之介面的技術。1262005 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 L L L L L L L L L L L L L L L L L L Access to PLMN network 5 and technologies that provide interfaces between PLMN networks and non-PLMN networks.

L· H 發明背景 由於高速資料存取需求的快速成長。在90年代末期, 28 Kbps對於網路服務已經是非常快速了。然而現在對於 1〇網路服務即使是56 Kbps已被視為非常慢,而384 Kbps則 被視為一般的速度。以這些較高的傳輸速度,下載複雜的 網頁及“多樣媒體(rich media),,像是連續影像現已經是實際 可行的。 無線供應商現在正努力地將有線型式的經驗使用在無 15線上來提供給他們的客戶。今曰,行動電話供應商提供給 他們的行動電4客戶只是有限的資料而不是“多樣媒體,,服 務見7使用在無線通訊上的典形的資料率是9·6 。 GPRS將很快的提升到50至8〇 Kbps(理論上可以達到115 Kbps)’但相較於有線的384 κ_而言仍然是慢的。 為了解决者14個議題,行動電話業者積極的獲取額外 的^權頻寬及積極的要求工程界使用現有及預期的無線配 將Γ# 率的方法。但是這些行動執行要花費多年且 將化費相當的金錢。 未授權的無線網路 變得非常受歡迎且可以使用在獲得 1262005 玖、發明說明 高速無線存取。未授權的無線網路操作在該ISM(工業,科 學及醫學)頻寬及被限制在非常低的的功率,其意為該頻 率可以被一再的重複使用。 IEEE 802.lib是未授權技術中的一個例子,其是非常 5 可以負擔得起及非常有能力提供高至10,000 Kbps的速度。 含蓋一小家庭或辦公室及支援三台電腦之一種802. lib無 線區域網(LAN)可以約500美元來被購得,及該設備漸變成 許多電腦產線上的標準配備,包括有戴爾公司及蘋果公司 。802. lib只是眾多無線LAN技術中的一種。其他的技術包 10 括HomeRF,802_11,藍芽(Bluetooth)等。 當這些技術一開始是因辦公室及家庭所需而在無線區 域網路(WLAN)而被開發,然而一種新型態的網路服務供 應商使用此技術正在興起中。 在費用上,此等供應商透過802. lib提供公共存取。 15 此等網路正被安裝在機場,咖啡廳等及大眾會利用時間來 使用電腦的其他場所。本實施例是有關於在無線LAN及行 動電話或PLMN網路之間介面連接的問題。 高速未授權及授權網路存取技術現在可以被用來支援 700 Kbps至10 Mps及甚至更高的速度。此等無線存取技術 20 的例子包括有藍芽及無線LAN像是802.ll(x)。此等網域具 有相當高的速度來支援多樣媒體服務像是影像電話,連續 影像等。 PLMN使用者可以使用此等非PLMN存取網路(Access Network:AN)來高速存取多樣媒體服務。 1262005 玖、發明說明 在許多存取場所中,該非PLMN存取網路可以攜帶被 定位在該存取場所之相當大量的多樣媒體。一範例可以是 如一運動領域,其中該主要的多樣媒體源將是幾乎即時播 放比賽的精彩片段。而此多樣媒體可以透過通訊經由該 5 PLMN被傳送,保持此多樣媒體遠離該核心網路將降低該 網路的負擔。 為了利用此等資料但不是額外地變成巨大PLmn網路 的一部份,其需要以整合的方式來支援群組至群組(Peer_ to-Peer) ’群組對區域伺服器及群對網路外連接型式,使 1〇 一單一連接客戶端可以利用所有的連接型式。此因為使用 者不想要有組端子,因此支援音頻通訊也是一種關鍵技術 要求。 牢涉到提供此介面連接的 口执μ &㈡句rLMJN型吩 15 被設計來確保只有該網路的使用者是可以證明他們是特定 電話號碼之所有人的裝置。此等設計之目的是確保帳單可 、σ罪且正確地被產生,而其他非本人使用是不可能的且 未授權存取網路大體上是不可能的。最終,該等行動電話 設備或是提供有為_安全晶片及演算法之訂購者身份模組 (SIM)來變識該設被於飢_,及依據該特定網路之架構 來額外執行資料力,及解密,或是它們具有身份資料讓系 統使用來認證它們來進入該網路。 疋保密避免複製及内部檢驗的實體裝置,1咅為 該資料不”外部讀取且不缺时解元件純還元、Γ ^ 地疋由使用者實際擁有及被使用者安裝在 20 1262005 玖、發明說明 該設備中,典型地如行動電話中,該設備被使用來存取該 網路’此意為該存取裝置具有一 SIM卡載體及讀取器。該 SIM觀念被廣泛地使用及更進一步允許該使用者簡易地由 既存的設備中取出他的SIM卡而將其置於新的設備中來交 5換正被使用來存取該網路的該設備而能保持相同的身份及 電話號碼。 SIM基礎的認證是適用於行動電話裝置直接連接至該 PLMN。然而,其也被考慮讓使用者可以透過行動電話連 接上一區域非PLMN網路像是藍芽網路及由此連接。再者 10 ,5亥區域非PLMN網路大體上可以使用在相當多的裝置上 ,像是攜帶型電腦,PDA型裝置及不是傳統行動電化裝置 及非標準配置有行動電話辨識單元,SIM或甚至一 SIM卡 載體或頊取機之類似裝置。次等裝置被總稱為“非SIM裝置,, 。其需要提供一基礎設備來允許此等非SIM裝置透過該區 15域網路連接該行動電話網路,或至少准許他們存取其他的 網路,例如,基於他們的行動電話辨識單元之網際網路。 再者,區域非PLMN網路就其特性是非常的區域化的 。使用者在使用該裝置時可能想要移動使用,然而其可能 报容易地發現他自己已經超出了任何便利的存取點的範圍 - 更特別地’在一小範圍或局限範圍之内的移動行用者可 以使用適於10至100公尺級距之小範圍的任何技術而由一 區域存取點(AP)獲的服務。每一此等AP支援一網路的區域 移動使用者。在每一使用者及該Ap之間的通訊連接由於改 變仃進路徑損失,可利用傳輸能量,介面水準及網路負載 1262005 玫、發明說明 而會在一大範圍之内有變化不同。 如果有多於一個AP在該區域内操作,無論多數個AP 是被整合在一單一存取點或其等被安裝在鄰近的分離區域 ’其可以讓使用者由不同的AP而不是正被使用或已經被考 慮使用的AP來或的較佳通訊條件的服務。 該問題而後是要決動是否另一 AP是可以使用及讓使用 者可以連接至那另一個AP。此一問題是藉由被統稱為“信 號交遞(handoff),,之廣泛可行程序來加以解決。 10 15 20 另一問題發生在當一使用者配有一雙技術終端機,例 如,行動電話及無線LAN,行動電話及有線網路存取等, 及該連接需要由使用一技術之一存取點被交換至使用另一 技術之一存取點。在此情況中,通常與信號交遞相關之該 邏輯不會使用,,然而,—不同的方法是被需要用來在該等 有效的通訊資源中作最佳使用。 多種技術已經被提出來在一小且局限區域内提供網路 連接。在此技術群中最為人所熟知的是··u頻率跳躍及 直接序列無線LAN(WLAN)標準及藍芽技術。&等技術之 標準視該網路為獨立運作。當此__網路之_會員或一可能 =員不能由該網路存取點獲得滿意的資料時,其原因可^ 疋由於惡化的通訊條件或網路請,在眾多負面結果之一 μ是來自使用者的立場:其可能保持暫停 該網路或被供庫以石处、+ # 脫離 仏應以不此破接受的低資料率。現 法不能支援搜尋㈣㈣决方 網路,亦即,並沒右楚m A中的另一 /有專同於該行動電話交遞讓該移動使用 10 1262005 玖、發明說明 者被移轉至可你滿足其通訊需求的另一存取點。 再者,並 >又有技術標準被提出來控制在提供服務給此 等局限範圍之技術及與寬區域主要如行動電畫之技術之間 的轉換;或是在經由無線及有線連接覆蓋大區域之技術之 5 間的轉換。 其也需要考慮遠端連接認證,例如,認證遠端交易或 確認該正確的使用者有被遠端服務提供者請求付款,以及 除非,、中、、’罔路可以經由典型地如其他網路之網路通道被 使用來提供認證給使用者的通訊連接,介面連接在網路之 1〇間是不算完成的,該網路通道不是保密的或是一使用者無 法非常確認辨識。 現在存在有許多交易並不需要實體相鄰的交易對象下 來執行交易。此等環境包括有ATM交易,信用卡及其它藉 15 20 由電話進行的交易,以及透過網際網路進行的交易。一俨 而言’買方的身份在此等交易中不會被建立至一相當高: 層次。該等交易經由未保密及/或非認證連接及使用未保 密及/或非認證連接之通訊技術,而讓使用者個人資料及 信用卡號碼被偷。 現今,電子付款的方法是非常依賴信用卡,其使得對 】額付放難以欲稅,像是使用網路的時間費用, 、、 料項目的小額費用。 5 載二貝 現在存在有許多交易並不需要實 哪的交易對象下 來執行交易。此等環境包括有ATM交易,作 〇用卞及其它葬 由電話進行的交易,以及透過網際網路進行的六 曰 刃 〇 一^身是 11 1262005 玖、發明說明 而言’買方的身份在此等交易中不會被建立至一相當高的 層次。该等交易經由未保密及/或非認證連接及使用未保 岔及/或非認證連接之通訊技術,而讓使用者個人資料及 “用卡號碼被偷。 現今,電子付款的方法是非常依賴信用卡,其使得對 小額付款難以徵稅,像是使用網路的時間費用,或下載資 料項目的小額費用。L·H Background of the Invention The rapid growth of demand for high-speed data access. In the late 1990s, 28 Kbps was already very fast for Internet services. However, even for 1 〇 network services, even 56 Kbps has been considered very slow, while 384 Kbps is considered a general speed. At these higher transmission speeds, downloading complex web pages and "rich media", such as continuous images, is now practical. Wireless providers are now working hard to use wired-type experience on the 15 lines. To provide them to their customers. Today, mobile phone providers provide their mobile power 4 customers with limited information instead of "diversified media, service see 7 used in wireless communications, the typical data rate is 9· 6 . GPRS will soon increase to 50 to 8 Kbps (in theory, up to 115 Kbps) but it is still slow compared to the wired 384 κ_. In order to solve the 14 issues, mobile phone operators are actively acquiring additional bandwidth and positive requirements for the engineering community to use existing and expected wireless distribution methods. But these actions take years to execute and will cost you a lot of money. Unauthorized wireless networks have become very popular and can be used in obtaining 1262005 发明, invention instructions for high-speed wireless access. Unauthorized wireless network operation in this ISM (Industrial, Scientific, and Medical) bandwidth is limited to very low power, which means that the frequency can be reused over and over again. IEEE 802.lib is an example of an unlicensed technology that is very affordable and capable of delivering speeds as high as 10,000 Kbps. An 802. lib wireless local area network (LAN) with a small home or office and supporting three computers can be purchased for about $500, and the device has evolved into standard equipment on many computer production lines, including Dell and Apple. 802. lib is just one of many wireless LAN technologies. Other technology packages include HomeRF, 802_11, Bluetooth, and more. While these technologies were originally developed for wireless local area networks (WLANs) for office and home needs, a new type of network service provider is using this technology. In terms of cost, these vendors provide public access through 802. lib. 15 These networks are being installed at airports, cafes, etc. and other places where the public will use their time to use their computers. This embodiment is related to the problem of interface connection between a wireless LAN and a mobile phone or a PLMN network. High-speed unlicensed and licensed network access technologies can now be used to support speeds from 700 Kbps to 10 Mps and beyond. Examples of such wireless access technologies 20 include Bluetooth and wireless LAN like 802.11(x). These domains have considerable speed to support diverse media services such as video telephony, continuous video, and more. PLMN users can use these non-PLMN access networks (Access Network: AN) to access multiple media services at high speed. 1262005 发明, INSTRUCTION DESCRIPTION In many access locations, the non-PLMN access network can carry a significant amount of diverse media that is located at the access location. An example may be, for example, a field of motion where the main diverse media source will be a highlight of an almost instant game. The diverse media can be transmitted via the 5 PLMN via communication. Keeping the diverse media away from the core network will reduce the burden on the network. In order to take advantage of this information but not to become part of a huge PLmn network, it needs to support group-to-group (Peer_to-Peer) 'group-to-area servers and group-pair networks in an integrated manner. The external connection type allows all single connection clients to utilize all connection types. This is because the user does not want to have a group terminal, so supporting audio communication is also a key technical requirement. It is impeding that the interface provided by this interface is a device that is designed to ensure that only users of the network are able to prove that they are the owner of a particular telephone number. The purpose of such designs is to ensure that bills are sinable, sinful, and correctly generated, while other non-personal uses are not possible and unauthorized access to the network is generally not possible. In the end, these mobile phone devices are either provided with a Subscriber Identity Module (SIM) for the Secure Chip and Algorithm to change the design and be extraordinarily executed according to the architecture of the specific network. And decryption, or they have identity data that the system uses to authenticate them to enter the network.实体Secure device that avoids copying and internal inspection, the data is not “external reading and no shortage of time. The component is purely renewed, Γ ^ The cellar is actually owned by the user and installed by the user at 20 1262005 发明, invention Illustrating the device, typically in a mobile phone, the device is used to access the network 'This means that the access device has a SIM card carrier and reader. The SIM concept is widely used and further Allowing the user to simply take his SIM card from an existing device and place it in a new device to exchange the device that is being used to access the network to maintain the same identity and phone number. The SIM-based authentication is for mobile phone devices to connect directly to the PLMN. However, it is also considered to allow users to connect to a non-PLMN network in the upper area via a mobile phone, such as a Bluetooth network and connect to it. Non-PLMN networks in the 10th and 5th areas can be used in a large number of devices, such as portable computers, PDA-type devices and non-traditional mobile devices, and non-standard configurations with mobile phone identification cards. A SIM, or even a similar device of a SIM card carrier or a picker. The inferior device is collectively referred to as a "non-SIM device,". It is necessary to provide a basic device to allow such non-SIM devices to connect to the mobile phone network through the area 15 domain network, or at least to allow them to access other networks, for example, based on their mobile phone identification unit. road. Furthermore, regional non-PLMN networks are very regional in nature. The user may want to use the device while using the device, however it may easily find that he has exceeded the range of any convenient access point - more specifically - a mobile line within a small range or limitation The user can obtain services from a regional access point (AP) using any technique suitable for a small range of 10 to 100 meter steps. Each of these APs supports a network of mobile users. The communication connection between each user and the Ap can be changed within a wide range due to the change in the path loss due to the change of the transmission energy, the interface level and the network load. If more than one AP is operating in the area, no matter how many APs are integrated into a single access point or the like is installed in a separate separate area 'it can allow the user to be used by a different AP instead of being used Or a service that has been considered for use by APs or preferred communication conditions. The question then is to decide if another AP is available and allows the user to connect to that other AP. This problem is solved by a wide range of feasible procedures, collectively referred to as "handoff," 10 15 20 Another problem occurs when a user is equipped with a pair of technical terminals, such as mobile phones and Wireless LAN, mobile phone and wired network access, etc., and the connection needs to be exchanged using one of the access points of one technology to use one of the access points of another technology. In this case, usually associated with signal delivery This logic will not be used, however, - different approaches are needed to make the best use of such efficient communication resources. A variety of techniques have been proposed to provide network connectivity in a small and limited area. The most well-known in this technology group is ··u frequency hopping and direct-sequence wireless LAN (WLAN) standards and Bluetooth technology. The standard of technology and other technologies depends on the network to operate independently. When this __ network If the member or a potential member cannot obtain satisfactory information from the network access point, the reason may be 疋 due to deteriorating communication conditions or network please, in one of the many negative results μ is from the user's position : it can Keep the network suspended or the library is provided with stone, + # 仏 仏 should not accept the low data rate. The current law can not support the search (4) (4) the network of the party, that is, not in the right Chu m A Another / has the same phone call for the mobile to use the mobile 10 1262005 发明, the inventor has been transferred to another access point that can meet your communication needs. Furthermore, and there are technical standards It has been proposed to control the conversion between technologies that provide services to such limitations and technologies that are broadly related to areas such as mobile photography, or between five technologies that cover large areas via wireless and wired connections. It is also necessary to consider remote connection authentication, for example, to authenticate a far-end transaction or to confirm that the correct user has been requested to be paid by a remote service provider, and unless, the, the, and the way are typically via other networks. The network channel is used to provide a communication connection for authentication to the user. The interface connection is not completed during the network. The network channel is not confidential or cannot be confirmed by a user. There are many transactions that do not require entities that are adjacent to each other to execute the transaction. These environments include ATM transactions, credit cards and other transactions that are made by phone, and transactions made over the Internet. The identity of the buyer will not be established at such a high level in these transactions: the transactions are made by the user through unsecured and/or non-certified connections and the use of unsecured and/or non-certified communication technologies. Data and credit card numbers have been stolen. Today, the method of electronic payment is very dependent on credit cards, which makes it difficult to pay taxes, such as the time cost of using the Internet, and the small cost of the item. There are many transactions that do not require real trading objects to execute transactions. These environments include ATM transactions, use of other transactions, and other transactions made by telephone, as well as the use of the Internet. ^ is 11 1262005 玖, invention descriptions 'the buyer's identity will not be established to a fairly high level in these transactions. These transactions allow users' personal data and "card numbers to be stolen through unsecured and/or non-certified connections and the use of unprotected and/or non-certified communication technologies. Today, electronic payment methods are highly dependent. Credit cards, which make it difficult to tax small payments, such as the time spent on the Internet, or the small cost of downloading data items.

C 明内J 發明概要 10 根據本發明之第一特徵,因此其具有介面連接於一 PLMN網路與非PLMN網路之間的介面裝置,上述1>〇41^網 路被架構來確認蜂巢細胞基地台作為中繼連接至該蜂巢細 胞行動裝置之節點,上述非扎]^^網路的每一個包括有中 、’Μ連接至網路相容行動裝置之多數個存取點,上述網路相 15容行動裝置不需要是蜂巢細胞行動裝置,上述介面裝置被 条構來作為上述PLMN之一節點以使得上述PLMN網路作 為它的一基地台及具有使非蜂巢細胞行動裝置連接至上述 非PLMN網路及用來存取上述網路之功能,藉此如同蜂巢 細胞行動裝置存取至上述PLMN網路一樣。 ί〇 該裝置最好包括有用來通話的一交換電路介面及用來 作資料及控制使用之一分封介面。 較佳地,上述PLMN網路是為具有一 Α介面或一 〇b介 面之GSM網路,及上述交換電路介面可以操作使用上述 A介面及上述分封介面可以操作使用上述Gb介面。 12 1262005 玖、發明說明C 明内 J Summary of Invention 10 According to a first feature of the present invention, therefore, it has an interface device interfaced between a PLMN network and a non-PLMN network, and the above 1>〇41^ network is structured to confirm the honeycomb cells The base station is connected as a relay to the node of the cellular mobile device, and each of the non-tagged networks includes a plurality of access points connected to the network compatible mobile device, and the network The phase 15 mobile device does not need to be a cellular cell mobile device, and the interface device is configured as a node of the PLMN to make the PLMN network as its base station and has a non-cellular cell mobile device connected to the non-negative The PLMN network and the functions for accessing the above network are such that the cellular cell mobile device accesses the PLMN network. 〇 The device preferably includes a switching circuit interface for talking and a sub-sealing interface for data and control. Preferably, the PLMN network is a GSM network having a Α interface or a 〇b interface, and the switching circuit interface can be operated to use the A interface and the sub-sealing interface to operate the Gb interface. 12 1262005 玖, invention instructions

較佳地,上述PLMN網路是具有一IuCS介面及一IuPS 介面之一 UMTS網路,及其中上述交換電路介面可以操作 使用上述IuCS介面及上述分封介面可以操作使用上述IuPS 介面。 5 該裝置最好包括有與上述非PLMN網路之保密層相關 之一模擬蜂巢細胞辨識閘道器及可操作來決定一連接裝置 已經被上述非PLMN網路所認證,及可操作響應一 PLMN 網路認證佇列來指示上述認證已經成功。 較佳地,上述模擬蜂巢細胞辨識閘道器是一模擬SIM 10 閘道器及上述PLMN網路是一 GSM網路。 較佳地,上述模擬蜂巢細胞辨識是一模擬ESN閘道器 及上述PLMN網路是為一 CDMA網路。 較佳地,上述非PLMN保密層是包括有SSL,Ipsec, TLS,SRP,及SSH之一群組中的一個,及其中上述群組之 15 —的認證需要允許上述模擬SIM閘道器來提供上述認證響 應至上述PLMN網路。 較佳地,上述保密層可被架構設定一所需要的保密水 準。 該裝置最好包括有一傳聲器,其用來接收來自上述非 20 PLMN網路之部份傳聲信號用以傳聲使用,及接收來自上 述PLMN網路之被傳聲的聲音信號用以部份解碼。 該裝置最號包括有一傳聲器,其用來接收來自上述非 PLMN網路之部份傳聲信號用以傳聲使用,及接收來自上 述PLMN網路之被傳聲的聲音信號用以部份解碼。 13 1262005 玖、發明說明 較佳地,該裝置被架構始得上述PLMN網路同時作為 用於分封資料之一服務GPRS支援節點(SGSN)及作為交換 電路資料之一基地台。 較佳地,更包括有認證連接至上述非PLMN網路之一 5 裝置的功能。 該裝置最好更包括有著冊連接至上述非PLMN網路之 一裝置的功能。 該裝置最好包括有更新連接至上述非PLMN網路之一 裝置之位置的功能。 10 該裝置最好包括有支援允許連接上至上述非PLMN網 路之一裝置產生服務請求之功能。 該裝置最好包括有提供具有為上述PLMN網路規格化 的連接控制資料之上述PLMN網路可以整合相應活動至一 完整帳單之功能。 15 該裝置最好被架構來與上述非PLMN網路之一連接管 理單元一起操作,藉此獲得來自連接使用者及被交換資料 的品質之非PLMN網路細節。 該裝置最好包括有規格化所獲得的上述細節成為一 PLMN相容規格之功能。 20 該裝置最好包括有與其相關的一蜂巢細胞辨識模組, 用以提供PLMN保密功能,藉此允許透過上述無線LAN存 取一 PLMN網路。 較佳地,蜂巢細胞辨識模組是安裝在上述存取卡上。 較佳地,上述蜂巢細胞辨識模組是可以反向地安裝在 14 1262005 玖、發明說明 上述存取卡。 較佳地,上述蜂巢細胞辨識模組是一 SIM。 較佳地,該裝置同時包括有一 SIM載體及一 SIM讀取 器。 5 較佳地,上述蜂巢細胞辨識模組是一垂直蜂巢細胞辨 識模組。 較佳地,上述垂直蜂巢細胞辨識模組是包括有SIM功 能之一垂直模組。 該裝置最好包括有與一 L A N閘道器交換認證信號之功 10 能,藉此達到網路認證。 較佳地,上述認證信號被規格化可以在上述閘道器及 上述PLMN網路之間傳遞,藉此來獲得PLMN認證。 根據本發明之第二特徵,其提供一種經由使用非 PLMN裝置之非PLMN網路來存取PLMN網路的方法,包括 15 有·· 提供上述非PLMN裝置具有匹配於上述非PLMN網路 之一存取卡, 提供上述存取卡具有一蜂巢細胞辨識模組,及 提供上述非PLMN網路具有閘道器功能,以保留蜂巢 20 細胞辨識信號於上述非PLMN裝置與上述PLMN網路之間 〇 根據本發明之第三特徵,其提供有一種經由使用非 PLMN裝置之非PLMN網路來存取PLMN網路的方法,包括 有: 15 1262005 玖、發明說明 提供上述非PLMN網路具有用來認證上述非PLMN裝 置之一保密認證單元,及 提供上述非PLMN網路具有與上述保密認證單元相關 之閘道器功能,以操作上述認證單元及保留響影於上述非 5 PLMN網路之認證的蜂巢細胞辨識信號給上述PLMN網路 〇 根據本發明之第四特徵,其提供有一種在一 PLMN網 路與一非PLMN網路之間操作一保密閘道器來使非PLMN 裝置可以認證使用在PLMN連接之方法,該方法包括有: 10 藉由一第一認證協定來認證上述非PLMN網路,及 透過一蜂巢細胞認證協定來與上述PLMN網路交換信 號,其包括有透過上述第一協定來指示緊接著認證來作裝 置認證。 根據本發明之第五特徵,其提供有一種在一 PLMN網 15 路與一非PLMN網路之間操作一保密閘道器來使非PLMN 裝置可以認證使用在PLMN連接之方法,該方法包括有: 透過一蜂巢細胞認證協動來與上述PLMN網路交換信 號,藉此認證上述非PLMN網路來連接至上述裝置。 根據本發明之第六特徵,其提供有一種管理行動裝置 20 單元之信號交遞(handoff)之信號交遞管理器,其使用在一 第一行動裝置網路存取點及一第二行動裝置網路存取點之 間的一可辨識電信工作時期來通訊,其中上述第一存取點 屬於一第一網路,及上述第二存取點屬於一第二網路,上 述管理器可以共同地存每一網路及包括有: 16 1262005 玖、發明說明 -行動裝置單元匹配器,用以 切斷之行動裝置單元及具有連接其他網路之間的匹配及 养配用一 作時期維持器,與上述行動裝置單元匹配器 :配用來傳送在該等因此配對之行動裝置單元之間的工作 時期’藉此在該等網路之間進行錢交遞。 該信號交遞管理器最好包括有在-單-區域之一單元 該信號交遞管理器最好包括有位在多數個内部網路及 交互網路上的分散功能。 10 較佳地’上述網路中的-個網路是為-PLMN網路。 較佳地,上述網路中的—個網路是—無線lan網路。 較佳地’上述網路中的—個網路是_無線副網路。 該信號交遞管理器最好更包括有一電信工作時期主動 管理單7G,在當連接品質臨界標準不能達到時,由一現在 15被使用網路來決$,用以指示上述行動裝置單元搜尋周圍 的網路及決定它的連接參數,以由上述參數中辨識出一最 加網路及指示上述行動裝置單元連接上述最佳網路。 較佳地,上述電信工作時期主動管理單元與上述行動 裝置單源匹配器一起使用,藉此使用上述指示來協助上述 20 的匹配。 較佳地,上述電信工作時期主動管理單元可操作決定 上述被指示的匹配是否已經成功,及在沒有成功連接時, 其可操作指示上述行動裝置單元連接至下一最佳網路。 較佳地,上述電信工作時期主動管理單元可操作繼續 17 1262005 玖、發明說明 最佳單元直到一成功 指示上述行動裝置單元來連接至丁一 的連接被指示為止。 該信號交遞管理器最好包括有_電信卫作時期被動管 理單元,用以在當連接品質臨界值不能符合時,由上述行 動裝置單元來決定,以指示上述行動裝置單元搜尋附近網 路及決定它的連接參數,以由上述參_識_最佳網路及 指示上述行動裝置單元連接至上述網路。 該信號交遞管理器最好更可操作指示上述行動裝置單 元來由一第—網路切斷及接著連接至-最佳網路。 該信號交遞管理器最好可操作指示上術行動裝置單元 連接至-最佳網路及接著由現在的網路切斷。 、該信號交遞管理器最好可操作降低在一現在網路上的 連接品質’藉此強迫上述行動裝置單元由其切斷並找尋另 一網路。 15 肖㈣交遞管理11最好緊接選擇—最佳網路用來再連 接,以講低在現在網路上的連接品質,及傳送一指示至上 述行動單“連接至上述被選擇的最佳網路。 該信號交遞管理器最好操作提供給多數個可能可使用 網路之上述行動裝置單元辨識碼。 ° 豸㈣交遞管理11最好操作提供-個可能使用網路之 上述行動裝置單元辯識碼。 較佳地,上述參數包括有下列群組中之任一:一相對 PLMN網路之較佳存取通道,可以支援較佳分散SSC基本 架構之網際網路存取之代理份碼,上述可能可使用 18 1262005 玖、發明說明 網路之負載條件。上述可能可取得網路之一般性可取的參 數’網際網路存取之網路存取號碼,及在上述可能可取得 網路之期望負載條件上的資訊。 較佳地,上述第一行動裝置網路及上述第二行動裝置 5網路分別是一單一熱點(H〇tsp〇t)的無線l她。 較佳地,上述第一及第二網路是重疊網路及信號交遞 之一行動裝置單元位在上述網路之間重疊的一點上。 較佳地,上述第一及上述第二網路分別使用相同的網 路協定。 1〇 較佳地,上述第一及上述第二網路分別使用不同網路 協定。 較佳地,上述第一及第二網路是非重疊的。 較佳地,上述第一網路及上述第二網路分別是不同的 熱點。 15 較佳地,上述不同的熱點具有一區域的重疊及其中信 號交遞之一行動裝置單元位在上述重疊區域。 較佳地,上述该等熱點使用一單一通訊協定。 車父佳地,上述該等熱點分別使用不同的通訊協定。 較佳地,上述第一網路及上述第二網路分別是 20 網路。 較佳地,上述第一 PLMN及上述第二PLMN網路使用 一單一通訊協定。 較佳地,上述第一PLMN及上述第二PLMN網路分別 使用不同的通訊協定。 19 1262005 玖、發明說明 較佳地,上述第一及上述第二通訊網路具有重疊區域 及其中信號交遞之-行較置單元是位在上述重疊區域中 〇 較佳地,上述第一網路是一無線區域網路及上述第二 5 網路是一PLMN網路。 較佳地,上述無線區域網路位在於上述pLMN網路覆 盖區域之内。 該信號交遞管理器最好包括有用來設定無線區域網路 作為較上述PLMN具有較高優先順序之一優先順序單元, 10使-行動裝置單元在位在它的範圍之内時,自動地信號交 遞至上述無線區域網路。 根據本發明之第七特徵,其提供有一種行動襄置單元 之信號交遞方法,該行動裝置單元在一通訊工作時期中通 訊,上述信號交遞是在一第一及一第二無線網路之間個別 15的存取點之間,該方法包括有: 提供共用於上述網路二者之位置上的一控制點; 在上述控制點決定行動裝置單元之身份,其中誰的連 接已經被中斷及獲得它的相對電信工作時期之資料; 在上述控制點決定形成與行動裝置單元新的連接之身 2〇 份; 在上述控制點匹配上述身份,藉此匹配與一行動裝置 早凡之-存在電信工作時期,其中該行動裝置單元已經中 止在一第一存取點上的連接及已經再連接於一第二存取點 〇 20 1262005 玖、發明說明 根據本發明之第八特徵,其提供一種認證裝置,包括 有: 一通訊器,與一認證行動裝置單元通訊; 一驗證器,與上述認證行動裝置單元共用來驗證該通 5 訊是在一預備的認證裝置;及 一關聯器,透過一非認證裝置關聯該驗證與該活動請 求,藉此認證該非認證裝置之活動請求。 較佳地,上述認證裝置是一GSM裝置及上述認證鏈結 是一 GSM鏈結。 10 較佳地,上述認證裝置是一 CDMA裝置及上述認證鏈 結是一CDMA鏈結。 較佳地,上述認證裝置是一 PDC裝置及上述認證鏈結 是一 PDC鏈結。 較佳地,上述認證裝置是一 EDGE裝置及上述認證鏈 15 結是一EDGE鏈結。 較佳地,上述認證裝置是一 WCDMA裝置及上述認證 鏈結是一 WCDMA鏈結。 較佳地,上述認證裝置是一 GPRS裝置及上述認證鏈 結是一GPRS鏈結。 20 較佳地,上述認證裝置是一錶網路(Iridium)裝置及上 述認證鍵結是一錶網路鏈結。 較佳地,上述保密鏈結牽涉到位在上述加密行動裝置 之一電信服務使用者身份模組。 較佳地,上述保密鏈結牽涉到位在上述認證裝置之一 21 1262005 玖、發明說明 電信服務使用者身份模組。 較佳地,上述認證裝置是一行動電話。 較佳地,上述通訊包括有一電子資料通訊。 較佳地,上述電子資料通訊包括電子訊息傳送。 5 較佳地,上述電子訊息傳送包括有SMS訊息傳送。 較佳地,上述電子訊息傳送包括有WAp。 較佳地,上述電子訊息傳送包括有電子郵件。 較佳地,上述電子訊息傳送包括有EMS。 較佳地,上述電子訊息傳送包括有MMS。 1〇 較佳地,上述通訊器包括有藉由傳送來自上述認證裝 置之一啟動訊號來啟動上述通訊之功能,及具有接收對來 自上述認證裝置之上述啟使訊息之一回覆之功能,此外授 權上述活動請求。 較佳地,上述通訊器具有接收對來自上述認證裝置及 15上述非認證裝置之其一的啟始通訊之功能,及具有對上述 啟始訊息傳送一回覆之功能,此外授權上述活動請求。 車父佳地,上述通訊器包括有接收來自一外部裝置之一 啟始通訊之功能,及建立在上述認證裝置與上述非認證裝 置之間的一鏈結,此為授權上述活動請求。 20 較佳地,上述通訊器牽涉到接收來自上述認證裝置之 一訊息的功能及藉由傳送一響應至上述保密認證裝來完成 上述通訊之功能,藉此授權上述活動請求。 較佳地,上述通訊器包括有插入一辨識碼於上述回覆 給一請求端透過上述非認證裝置輸入之功能,及其中上述 22 1262005 玖、發明說明 驗證器更包括有決定上述識別碼是否已經透過上述非認證 裝被置接收。 較佳地,上述通訊器可以操作使用一自動聲音以與上 述認證裝置通訊。 5 較佳地,上述認證裝置是與一付費帳號一起使用,上 述裝置更包括有向上述請求活動對上述付費帳號收費的功 能。 較佳地,上述被請求活動是一網際網路瀏覽活動或銷 售點活動。 較佳地’上述被請求活動是存取至一網路。 較佳地,該裝置可以透過藍芽存取點來操作連接至上 述非認證裝置。 車义佳地,该裝置可以透過至少一個WLAN存取點來操 作連接至上述非認證裝置。 15 較佳地,該裝置可透過一 TCP/IP連接至上述非認證裝 置。 較佳地,上述通訊器可操作由上述非認證裝置獲得用 來與上述認證裝置通訊之一電話號碼。 較佳地,上述通訊器可操作獲的來自上述非認證裝置 20 之身份資料用以形成上述關聯。 較佳地,上述非認證裝置是下列一群組中之一,包括 有:一信用卡,一智慧卡,一紅外線裝置,一藍芽裝置, 一 PDA,一攜帶型電腦,一固定電腦,及一電腦網路。 較佳地,該裝置包括有一計數器’如果上述通訊沒有 23 1262005 玖、發明說明 在一預定次數限制之内完成,用以計算上述連接認證失敗 〇 較佳地,該裝置包括有用以登錄該非認證裝置之一登 錄功能。 5 較佳地,上述關聯器被連接至一認證者用以指示上述 活動請求被允許。 較佳地,上述認證通訊器可操作通訊上述認證至一與 上述非認證裝置相關之外部閘道器。 較佳地,上述認證通訊器可操作通訊上述認證至與上 10 述請求活動相關的一伺服器。 較佳地,上述認證通訊器藉由使用在一路由器上一路 徑表上的改變來可操作通訊上述認證。 根據本發明之第九特徵,其提供一種與ATM機器相容 的個人交易卡,包括有ATM讀取格式的一 ATM轉帳號碼及 15 一行動電話號碼,上述行動電話號碼是與上述個人交易卡 一起使用。 較佳地,上述號碼被儲存在一磁條中。 較佳地,上述號碼被儲存在一内部積體電路中。 根據本發明之第十特徵,其提供一種認證方法,包括 20 有·· 透過一保密鏈結與一認證裝置通訊; 驗證該通訊是與一預期的認證裝置;及 透過一非認證裝置來關聯該驗證與一活動請求,藉此 認證該非認證裝置之活動請求。 24 1262005 玖、發明說明 較佳地,上述認證裝置是一 GSM裝置及上述認證鏈結 是一 GSM鏈結。 較佳地,上述認證裝置是一 CDMA裝置及上述認證鏈 結是一CDMA鏈結。 5 較佳地,上述認證裝置是一 PDC裝置及上述認證鏈結 是一 PDC鏈結。 較佳地,上述認證裝置是一EDGE裝置及上述認證鏈 結是一EDGE鏈結。 較佳地,上述認證裝置是一 WCDMA裝置及上述認證 10 鏈結是一 WCDMA鏈結。 較佳地,上述認證裝置是一 GPRS裝置及上述認證鏈 結是一GPRS鏈結。 較佳地,上述認證裝置是一銥網路裝置及上述認證鏈 結是一銥網路鏈結。 15 較佳地,上述認證鏈結包括有牽涉到位在上述認證裝 置之内的一電信服務使用者身份模組之一保密鏈結。 較佳地,上述保密鏈結包括有牽涉到位在上述認證裝 置之内的一電信服務使用者身份模組。 較佳地,上述認證裝置是一行動電話。 20 較佳地,上述通訊包括有電子資料通訊。 較佳地,上述電子資料通訊包括有電子訊息傳送或 SMS訊息傳送。 較佳地,該方法包括有藉由傳送一啟動訊息至上述認 證裝置來啟動上述通訊及接收對來自上述認證裝置之上述 25 1262005 坎、發明g兌明 啟動訊息之回覆的功能,此外授權上述活動請求。 較佳地,該方法其中上述通訊牽涉到接收來自上述認 證裝置之一訊息及藉由傳送一回覆至上述認證裝置來完成 上述通訊’藉此授權上述活動請求。 5 較佳地,該方法包括有插入一密碼至上述回覆給一請 求端透過上述非認證裝置來輸入,及決定上述密碼是否已 經透過上述非認證裝置被接收。 較佳地,該方法包括有使用一自動聲音與上述認證通 訊。 10 較佳地’上述認證裝置是與一付費帳號一起使用,上 述方法更包括有對上述請求活動向該付費帳號收費。 較佳地’上述請求活動是一群組或動之一包括有一網 際網路瀏覽活動,銷售點活動及存取一網路。 較佳地’該方法包括有使用一紅外線或藍芽之其一。 15 較佳地,上述非認證中置是一TCP/IP鏈結。 較佳地’該方法包括有由上述非認證裝置獲得與上述 吕忍證裝置通訊之一電話號碼。 較佳地,上述非認證裝置是下列一群組中的一個,包 括有··一信用卡,一智慧卡,一紅外線裝置,一藍芽裝置 20 ,一 PDA,一攜帶型電腦,一固定電腦,及一電腦網路。 較佳地,該方法包括有一計數器,如果上述通訊沒有 在一預定次數限制之内完成,用以計算上述連接認證失敗 〇 較佳地,該方法包括有用以登錄該非認證裝置之一登 26 1262005 玖、發明說明 錄功能。 上述活動請求已經被允 較佳地,該方法,包括有輸出 許的指示。 車乂佳地i述指不是輸出至與相上認證裳置相關之一 5 外部閘道器。 之 較佳地’上述指示«出至與上述被請求活動相關 一伺服器。 較佳地,1上述指示早益&amp; 1?曰不疋藉由加入在一路由器上一路徑 表的改變來被輸出。 10 圖式簡單說明 為了對本發明有較佳的瞭解及顯示本發明如何成為有 用的,參考現將藉由純舉例說明與相伴隨的圖式來被完成 15 20 現以特定標號詳細地說明該等圖式,其強調被顯示的 特點是藉由範例及只說明本發明之較佳實施例之討論之目 的,及呈現為了提供其相信是為最有用及容易暸解本發明 原理及觀念特爭。就這-點而言,沒有意圖顯示本發明之 結構細節至需要對本發明之基本的瞭解,該描述及參考該 等圖式使熟習該項技術者知道本發明的許多種型式可以被 整合自在現時生活中。在相扮隨的圖式中: 第1圖疋一 SIM之簡化表示, 第2圖是顯示一 SIM之功能操作之一簡化方塊圖, 第3圖是根據本發明之一第一實施例顯示一客戶端裝 置透過一虛擬SIM閘道器連接至一非PLMN網路及由那裏 27 1262005 玖、發明說明 連接至一 PLMN網路之一簡化概要圖, 第4a圖是更詳細地顯示第3圖之實施例之一簡化方塊 圖,包括一模擬SIM閘道器之次系統, 第4b圖是顯示另一解決方法透過一非PLMN網路提供 5 PLMN服務之一簡化比較圖,該服務是為習知技藝, 第4c圖是一示範圖式,顯示一掌上型裝置及一可插入 其中的一卡片,使其適於與藍芽及類似的非PLMM網路使 用, 第5圖是為根據本發明之一實施例之一簡化流程圖, 10 顯示透過一非PLMN網路連接一非SIM裝置經一虛擬SIM閘 道器連接至一 PLMN網路, 第6圖是顯示一典型PLMN網路基礎架構之概要圖, 第7圖是根據本發明之一實施例之一概要圖,其顯示 使用一虛擬基地台控制器作為至該PLMN網路之一介面, 15 第8圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN及一 PLMN網路之間的協定層及分封資 料認證, 第9圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一 LAN與一 PLMN網路之間的協定層及交換電路資 20 料認證’ 第10圖是根據本發明之一較佳實施例之一概要圖,其 顯示與在GPRS及一無線LAN之間的連接相關的協定層, 第11圖是根據本發明之一較佳實施例之一概要圖,其 顯示與透過PLMN及無線網路之交換電路支援服務的提供 28 1262005 玖、發明說明 有關之協定層, 第12圖是根據本發明之一較佳實施例之一概要圖,其 顯示一虛擬SGSN+被使用作為在一無線LAN及一PLMN之 間的一介面, 5 第13圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN及一 PLMN網路之間的協定層及分封資 料認證, 第14圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一 PLMN之間的分封支援服務的提供 10 之協定層, 第15圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一PLMN之間的交換電路支援服務的 提供之協定層, 第16圖是根據本發明之一較佳實施例之一概要圖,其 15 顯示在一無線LAN與一 PLMN之間的提供分封資料流量管 理之協動層, 第17圖是根據本發明之一較佳實施例之一概要圖,其 顯示覆概共同區域及結合連接一熱點中心點之二無線網路 ,其可以被用來協調在網路之間的交接, 20 第18圖是根據本發明之一較佳實施例之一概要圖,其 顯示一無線網路存在於一蜂巢細胞或PLMN網路之覆蓋區 域之内, 第19圖是根據本發明之一較佳實施例之一概要流程圖 ,其顯示在二網路之間作為信號交遞之整個原理, 29 1262005 玖、發明說明 第20圖是根據本發明之一較佳實施例之一概要流程圖 ’其說明由行動裝置單元的觀點之信號交遞, 第21圖是根據本發明之一較佳實施例之一概要流程圖 ,其顯示信號交遞程序的另一實施例, 5 第22圖是一簡化概要圖,說明具有一共同中心點之二 非重疊WLANs, 第23圖是一簡化概要圖,說明二重疊WLANs中的每一 個是一不同熱點的一部份及在該等熱點範圍之外有一共同 中心點, 1 〇 弟24圖是第23圖情節的一變化例,其中該熱點沒有重 疊, 第25圖說明二重疊的plmN網路, 第26圖說明二非重疊plmN網路, 第27圖是根據本發明之又一較佳實施例之一簡化方塊 15 ,其顯示一認證機構, 苐28圖疋顯不使用在第27圖之保密鍵結之一裝置之一 簡化插圖, 第29圖是顯示使用在第27圖之非保密鏈結之一裝置之 一簡化插圖, 20 第3 0圖是根據本發明之一認證機構之另一實施例之一 簡化方塊圖,特別地允許控制存取至一有線或無線LaN, 及 第31圖是第27圖之該認證機夠之操作之一簡化流程圖 ,其中該設定可由任一裝置開始,保密或非保密,包括有 30 1262005 玖、發明說明 由一不同的裝置來設定。 c實施方式3 較佳實施例之詳細說明 本發明實施例提供一非PLMN網路經介面至一 PLMN 5 網路之連接。後述之本發明提供在該非PLMN網路及該 PLMN網路之間的介面,其使該PLMN網路偵測到經由該 非PLMN網路存取的單元,如同它們接存取該PLMN網路 一樣,那些透過該PLMN之無線電存取網路來存取該 PLMN網路之單元也是一樣的方式。因此,該PLMN網路 10 偵測提供服務給該被支援裝置之非PLMN網路簡化作為該 PLMN網路一之部份。 本發明包括有一組元件,該組元件互動作為使它的使 用者由一非PLMN或一 PLMN存取不同的資源的一系統, 而不需要有可以與該PLMN實體介面連接之一裝置(例如, 15 一行動電話)。在此所述的一些元件被安裝在存取該PLMN 網路或該非PLMN網路之裝置上,及有一些元件是在該非 PLMN網路與該PLMN網路之間的閘道器之内。有一些實 施例使用證明該行動電話使用者的代碼,如同由該行動電 話總機所產(例如,在一GSM SIM之内的IMSI及Ki,或在 20 一 CDMA裝置之内的MIN及ESN)—其他的實施例並不使用 此種代碼。該等實施例並不需要對該PLMN基礎結構作任 何修改;它們需要額外新的單元使得在該非PLMN網路與 該PLMN網路之間進行無縫存取。 允許由非PLMN至PLMN存取之一系統必需能執行至 31 1262005 玖、發明說明 少下列兩個動作。 1.認證使用者,亦即,證明該PLMN中,請求存取它 的資源或要對該PLMN帳號請求款項之其他資源之該使用 者是該PLMN之認證使用者。在一些例子中,此認證除了 5 身份的證明之外更包括有允許存取特定服務之權利。該 PLMN必需不能分辨由一非PLMN啟始的存取及經由該 PLMN自己存取網路之間,無論是一無線或是其他實體通 訊架構。此必需被完成,因為該PLMN必需被確認,而該 存取請求實際上是與該特定請求服務的一有效帳號相關。 10 2.在非PLMN及PLMN之間使用者流量的致能傳送。該 PLMN必需不能分辨起始來自一非PLMN或至一非PLMN之 流量與在該PLMN自身存取網路之間至使用者或來自使用 者之流量之間的差別。 所有的實施例是關於存取該非PLMN之該存取裝置的 15 認證及通訊保密,其中該服務是可以在存取時對與該存取 裝置相關之一 PLMN帳號請求款項的。 二實施例描述負責使該PLMN偵測到如同其經由標準 的蜂巢細胞節點來被完成的該存取之該實體單元;該等被 特性化後的實體單元因此被設計為模擬行蜂巢細胞節點。 20 此等節點被連接至一非PLMN及一 PLMN二者;它們可以 與它們所模擬的該等節點的方式來存在於該PLMN基礎架 構中。該VBSN(虛擬基地台控制器;Virtual Base Station Controller)似乎讓該PLMN作為一 BSS);在此情況下,該 被模擬的節點是一 BSC。該VSGN+似乎讓該PLMN作為一 32 1262005 玖、發明說明 行動電話細胞切換節點,亦即,一分封開關資料之SGSN 或一電路切換資料之MSC。該VBSC及該VSGN+可以執行 上述兩種功能。它們參與該非PLMN存取裝置至該PLMN 網路的認證;及它們可以將資訊流由該非PLMN網路傳送 5 至該PLMN網路。 在其中的二個實施例中一具有SIM的存取裝置,及混 合網路認證,該認證是依據藉由該PLMN運算子(與該 PLMN運算子提供給它們的使用者來存取該PLMN自身存 取網路之該PLMN運算子相同的識別參數)來提供給該使用 10 者之一代用符號(token),例如,對於一GSM PLMN系統, 那些存在於一 SIM之内者,或典型地直接儲存在一蜂巢細 胞電話中者)。在另二個實施例中一SSG(模擬SIM閘道器) 及虛擬SIM,該代用符號被一虛擬代用號所取代,該虛擬 代用符號是模擬該代用符號之一套裝軟體。在該第一實施 15 例中,該虛擬代用符號被安裝在該閘道器中(VBSC或 VSGN+),在前一實施例中,該套裝軟體是被安裝在該非 PLMN存取裝置中。 該系統支援許多種不同的認證方法。該模擬行蜂巢細 胞節點(VBSC或VSGN+)在每一種認證方法中拌演著一基 20 本的角色。我們將該等認證方法分類(及個別地對該等實 施例)成以下的類別。Preferably, the PLMN network is a UMTS network having an IuCS interface and an IuPS interface, and the switching circuit interface is operable to use the IuCS interface and the partitioning interface to operate the IuPS interface. 5 Preferably, the apparatus includes an analog cellular cell identification gateway associated with the privacy layer of the non-PLMN network and operable to determine that a connection device has been authenticated by the non-PLMN network, and operable to respond to a PLMN A network authentication queue is displayed to indicate that the above authentication has been successful. Preferably, the analog cellular cell identification gateway is an analog SIM 10 gateway and the PLMN network is a GSM network. Preferably, the simulated cellular cell identification is an analog ESN gateway and the PLMN network is a CDMA network. Preferably, the non-PLMN security layer is one of a group including SSL, IPsec, TLS, SRP, and SSH, and the authentication of the group of the above-mentioned group needs to allow the above-mentioned analog SIM gateway to provide The above authentication is responsive to the above PLMN network. Preferably, the security layer can be architected to set a desired level of privacy. Preferably, the apparatus includes a microphone for receiving a portion of the voice signal from the non-20 PLMN network for voice transmission, and for receiving the voiced signal from the PLMN network for partial decoding . The device most includes a microphone for receiving a portion of the voice signal from the non-PLMN network for voice transmission and for receiving a voice signal from the PLMN network for partial decoding. 13 1262005 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明 发明Preferably, the function of authenticating to one of the non-PLMN networks is further included. Preferably, the apparatus further includes functionality for a device connected to the non-PLMN network. Preferably, the apparatus includes functionality to update the location of the device connected to one of the non-PLMN networks. Preferably, the apparatus includes functionality to support the ability to connect to a device on the non-PLMN network to generate a service request. Preferably, the apparatus includes the functionality of providing the PLMN network having connection control data normalized to the PLMN network to integrate the corresponding activity to a full bill. The device is preferably architected to operate with one of the non-PLMN network connection management units to obtain non-PLMN network details from the quality of the connected user and the exchanged material. Preferably, the apparatus includes the functionality of the above-described details obtained by normalization to become a PLMN compatible specification. Preferably, the apparatus includes a cellular cell identification module associated therewith for providing a PLMN security function to allow access to a PLMN network over the wireless LAN. Preferably, the honeycomb cell identification module is mounted on the access card. Preferably, the honeycomb cell identification module is installed in the reverse direction at 14 1262005. Preferably, the honeycomb cell identification module is a SIM. Preferably, the device includes both a SIM carrier and a SIM reader. Preferably, the honeycomb cell identification module is a vertical honeycomb cell identification module. Preferably, the vertical honeycomb cell identification module is a vertical module including a SIM function. Preferably, the apparatus includes the ability to exchange authentication signals with an L A N gateway to thereby achieve network authentication. Preferably, the authentication signal is normalized and can be transferred between the gateway and the PLMN network to obtain PLMN authentication. According to a second feature of the present invention, there is provided a method of accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing a non-PLMN device having one of the non-PLMN networks The access card provides the access card with a cellular cell identification module, and provides the non-PLMN network with a gateway function to preserve the cellular 20 cell identification signal between the non-PLMN device and the PLMN network. According to a third feature of the present invention, there is provided a method of accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: 15 1262005 发明, the invention provides that the non-PLMN network described above is provided for authentication a non-PLMN device, one of the non-PLMN devices, and the non-PLMN network having a gateway function associated with the security authentication unit to operate the authentication unit and to maintain a hazard that is certified by the non-5 PLMN network Cell identification signal to the above PLMN network. According to a fourth feature of the present invention, there is provided a method of operating between a PLMN network and a non-PLMN network. A gateway for enabling a non-PLMN device to authenticate a method for using a PLMN connection, the method comprising: 10 authenticating the non-PLMN network by a first authentication protocol, and communicating with the PLMN network via a cellular authentication protocol The circuit exchanges signals, including the first protocol to indicate that the authentication is followed by the device authentication. According to a fifth feature of the present invention, there is provided a method of operating a security gateway between a PLMN network 15 and a non-PLMN network to enable a non-PLMN device to authenticate the use of the PLMN connection, the method comprising : exchanging signals with the PLMN network through a cellular authentication protocol to authenticate the non-PLMN network to connect to the device. According to a sixth feature of the present invention, there is provided a signal handoff manager for managing a signal handoff of a mobile device 20 unit for use in a first mobile device network access point and a second mobile device Communicating with a identifiable telecommunications work period between the network access points, wherein the first access point belongs to a first network, and the second access point belongs to a second network, and the manager can share Each network is stored and includes: 16 1262005 发明, invention description-mobile device unit matcher, the mobile device unit for cutting off and the matching and mating period maintenance device for connecting to other networks, The mobile device unit matcher is configured to transmit a work period between the thus paired mobile device units to thereby perform money transfer between the networks. Preferably, the signal handoff manager includes one of the in-single-area units. The signal handoff manager preferably includes a decentralized function located on a plurality of internal networks and interactive networks. Preferably, the network in the above network is a -PLMN network. Preferably, one of the networks in the above network is a wireless lan network. Preferably, the network in the above network is a wireless secondary network. Preferably, the signal delivery manager further includes a telecom working period active management list 7G. When the connection quality threshold cannot be reached, a current network is used by the current 15 to determine the mobile device unit to search around. The network and its connection parameters are determined to identify a maximum network from the above parameters and to indicate that the mobile device unit is connected to the best network. Preferably, the telecom working period active management unit is used with the mobile device single source matcher, thereby using the above indication to assist in the matching of the above 20. Preferably, the telecom working period active management unit is operable to determine whether the indicated matching has been successful, and when there is no successful connection, it is operable to instruct the mobile device unit to connect to the next best network. Preferably, the above-mentioned telecommunication working period active management unit is operable to continue the operation of the best unit until a connection indicating that the mobile device unit is connected to the Dingyi is successfully indicated. Preferably, the signal delivery manager includes a passive management unit during the telecommunications security period, and is determined by the mobile device unit when the connection quality threshold cannot be met, to instruct the mobile device unit to search for a nearby network and The connection parameters are determined to be connected to the network by the above-mentioned mobile network unit. Preferably, the signal handoff manager is operative to instruct the mobile device unit to be disconnected by a first network and then connected to the best network. Preferably, the signal delivery manager is operative to indicate that the mobile device unit is connected to the best network and then disconnected by the current network. Preferably, the signal handoff manager is operable to reduce the quality of the connection on a current network&apos; thereby forcing the mobile device unit to cut off and find another network. 15 Xiao (four) handover management 11 is best followed by the choice - the best network is used to reconnect, to talk about the quality of the connection on the current network, and to send an indication to the above action list "connected to the best selected above The signal delivery manager preferably operates to provide the above mobile device unit identification code for a plurality of possible networkable devices. ° 四 (4) handover management 11 preferably provides operation - a mobile device that may use the network Preferably, the parameters include any one of the following groups: a preferred access channel to the PLMN network, which can support the proxy of the preferred distributed SSC basic architecture for Internet access. Code, the above may use 18 1262005 发明, the invention describes the network load conditions. The above may obtain the general parameters of the network 'Internet access network access number, and the above may be available Preferably, the network of the first mobile device and the network of the second mobile device 5 are respectively a wireless hotspot of a single hotspot (H〇tsp〇t). Preferably, The first and second networks are overlapped networks and one of the mobile device units is located at a point overlapped between the networks. Preferably, the first and the second networks respectively use the same Preferably, the first network and the second network respectively use different network protocols. Preferably, the first and second networks are non-overlapping. Preferably, the first network is Preferably, the different hotspots have a region overlap and one of the signal handoff units is located in the overlap region. Preferably, the above-mentioned overlapping regions. The hotspot uses a single communication protocol. The car owner preferably uses different communication protocols for each of the hotspots. Preferably, the first network and the second network are respectively 20 networks. Preferably, the foregoing A PLMN and the second PLMN network use a single communication protocol. Preferably, the first PLMN and the second PLMN network respectively use different communication protocols. 19 1262005 发明, invention description preferably, the above And the second communication network has an overlapping area and a signal handover unit is disposed in the overlapping area. Preferably, the first network is a wireless area network and the second 5 network Preferably, the wireless local area network is located within the pLMN network coverage area. The signal handover manager preferably includes a wireless local area network as a higher priority than the PLMN. One of the sequence priority units, 10 causes the mobile device unit to automatically signal to the wireless local area network when it is within its range. According to a seventh feature of the present invention, there is provided an action device a signal delivery method of the unit, the mobile device unit communicates during a communication working period, and the signal handover is between an access point of an individual 15 between the first and second wireless networks, and the method includes : providing a control point common to both locations of the network; determining the identity of the mobile device unit at the control point, wherein the connection has been interrupted and its relative power is obtained Information of the working period; determining, at the above control point, the formation of a new connection with the mobile device unit; matching the identity at the control point, thereby matching the early with a mobile device - the existence of the telecommunications work period, wherein The mobile device unit has suspended the connection at a first access point and has been reconnected to a second access point 〇20 1262005. The invention provides an authentication device according to the eighth feature of the present invention, comprising: a communicator for communicating with a certified mobile device unit; a verifier for cooperating with the authentication mobile device unit to verify that the communication device is a preliminary authentication device; and a correlator for associating the verification with a non-authenticating device And the activity request, thereby authenticating the activity request of the non-authentication device. Preferably, the authentication device is a GSM device and the authentication link is a GSM link. Preferably, said authentication device is a CDMA device and said authentication link is a CDMA link. Preferably, the authentication device is a PDC device and the authentication link is a PDC link. Preferably, the authentication device is an EDGE device and the authentication chain is an EDGE link. Preferably, the authentication device is a WCDMA device and the authentication link is a WCDMA link. Preferably, the authentication device is a GPRS device and the authentication link is a GPRS link. Preferably, the authentication device is an Iridium device and the authentication key is a table network link. Preferably, the security link is involved in a telecommunications service user identity module of the encrypted mobile device. Preferably, the above-mentioned secret link is involved in one of the above-mentioned authentication devices 21 1262005 发明, the invention describes the telecommunication service user identity module. Preferably, the authentication device is a mobile phone. Preferably, the communication includes an electronic data communication. Preferably, the electronic data communication comprises electronic message transmission. 5 Preferably, the electronic message transmission includes SMS message transmission. Preferably, the electronic message transmission includes a WAP. Preferably, the electronic message transmission includes an email. Preferably, the electronic message transmission includes an EMS. Preferably, the electronic message transmission includes an MMS. Preferably, the communicator includes a function of initiating the communication by transmitting a start signal from the one of the authentication devices, and has a function of receiving a reply to the activation message from the authentication device, and further authorizing The above activity request. Preferably, the communicator has a function of receiving a start communication from one of the authentication device and the non-authentication device, and has a function of transmitting a reply to the start message, and further authorizing the activity request. Preferably, the communicator includes a function of receiving communication from one of the external devices and establishing a link between the authentication device and the non-authentication device, which is to authorize the activity request. Preferably, the communicator is operative to receive a message from the authentication device and to perform the communication by transmitting a response to the secure authentication device, thereby authorizing the activity request. Preferably, the communicator includes a function of inserting an identification code into the reply to a requesting end through the non-authenticating device, and wherein the 22 1262005, the invention verifier further includes determining whether the identifier has been transmitted. The above non-authenticated device is received. Preferably, the communicator is operable to use an automatic sound to communicate with the authentication device. Preferably, the authentication device is used with a payment account, and the device further includes a function of charging the payment account to the requesting activity. Preferably, the requested activity is an internet browsing activity or a point of sale activity. Preferably, the above requested activity is access to a network. Preferably, the device is operatively coupled to the non-authenticated device via a Bluetooth access point. In the case of Che Yijia, the device can be connected to the non-authenticated device via at least one WLAN access point. Preferably, the device is connectable to the non-authenticated device via a TCP/IP. Preferably, the communicator is operable to obtain a telephone number for communication with the authentication device by the non-authentication device. Preferably, the communicator is operable to obtain identity data from the non-authentication device 20 for forming the association. Preferably, the non-authentication device is one of the following groups, including: a credit card, a smart card, an infrared device, a Bluetooth device, a PDA, a portable computer, a fixed computer, and a Computer network. Preferably, the apparatus includes a counter 'If the communication is not 23 1262005, the invention is completed within a predetermined number of times to calculate the connection authentication failure. Preferably, the apparatus includes means for logging in to the non-authentication device. One of the login features. Preferably, said correlator is coupled to an authenticator to indicate that said activity request is permitted. Preferably, the authentication communicator is operable to communicate the authentication to an external gateway associated with the non-authentication device. Preferably, the authentication communicator is operable to communicate the authentication to a server associated with the requesting activity. Preferably, the authentication communicator is operable to communicate the authentication by using a change on a router on a router. According to a ninth feature of the present invention, there is provided a personal transaction card compatible with an ATM machine, comprising an ATM transfer number in an ATM read format and a mobile phone number, the mobile phone number being associated with the personal transaction card use. Preferably, the above number is stored in a magnetic strip. Preferably, the above number is stored in an internal integrated circuit. According to a tenth feature of the present invention, there is provided an authentication method, comprising: 20 communicating with an authentication device via a secure link; verifying that the communication is associated with an intended authentication device; and associating with a non-authenticating device Verification and an activity request, thereby authenticating the activity request of the non-authenticated device. 24 1262005 发明, DESCRIPTION OF THE INVENTION Preferably, the authentication device is a GSM device and the authentication link is a GSM link. Preferably, the authentication device is a CDMA device and the authentication link is a CDMA link. Preferably, the authentication device is a PDC device and the authentication link is a PDC link. Preferably, the authentication device is an EDGE device and the authentication link is an EDGE link. Preferably, the authentication device is a WCDMA device and the authentication 10 link is a WCDMA link. Preferably, the authentication device is a GPRS device and the authentication link is a GPRS link. Preferably, the authentication device is a network device and the authentication link is a network link. Preferably, the authentication link includes a secure link of a telecommunications service user identity module involved in the authentication device. Preferably, the security link includes a telecommunications service user identity module involved in the authentication device. Preferably, the authentication device is a mobile phone. 20 Preferably, the communication includes electronic data communication. Preferably, the electronic data communication includes electronic message transmission or SMS message transmission. Preferably, the method includes the function of initiating the communication by receiving an activation message to the authentication device, and receiving a response to the activation message from the authentication device, and authorizing the activity. request. Preferably, the method wherein the communication involves receiving a message from one of the authentication devices and performing the communication by transmitting a reply to the authentication device to thereby authorize the activity request. Preferably, the method includes inserting a password into the reply to a requesting end to input through the non-authenticating device, and determining whether the password has been received through the non-authenticating device. Preferably, the method includes using an automatic voice and the above authentication communication. Preferably, the authentication device is used with a billing account, and the method further includes charging the billing account for the requesting activity. Preferably, the request activity is a group or activity comprising an internet browsing activity, a point of sale activity and access to a network. Preferably, the method includes the use of one of infrared or blue buds. Preferably, the non-authenticated central device is a TCP/IP link. Preferably, the method includes obtaining a telephone number communicated with the above-mentioned non-authentication device by the non-authentication device. Preferably, the non-authentication device is one of the following groups, including a credit card, a smart card, an infrared device, a Bluetooth device 20, a PDA, a portable computer, and a fixed computer. And a computer network. Preferably, the method includes a counter, and if the communication is not completed within a predetermined number of times to calculate the connection authentication failure, preferably the method includes using one of the non-authentication devices to log in. 26 1262005 玖, invention description function. The above activity request has been allowed to be preferred, and the method includes an indication of the output. The car is not the one that is output to the phase of the authentication. 5 External gateway. Preferably, the above indication « is sent to a server associated with the requested activity. Preferably, the above indication of the early indication &amp; 1 is not output by adding a change to a routing table on a router. BRIEF DESCRIPTION OF THE DRAWINGS In order to provide a better understanding of the present invention and to show how the present invention may be useful, reference will now be made to the present invention by the accompanying drawings. The features of the present invention are set forth by way of example and description of the preferred embodiments of the invention. In this regard, the details of the present invention are not intended to be exhaustive or to provide a basic understanding of the present invention, and the description and reference to the drawings will enable those skilled in the art to know that many embodiments of the present invention can be in life. In the accompanying drawings: Figure 1 is a simplified representation of SIM, Figure 2 is a simplified block diagram showing the functional operation of a SIM, and Figure 3 is a first embodiment showing a first embodiment of the present invention. The client device is connected to a non-PLMN network through a virtual SIM gateway and is simplified from the simplified description of one of the PLMN networks. Figure 4a is a more detailed view of Figure 3. One simplified embodiment of the block diagram includes a secondary system for simulating a SIM gateway, and FIG. 4b is a simplified comparison diagram showing another solution for providing a 5 PLMN service over a non-PLMN network, the service being known Art, Figure 4c is an exemplary diagram showing a palm-sized device and a card insertable therein for use with Bluetooth and similar non-PLMM networks, Figure 5 is for use in accordance with the present invention One embodiment simplifies the flow chart, 10 shows that a non-SIM device is connected to a PLMN network via a virtual SIM gateway through a non-PLMN network, and FIG. 6 shows an overview of a typical PLMN network infrastructure. Figure 7, Figure 7 is in accordance with the present invention A schematic diagram of an embodiment showing the use of a virtual base station controller as an interface to the PLMN network, FIG. 8 is a schematic diagram of a preferred embodiment of the present invention, shown in a wireless Protocol layer and packetized data authentication between a LAN and a PLMN network, FIG. 9 is a schematic diagram showing a protocol layer between a LAN and a PLMN network, in accordance with a preferred embodiment of the present invention </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; A schematic diagram of a preferred embodiment showing a protocol layer relating to the provision of a switching circuit support service through a PLMN and a wireless network, and a description of the invention. FIG. 12 is a preferred embodiment of the present invention. An overview of an example showing a virtual SGSN+ being used as an interface between a wireless LAN and a PLMN, FIG. 13 is a schematic diagram of a preferred embodiment of the present invention, shown in a Wireless LAN and a PLMN Protocol layer and packetized data authentication between networks, Figure 14 is a schematic diagram showing a provision of a packet support service between a wireless LAN and a PLMN, in accordance with a preferred embodiment of the present invention Figure 15 is a schematic diagram showing a protocol for providing a switching circuit support service between a wireless LAN and a PLMN according to a preferred embodiment of the present invention, and Figure 16 is a diagram according to the present invention. A schematic diagram of a preferred embodiment, wherein 15 shows an association layer for providing packetized data traffic management between a wireless LAN and a PLMN, and FIG. 17 is a schematic diagram of a preferred embodiment of the present invention. a display of a common area and a wireless network coupled to a hotspot center point, which can be used to coordinate the handover between the networks, 20 FIG. 18 is a diagram of one of the preferred embodiments of the present invention A schematic diagram showing a wireless network present within a coverage area of a cellular or PLMN network, and FIG. 19 is a schematic flow diagram of a preferred embodiment of the present invention, shown in two networks Intersect as a signal The entire principle, 29 1262005 发明, the invention description 20 is a schematic flow chart according to a preferred embodiment of the present invention, which illustrates the signal handover from the viewpoint of the mobile device unit, and FIG. 21 is a diagram according to the present invention. A flow chart of a preferred embodiment showing another embodiment of a signal handover procedure, and FIG. 22 is a simplified schematic diagram illustrating two non-overlapping WLANs having a common center point, and FIG. 23 is a simplified A schematic diagram illustrating that each of the two overlapping WLANs is part of a different hotspot and has a common center point outside of the hotspots, and the Figure 1 is a variation of the plot of Figure 23, wherein the hotspot There is no overlap, Figure 25 illustrates a two-overlapping plmN network, Figure 26 illustrates a two-non-overlapping plmN network, and Figure 27 is a simplified block 15 showing a certificate authority in accordance with yet another preferred embodiment of the present invention. , Figure 28 shows a simplified illustration of one of the devices used in the security key of Figure 27, and Figure 29 is a simplified illustration showing one of the devices used in the non-secure chain of Figure 27, 20 3 0 is based on One of the other embodiments of the authentication mechanism simplifies the block diagram, in particular allows control access to a wired or wireless LaN, and FIG. 31 is a simplified flowchart of one of the operations of the authentication machine of FIG. Wherein the setting can be started by either device, confidential or non-confidential, including 30 1262005 发明, the invention description is set by a different device. c. Embodiment 3 DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Embodiments of the present invention provide a non-PLMN network interface to a PLMN 5 network connection. The invention described below provides an interface between the non-PLMN network and the PLMN network, which causes the PLMN network to detect units accessed via the non-PLMN network as if they were accessing the PLMN network. The same is true for those units that access the PLMN network through the PLMN's radio access network. Therefore, the PLMN network 10 detects that the non-PLMN network providing the service to the supported device is simplified as part of the PLMN network. The present invention includes a set of elements that interact as a system for its users to access different resources from a non-PLMN or a PLMN without the need for a device that can interface with the PLMN entity (eg, 15 a mobile phone). Some of the elements described herein are installed on a device that accesses the PLMN network or the non-PLMN network, and some components are within the gateway between the non-PLMN network and the PLMN network. Some embodiments use a code that proves the mobile phone user, as produced by the mobile phone switchboard (e.g., IMSI and Ki within a GSM SIM, or MIN and ESN within a 20 CDMA device) - Other embodiments do not use such code. These embodiments do not require any modification to the PLMN infrastructure; they require additional new units to enable seamless access between the non-PLMN network and the PLMN network. A system that allows access from non-PLMN to PLMN must be able to execute to 31 1262005. 1. An authenticated user, i.e., the authenticated user of the PLMN in the PLMN, the user requesting access to its resources or other resources requesting payment for the PLMN account. In some instances, this certification includes, in addition to the proof of 5 identity, the right to access a particular service. The PLMN must not be able to distinguish between a non-PLMN initiated access and its own access to the network via the PLMN, whether it is a wireless or other physical communication architecture. This must be done because the PLMN must be acknowledged and the access request is actually associated with a valid account number for that particular request service. 10 2. Enable transmission of user traffic between non-PLMNs and PLMNs. The PLMN must not be able to distinguish the difference between the traffic originating from a non-PLMN or to a non-PLMN and the traffic between the PLMN's own access network and the user or from the user. All embodiments relate to 15 authentication and communication security for accessing the access device of the non-PLMN, wherein the service is capable of requesting payment for a PLMN account associated with the access device upon access. The second embodiment describes the physical unit responsible for causing the PLMN to detect the access as it is done via a standard cellular cell node; the characterization of the physical unit is thus designed to simulate a row of cellular nodes. 20 These nodes are connected to both a non-PLMN and a PLMN; they may exist in the PLMN infrastructure in the same manner as the nodes they emulate. The VBSN (Virtual Base Station Controller) seems to have the PLMN as a BSS); in this case, the simulated node is a BSC. The VSGN+ seems to have the PLMN as a 32 1262005 发明, invention mobile phone cell switching node, that is, a SGSN of a switch data or a circuit switch MSC. The VBSC and the VSGN+ can perform the above two functions. They participate in the authentication of the non-PLMN access device to the PLMN network; and they can transmit the information stream from the non-PLMN network 5 to the PLMN network. In two of the embodiments, an access device having a SIM and hybrid network authentication is based on accessing the PLMN itself by the PLMN operator (the user provided to them by the PLMN operator) Accessing the same identification parameter of the PLMN operator of the network) to provide a token for the use of 10, for example, for a GSM PLMN system, those present within a SIM, or typically directly Stored in a cellular cell phone). In the other two embodiments, an SSG (Analog SIM Gateway) and a virtual SIM, the substitute symbol is replaced by a virtual substitute symbol, which is a set of software that simulates the substitute symbol. In the first embodiment, the virtual substitute symbol is installed in the gateway (VBSC or VSGN+). In the previous embodiment, the package software is installed in the non-PLMN access device. The system supports many different authentication methods. The simulated cellular cell node (VBSC or VSGN+) plays a role of 20 in each authentication method. We classify these authentication methods (and individually for these embodiments) into the following categories.

1.終端使用者存取裝置之PLMN類認證—在此等認證 方法中,該終端使用者存取裝置包括有一 SIM :後文包括 有該SIM是為一真實的SIM之實施例及該SIM是為虛擬SIM 33 1262005 玖、發明說明 之實施例(亦即,GSM系統之SW SIM及非GSM網路之儲存 蜂巢細胞電話識別碼)。一實體的SIM可以被安裝在該裝置 中,其可以被安裝在該存取卡,安裝在一專用卡,或安裝 在與其他周邊設備(例如,嵌入磁盤)。在此等方法中,該 5 行動電話細胞節點(該VBSC或者該VSGSN+)由該終端使用 者獲得該蜂巢細胞電話認證資訊,及將其與已經被儲存在 它的資料庫中該認證資料予以比對,或與由該PLMN基楚 架構中取的的認證資料一起比對。混合網路認證是單向相 關於或啟始具有被驗證及被認證的認證資料之該模擬蜂巢 10 細胞節點。 2. 存取裝置之非PLMN認正,藉由模擬器閘道器(存在 於模擬該PLMN基礎架構節點之内,例如,一蜂巢細胞節 點)——模擬SIM閘道器(SSG)接收該PLMN認證資料及使該 蜂巢細胞網路認為該裝置具有一實體代用符號/蜂巢細胞 15 密度及響應如同任何蜂巢細胞電話一樣。該閘道器事實上 認證使用不同認證協定之裝置,典型的為網際網路型式。 該非PLMN閘道器採用具有特別優先權之一節點之識別碼 ,而該行動電話網路提供此一節點。 3. 牽涉到該使用者PLMN裝置之認證,例如蜂巢細胞 20 電話一藉由在二存取裝置之間相關來連結一非認證非 PLMN存取裝置至一可認證PLMN存取裝置,例如,蜂巢 細胞電話。混合網路認證基於該使用者是該PLMN之一授 權使用者而允許該使用者存取該非PLMN。其假設其有一 VBSC或VSGSN+被用來提供由非PLMN存取至PLMN。對 34 1262005 玖、發明說明 於此種認證,其具有三種例子; i.在每一次該使用者請求存取該非PLMN時,PLMN提 供一個一次存取碼。此種方式需要在該等網路之間以及該 使用者之手動插入上可以同時進行通訊。 5 ii.自動一次存取節點。其種方式是在該非PLMN裝置 具有一用戶端單元來自動處理該程序,其或許可以被延伸 甚至使用在由該PLMN裝置(蜂巢細胞電話)自動地傳送該 存取碼至在非PLMN存取裝置中的該用戶端單元。 iii.一虛擬SIM之啟動。在此系統中,在該PLMN裝置 10 及該非PLMN裝置之間的一次關係被使用來啟動具有一虛 擬SIM之該非PLMN裝置或具有另一認證系統(可能是為該 SSG所使用)之認證資料之該非PLMN裝置。而後該使用者 可以經由該非PLMN來被該PLMN所認證及存取該PLMN而 不用包含在該PLMN之範圍内。 15 本發明之一特徵是提供可以被使用來介面連接於一非 PLMN網路及一 PLMN網路之間的一虛擬SIM閘道器。該閘 道器執行適宜於通訊連接該存取裝置之認證,像是在整 PLMN網路上之典型的網際網路協定環境認證;在其滿足 其已經被授權一連接裝置之後,而後其代表該存取裝置授 20 權其自身給該PLMN網路,如同在一裝置上具有一 SIM(包 括在那些網路中不使用SIM的相同蜂巢細胞識別碼)。另一 方面,此二閘極可以被整合在一起,其中一認證的中間步 驟是依據其他認證的中間步走驟而定。例如,該閘道器可 以將請求,詢問及響應由一鏈結傳送至另一鏈結。如果資 35 1262005 玖、發明說明 訊流被傳送至該PLMN,而後該閘道器加密使的其就像是 原來就具有SIM(或該相同的蜂巢細胞辯識碼)。本發明的 再一變化實施是使用一 SIM於該非SIM裝置上,最好是整 合該SIM於該裝置的連接卡中,因此可以提供不同型式的 5 WLAN及整合SIMs使用的其他連接卡。 當其最好不要整合使用一 SIM於該存取裝置中時,而 後使用不同的認證選擇的另一架構存在:配置具有一虛擬 SIM之該連接裝置。該虛擬SIM可以被儲存在具有將其演 算法植入在該存取裝置中的一處理器之内的其他存取裝置 10 之中,亦即,沒有特別硬體的軟體植入。詳細地,將在後 面予以描述之混合網路認證可以被使用來授權被裝在該該 遠端連接裝置之該虛擬SIM之啟動。配置有一虛擬之一裝 置透過VBSC或VSGSN來認證,此將在後面予以詳述,其 最後存在於該非PLMN網路及該PLMN網路之間,且其可 15 以產生用於虛擬SIMs或在其他網路中的其等效者(MIN, ESN)之假三連碼(rand, sres,kc),或其他認證資料,例如, 可以被該模擬SIM閘道器所認證的使用者名稱及密碼,以 及提供給該網路在如果一使用者將可以經由該PLMN存取 網路及該模擬節點存取時,該模擬節點將可與該PLMN交 20 換之相同或等同的資料。然而,如果此方法被使用時,而 後該PLMN不直接認證該使使用者(亦即,不驗證在他所擁 有的裝置中具有該SIM或等同的行動電話細胞識別碼),而 是依據該閘道器。該閘道器而後可以進行提供充電資訊給 該 PLMN。 36 1262005 玖、發明說明 在此要指出,在當一虛擬SIM被使用在該存取裝置中1. PLMN-type authentication of the terminal user access device - in the authentication method, the terminal user access device includes a SIM: the following includes an embodiment in which the SIM is a real SIM and the SIM is For the virtual SIM 33 1262005, an embodiment of the invention (ie, the SW SIM of the GSM system and the stored cellular cell phone identification code for the non-GSM network). A physical SIM can be installed in the device, which can be installed on the access card, installed on a dedicated card, or installed with other peripheral devices (e.g., embedded in a disk). In such methods, the 5 mobile phone cell node (the VBSC or the VSGSN+) obtains the cellular cell phone authentication information by the terminal user and compares it with the authentication data already stored in its database. Yes, or in comparison with the authentication material taken from the PLMN architecture. Hybrid network authentication is a one-way phase of the simulated cellular 10 cell node with or without authenticated authentication data. 2. Non-PLMN assertion of the access device, receiving the PLMN by an analog gateway (presented within the simulated PLMN infrastructure node, eg, a cellular node), an analog SIM gateway (SSG) The authentication data and the cellular network are considered to have a physical proxy symbol/hive cell 15 density and response as any cellular cell phone. The gateway actually authenticates devices that use different authentication protocols, typically in the Internet. The non-PLMN gateway uses an identification code having a node of a particular priority, and the mobile telephone network provides this node. 3. Involving authentication of the user PLMN device, such as cellular cell 20, by attaching a non-authenticated non-PLMN access device to an identifiable PLMN access device by correlation between the two access devices, eg, a hive Cell phone. Hybrid network authentication allows the user to access the non-PLMN based on whether the user is an authorized user of the PLMN. It is assumed that it has a VBSC or VSGSN+ that is used to provide access to the PLMN by non-PLMNs. For the purpose of such authentication, there are three examples; i. The PLMN provides a one-time access code each time the user requests access to the non-PLMN. This approach requires simultaneous communication between the networks and the manual insertion of the user. 5 ii. Automatically access the node at one time. The way is that the non-PLMN device has a client unit to automatically process the program, which may be extended or even used to automatically transmit the access code to the non-PLMN access device by the PLMN device (honeycomb cell phone). The client unit in . Iii. Start of a virtual SIM. In this system, a relationship between the PLMN device 10 and the non-PLMN device is used to initiate authentication of the non-PLMN device having a virtual SIM or having another authentication system (possibly for use by the SSG). The non-PLMN device. The user can then be authenticated by the PLMN via the non-PLMN and access the PLMN without being included in the PLMN. A feature of the present invention is to provide a virtual SIM gateway that can be used to interface between a non-PLMN network and a PLMN network. The gateway performs authentication suitable for communicating with the access device, such as a typical Internet Protocol environment authentication on the entire PLMN network; after it satisfies that it has been authorized to connect the device, then it represents the The device grants itself to the PLMN network as if it had a SIM on a device (including the same cellular cell identification code that does not use SIM in those networks). On the other hand, the two gates can be integrated, and the intermediate step of an authentication is based on the intermediate steps of other certifications. For example, the gateway can transmit requests, queries, and responses from one link to another. If the stream is transmitted to the PLMN, then the gateway encrypts it as if it had the SIM (or the same honeycomb cell identification code). Yet another variation of the present invention is to use a SIM on the non-SIM device, preferably the SIM in the connection card of the device, so that different types of 5 WLANs and other connection cards used by the integrated SIMs can be provided. When it is preferable not to integrate a SIM in the access device, another architecture using different authentication options exists: configuring the connection device with a virtual SIM. The virtual SIM can be stored in other access devices 10 having a processor embedding its algorithm in the access device, i.e., without a particularly rigid software implant. In detail, hybrid network authentication, which will be described later, can be used to authorize the activation of the virtual SIM installed at the remote connection device. A virtual device is configured to authenticate via VBSC or VSGSN, which will be described in detail later, which ultimately exists between the non-PLMN network and the PLMN network, and which may be 15 for generating virtual SIMs or other A pseudo triplet (rand, sres, kc) of its equivalent (MIN, ESN) in the network, or other authentication material, such as a username and password that can be authenticated by the analog SIM gateway. And providing to the network, if a user will be able to access via the PLMN access network and the analog node, the analog node will be able to exchange the same or equivalent information with the PLMN. However, if the method is used, then the PLMN does not directly authenticate the user (ie, does not verify that the SIM or equivalent mobile phone cell identification code is present in the device it owns), but instead relies on the gateway. Device. The gateway can then provide charging information to the PLMN. 36 1262005 玖, invention description Here it is pointed out that when a virtual SIM is used in the access device

時,而後該模擬PLMN閘道器最好是具有認證一虛擬SIM 之功能。 本發明之另一特徵提供一虛擬基地台控制器,其提供 5介面功能,使得該非PLMN網路出現至該PLMN網路,如 同一蜂巢細胞基地台控制器。該觀念可以甚至延伸至模擬 一蜂巢細胞基地台,因此該PLMN網路出現如同一或多個 蜂巢細胞基地台。基本上,所能提供者為一代理伺服器型 配置。至該虛擬基地台控制器之一延伸功能允許在該非 10 PLMN網路中的對等連接,在該非孔]^〇〇罔路之内的對等 連接,及導出於該網路來被該PLMN網路所管理的連接。 本發明之另一特徵提供該蜂巢細胞網路去同意經由一 非蜂巢細胞裝置之相關透過不同的路徑連接至該蜂巢細胞 電話之存取。 15 允許與該蜂巢細胞裝置相關之裝置經由區域網路連接 至該蜂巢細胞網路之關念被延伸使用至配置有蜂巢細胞模 組或非SIM之類似者之蜂巢細胞之網路。 本發明之另一特徵是提供行動裝置使用者一種維持無 縫連接之方法,其與其可以存取的不同通訊網路無關,及 20其是否由一連接型式移至另一型式無關。 在詳細介紹本發明之至少一實施例之前,其可以被瞭 解,本發明並不受限於後面的描述及圖式中的說明之應用 。本發明可以被應用在其他的實施例或其可以不同的方法 被實施或執行。再者,其可以瞭解,在此使用的用語及用 37 1262005 玖、發明說明 詞是用為說明的目的而不是被視為限制。 模擬SIM閘道器 現睛參考第1圖所示,其是為一簡要圖式顯示應用在 一行動電縣置之典型SIM。該SIM1G是一插人在該蜂巢 、田胞電々裝置14中的_SIM卡載體暨讀取器12的一小型模 組。该SIM提供該蜂巢細胞電話裝置的識別碼,及允許其 確貫連接至該蜂巢細胞電話網路。 ;現請參考第2圖,第2圖是為_簡化方塊圖,其顯示在 ASIM 10之内的主要次系統。該sim 包括有一認證次系 10 15 20 ’先16用以執仃保密身份來確保該網路是該電話號碼的合 使用者及加畨次系統,其力口密來自該網路之聲音及 資料通訊,及其解密來自該網路的輸人聲音或資料通訊, 而其使用像是A5之演算法。當然、’要注意,其他的加密系 ”、先或者70王不同的加⑨系統也可以被使用。加密及解密是 使用被供應為朗路所認證之—訊息所執行。要被使用的 認證及加密的正確型式是依據網路而^。在認證中,一隨 機數RAND被該網路送至該SIM,其中其被使用作為至一 單向功能A3之輸人。該,送回該功能輸出,其中該基地 台比較由該系統所完成的前—動作之SREs來施加rand至 A3。如果該響應符合廳8,而後該連接裝置被認證。 現請參考第3圖所示,其是為一概要圖示顯示一遠端 裝置透過一區域網路連接至一蜂巢細胞或pLMN網路。裝 置20然而具有處理能力來允許其辨識自己,其儘管是以不 匹配於該PLMN網路之要求的方法來執行。該裝置川不需 38 1262005 玖、發明說明 要是一行動電話或是具有一 SIM。此一裝置在此被稱為一 非PLMN裝置。裝置20連接至非PLMN網路22,其可以典 型是為具有無線存取點之一 LAN網路。該LAN典型地使用 TCP-IP作為一通訊協定。該LAN透過一模擬SIM閘道器24 5 來被連接至該PLMN或蜂巢細胞網路26。該模擬SIM閘道 器24提供在該TCP-IP認證及加密協定及該PLMN協定及之 間的橋樑,及因此允許裝置20被該PLMN網路所保密地確 認,即使其不具有SIM也一樣。 如第3圖中所示,在該裝置20及該閘道器之間的連接 10 是使用任何標準TCP/IP安全協定來保護,例如,安全插座 連結(secure socket link:SSL),TLS,Ispec,其是為典型使 用在IP網路之任何安全加密及認證技術。其在後將作進一 步的詳細描述,該安全技術被使用在該裝置20來不混淆的 來辨識自己至該閘道器。另一方面,像是IPSec之其他安 15 全協定也可以被使用在此目的;那就是說,該用語SSL在 當使用此解釋時是整合指為任何可以被使用來保護在該裝 置及該閘道器之間傳輸的資料之任何安全協定,包括有那 些操作在低層級及不使用一插座者。該閘道器在已經決定 該連接裝置的身份之後與該PLMN網路執行一 SIM匹配辨 20 識程序,其中該閘道器指示該PLMN已經被授權該連接裝 置。該授權程序將在第5圖中作更詳細細的說明。 現請參考第4 A圖所示,其是一簡化圖詳細顯示第3圖 之實施例,及特別地顯示該閘道器24之内部次系統。與前 面圖式相同的元件被給予相同的標號及除非對於瞭解本實 39 1262005 玖、發明說明 施例有必要下不會再一次參考。該模擬SIM閘道器24包括 有一資料庫次系統28,一存取次系統30,一交互影響次系 統32及一PLMN次系統34。該不同的次系統可以安裝在許 多的伺服器上或該整個閘道器可以被安裝在一單一伺服器 5 中,其依據所需的操作規模而定。該閘道器最好設置在安 全的位置,使得保護對該系統的實體破壞的可能情事。然 而,如將解釋如後,該閘道器不儲存任何將妥協SIM安全 要求的資訊。 該存取次系統28大體上包括有標準LAN安全設備,典 10 型地是建立一 SSL插座於該連接裝置於20。該存取次系統 辨識該裝置及通知該PLMN次系統34。該PLMN次系統通 訊至該PLMN網路26,其中一連接是需要的。該閘道器被 架構看起來像是一標準的行動電話細胞基地台,或是對於 該PLMN網路之一標準的SGSN,一標準的基地台控制器或 15 —標準的MSC,其傳送標準SIM身份資料至該PLMN次系 統。在當該裝置沒有一 SIM時,該次系統不會傳遞任何身 份資料至該裝置。除此之外,其簡要地核對該SSL或其他 TCP/IP基礎的認證協定是成功的及送出一標準的SIM確認 至該PLMN網路。 20 如果由該終端使用者存取裝置傳送至該PLMN之資訊 流是需要的,而後在需要提供與該PLMN網路匹配時,該 PLMN次系統34也可以執行外送資料及聲音的加密及送入 聲音及資料的解密。 該交互影響次系統提供在該IP基礎存取次系統與被使 40 1262005 玖、發明說明 用的該PLMN系統的之行動電話細胞協定之間的橋樑。 該資料庫次系統包括有該LAN之使用者的資料,因此 個別使用者可以被授權及給予存取該適當的服務。 現請參考第4B圖所示,其是為一簡化的比較圖,其顯 5 示允許非PLMN裝置存取一PLMN網路之另一實施例。如 上述,該非PLMN裝置是被該PLMN網路要求作下列事項; 1)使用者認證一該PLMN傳送一隨機數(RAND)至該存 取單元。為了被認證,該存取單元必需要響應該正確數字 (SRES)。該存取裝置藉由輸入該RAND至該SIM來決定 10 SRES,其中該秘密A3演算法處理此一動作及該SRES是為 該輸出。該SRES被送回至該PLMN,其中其被比作為該期 望值。在使用另一蜂巢細胞辨識系統的裝置中,該存取單 元提供MIN及ESN於一第一次存取中,TMSI及ESN緊接在 後,使其可以為該PLMN作類似的認證。 15 2)資料或聲音加密一由該存取裝置被送至該PLMN之 數位持有資訊(聲音或資料)被加密來避免竊聽。在GSM網 路的範例中,該SIM加密使用該A5演算法之資料流及由該 RAND所導出的一内部產生加密訊息。相同目的之不同演 算法被定義用於CDMA及其他網路。 20 上述要求可以藉由提供存取來至該非PLMN網路之一 SIM(或等同的行動電話細胞辨識資料)來被加以執行,及 此可以藉由整合該SIM至該使用者終端機來被加以完成。 該SIM可以整合至該裝置本身,整合成一分離的存取卡片 或模組或是一 SIM載體暨讀取器可以是該網路存取卡的一 41 1262005 玖、發明說明 部份。對於非SIM類蜂巢式網路,該蜂巢識別資料可以被 儲存在使用者終端機,特別的智慧卡或該存取卡中。為非 PLMN裝置所使用的存取卡使用相當多種類的存取技術, 包括有藍芽,無線區域域網路(802.11X)及有線10/100類乙 5 太網路。 此等卡片的規格包括有標準的PCMCIA , CompactFlash及其他的規格。 對於個人數位助理器及膝上型電腦而言,該存取卡通 常可以是内建式的。更可能地,其可以設置有一附加卡, 10 例如一 CompactFlash(或PCMCIA)附加卡。已經被建立的一 種標準包括有CompactFlash規格的藍芽卡。此卡片被修改 成包括一 SIM載體及該藍芽驅動軟體被修改成包括有該 SIM讀卡器及控制。 該SIM載體及讀卡器可以被加入無線區域網路卡,像 15 是CompactFlash或PCMCIA格式的 802.11b協定。 第4圖是基於該GSM/GPRS網路。該圖式的上半部份 顯示GPRS可以完全被使用的現在標準的方法。該SIM卡及 控制軟體被正常地安裝在該GPRS存取卡中。該GPRS存取 卡被安裝在該使用者設備(User Device)中,該設備典型地 20 是為一個人數位助理器,膝上型電腦或行動電話。 該方法之原理被顯示在第4B圖。在第4B圖中,一比 較被顯示在該圖式的上半部及該圖式的底半部之間,其中 上半部中,標準的GPRS被使用及SIM存取是透過一 GPRS 存取卡36來提供,及在該底半部中,一非PLMN網路之中 42 1262005 玖、發明說明 間區域仲裁及SIM存取透過一藍芽存取卡38被提供。 在該圖之下方部份,該GPRS存取卡36被一藍芽存取 卡3 8所取代。該控制軟體被安裝在此相同的卡片上。該藍 穿存取卡被安裝在該使用者設備中及透過該藍芽網路溝通 5 ° GPRS訊息是經由藍芽及在該網路的邊緣上被傳輸。藍 芽傳輸是被標準的GPRS傳輸所取代如該圖中所示。 相較於第4A圖所示者,上述方法的優點是上述SIM被 包括在一存取卡裝置中。指定值是被限制在一特別的卡片 ,其也就是說,該解決方法可以單純的基於提供SI]V[s在該 10非pLMN裝置上來被實現,及實質上沒有額外的功能必需 被提供至任何相關的網路。申請使用者被提供可以存取所 有的網路服務。所有的存取及加密使用標準及完整未修改 的PLMN技術。該供應商可以被保護免於被欺騙,因為它 是依據它自己的保密系統。該存取網路總機是藉由相同的 15 ί试及測試PLMN系統來保護免於被欺騙。 參考請看第5圖,其是透過一 LAN連接藉由一非SIM裝 置來獲得存取該蜂巢式無線或PLMN網路之方法的流程圖 。該圖式參考至第4A圖之實施例。相較下,第4B圖之裝 置以一完整標準方式來連接。根據第5圖所示,該裝置在 20啟始步驟S1中連接至該LAN,及而後一 SSL軟體資料結構 (socket)在下一步驟S2中被建立。至該LAN的連接最好是 使用標準的網路瀏濩器來執行,其最好是可以支援一 SSL 軟體資料結構或其他的TCP/IP認證協定。該軟體資料結構 是標準的且典型地可使用64,128位元加密鑰匙或其他經 43 1262005 玖、發明說明 同思加搶輸匙資料串來加密通訊,藉此提供通訊安全而免 於被竊聽。該軟體資料結構一但被建立時是被使用在二階 段&quot;忍證操作,包括有第一步驟S3,其中該伺服器認證本身 至'亥連接客戶端。伺服器認正通常是使用簽暑認證的系統 5來達成’例如該Χ·5〇9標準伺服器認證,其再確認該連接 裝置疋與一經確認及在必要時可以追蹤的伺服器通訊。一 旦該伺服器已經認證本身至該裝置,而後在步驟S4,該使 用者通¥被要求提供一使用者名稱及密碼。此最好使用一 私準對活框來執行。該使用者名稱及密碼與該伺服器資料 10庫比較及該伺服器而後可以決定該連接裝置被給與的該連 接協定。 如果步驟3及步驟4成功地在該閘道器與該裝置之間溝 通協調,而後在步驟5中,該閘道器提示該pLMN—連接是 需要的。在步驟6中,該PLMN藉由提供一 SIM保密三連碼 (triplet)來響應’該三連碼包括一隨機數rand,來自該 SIM至該隨機三連碼之一期望響應猶8及一加密鑰匙&amp;。 在-SIM裝置的正常例子中,RAN·送至該讀,其是被 使用作為單向功能的輸入。該SIM送回該功能輸出,其中 該基地台與SRES比較。如果該響應匹配於SRES,則該連 20接裝置被授權。然而,在本例中,該連接裝置不是一 _ 裝置。在步驟37中,反而該PLMN系統43簡易地和對該連 接裝置在步驟3及步驟4被成功地認證,而後送出一認證響 應至該PLMN。在步驟8中,該閘道器在後續通訊使用該加 密输匙Ke來負責資料及聲音的加密。聲音最好總是在該間 44 1262005 玖、發明說明 道器上由該SSL來解密,及可以根據該PLMN網路的要求 來使用該A5演算法及該加密鑰匙Kc來接續地再加密。 上述實施例的優點可以加諸於該網路使用者,該LAN 總機及該PLMN或蜂巢網路總機。該網路使用者使用到由 5 一標準PLMN所提供的所有加密,但可以使用一低成本裝 置來連接或簡單地使用在當時方便取得的一裝置,而不需 要任何特別的硬體套件。對於該LAN總機,它可以基於它 自己的TCP /IP認證技術來提供全套的連接服務。最後地 ,對於該PLMN總機,本實施例提供該網路使用者連接經 10 該LAN可以具有全套的服務的裝置,以確保其響應將可以 被該LAN總機接受。 雖然上述例子已經使用一標準A或Gb介面描述GSM系 統,本實施例除了應用在GPRS之外,還可以用在EDGE, WBCDMA,UMTS,3G,CDMAone,CDMA2000,3GPP 15 ,3GGP2,PDC及其它PLM標準。上述所列者並不是所有 者,及其預計額外的協定將假以時日被加在該PLMN領域 中〇 該非PLMN網路典型地可以是一有線LAN,藍芽, 820·11(χ),無線LAN或類似者。 20 雖然上述已經針對SIMs及GSM予以描述,該相同的解 決方案使用在任何系統作為蜂巢細胞網路識別及/或保密 ,及特別地包括在CDMA網路中的MIN及ESN。 範例: 上述之一範例可以是使用802.11存取卡連接至一 45 1262005 玖、發明說明 802.11 LAN之一 PDA,其中其被連接至該GSM或GPRS蜂 巢細胞網路。根據上述實施例,此一連接可以在提供該 PDA具有一 GSM相容SIM時來被達成。Preferably, the analog PLMN gateway then has the function of authenticating a virtual SIM. Another feature of the present invention provides a virtual base station controller that provides a five-interface function such that the non-PLMN network appears to the PLMN network, such as the same cellular cell base station controller. This concept can even extend to simulating a honeycomb cell base station, so that the PLMN network appears as one or more honeycomb cell base stations. Basically, the provider is a proxy server type configuration. An extension function to the virtual base station controller allows a peer-to-peer connection in the non-10 PLMN network, a peer-to-peer connection within the non-hole, and is derived from the network to be used by the PLMN The connection managed by the network. Another feature of the invention provides the cellular network to agree to access to the cellular telephone via a different path via a non-cellular cell device. 15 The means for allowing the device associated with the honeycomb cell device to be connected to the cellular network via the regional network is extended to a network of honeycomb cells configured with a honeycomb cell model or a non-SIM similar. Another feature of the present invention is to provide a method for a mobile device user to maintain a seamless connection regardless of the different communication networks that can be accessed, and whether or not it is moved from one connection type to another. Before the present invention is described in detail, it is understood that the invention is not limited by the description and the description of the drawings. The invention may be applied to other embodiments or may be implemented or carried out in different methods. Furthermore, it can be understood that the terms used herein and the description of the invention are for illustrative purposes and are not to be considered as limiting. Analog SIM Gateway The current reference is shown in Figure 1, which is a typical SIM for a mobile phone. The SIM1G is a small module of a _SIM card carrier and reader 12 inserted in the cellular and field cell device 14. The SIM provides an identification code for the cellular cell telephone device and allows it to be operatively coupled to the cellular cell telephone network. Referring now to Figure 2, Figure 2 is a simplified block diagram showing the primary subsystem within ASIM 10. The sim includes a certification sub-system 10 15 20 'first 16 for obsessing the secret identity to ensure that the network is the user of the phone number and the addition system, the voice and data from the network Communication, and its decryption of incoming voice or data communication from the network, and its use is like the algorithm of A5. Of course, 'note that other encryption systems', first or 70 different King 9 systems can also be used. Encryption and decryption are performed using the message that is supplied as Langlu-certified. The authentication to be used and The correct type of encryption is based on the network. In the authentication, a random number RAND is sent to the SIM by the network, which is used as the input to the one-way function A3. Wherein the base station applies rand to A3 in comparison with the pre-action SREs completed by the system. If the response conforms to hall 8, then the connecting device is authenticated. Referring now to Figure 3, it is one The schematic illustration shows a remote device connected to a cellular cell or pLMN network via a local area network. Device 20, however, has processing capabilities to allow it to identify itself, albeit in a manner that does not match the requirements of the PLMN network. The device does not need to be 38 1262005. The invention is a mobile phone or has a SIM. This device is referred to herein as a non-PLMN device. The device 20 is connected to a non-PLMN network 22, which can be coded.The type is a LAN network with one of the wireless access points. The LAN typically uses TCP-IP as a communication protocol. The LAN is connected to the PLMN or cellular network 26 via an analog SIM gateway 24 5 . The analog SIM gateway 24 provides a bridge between the TCP-IP authentication and encryption protocol and the PLMN protocol, and thus allows the device 20 to be securely acknowledged by the PLMN network even if it does not have a SIM. As shown in Figure 3, the connection 10 between the device 20 and the gateway is protected using any standard TCP/IP security protocol, such as secure socket link (SSL), TLS, Ispec, which is any secure encryption and authentication technology typically used in IP networks, which will be described in further detail below, which is used in the device 20 to identify itself to the gateway without confusion. On the other hand, other IPSec-like agreements can also be used for this purpose; that is, the term SSL is used when it is used to refer to any device that can be used to protect the device and Transmission between gateways Any security agreement for the data, including those operating at a lower level and not using a socket. The gateway performs a SIM matching process with the PLMN network after determining the identity of the connected device, wherein the gate The router indicates that the PLMN has been authorized to connect the device. The authorization procedure will be described in more detail in Figure 5. Referring now to Figure 4A, which is a simplified diagram showing the implementation of Figure 3 in detail. For example, and particularly showing the internal subsystem of the gateway 24. The same components as the previous figures are given the same reference numerals and will not be referred to again unless it is necessary to understand the present invention. . The analog SIM gateway 24 includes a database subsystem 28, an access subsystem 30, an interaction subsystem 32 and a PLMN subsystem 34. The different subsystems can be installed on a number of servers or the entire gateway can be installed in a single server 5, depending on the scale of operation required. The gateway is preferably placed in a secure position to protect against possible damage to the system. However, as will be explained later, the gateway does not store any information that would compromise the SIM security requirements. The access subsystem 28 generally includes a standard LAN security device, and is typically configured to establish an SSL socket at the connection device 20. The access subsystem recognizes the device and notifies the PLMN subsystem 34. The PLMN secondary system communicates to the PLMN network 26, one of which is required. The gateway is constructed to look like a standard mobile phone cell base station, or a standard SGSN for the PLMN network, a standard base station controller or a 15-standard MSC that carries the standard SIM Identity data to the PLMN subsystem. When the device does not have a SIM, the secondary system does not pass any identity data to the device. In addition, it briefly verifies that the SSL or other TCP/IP-based authentication protocol is successful and sends a standard SIM confirmation to the PLMN network. 20 If the information flow transmitted by the terminal user access device to the PLMN is needed, and then needs to provide matching with the PLMN network, the PLMN secondary system 34 can also perform encryption and delivery of the outgoing data and voice. Decryption of sound and data. The interaction affects the secondary system to provide a bridge between the IP base access subsystem and the mobile phone cellular protocol of the PLMN system used by the invention. The database subsystem includes data for users of the LAN, so individual users can be authorized and given access to the appropriate service. Referring now to Figure 4B, which is a simplified comparison diagram, another embodiment of allowing a non-PLMN device to access a PLMN network is shown. As described above, the non-PLMN device is required by the PLMN network to do the following: 1) The user authenticates that the PLMN transmits a random number (RAND) to the access unit. In order to be authenticated, the access unit must respond to the correct number (SRES). The access device determines 10 SRES by inputting the RAND to the SIM, wherein the secret A3 algorithm processes the action and the SRES is for the output. The SRES is sent back to the PLMN where it is compared to the expected value. In a device that uses another cellular cell identification system, the access unit provides MIN and ESN for a first access, and the TMSI and ESN are immediately followed to enable similar authentication for the PLMN. 15 2) Data or voice encryption - Digitally held information (sound or data) sent by the access device to the PLMN is encrypted to avoid eavesdropping. In the GSM network example, the SIM encryption uses the data stream of the A5 algorithm and an internally generated encrypted message derived by the RAND. Different algorithms for the same purpose are defined for CDMA and other networks. 20 The above requirements may be performed by providing access to one of the non-PLMN networks (or equivalent mobile phone cell identification data), and this may be performed by integrating the SIM to the user terminal. carry out. The SIM can be integrated into the device itself, integrated into a separate access card or module or a SIM carrier and reader can be part of the network access card. For a non-SIM type cellular network, the cellular identification data can be stored in a user terminal, a special smart card or the access card. Access cards used for non-PLMN devices use a wide variety of access technologies, including Bluetooth, wireless area network (802.11X) and wired 10/100. Specifications for these cards include standard PCMCIA, CompactFlash and other specifications. For personal digital assistants and laptops, the access cartoon can often be built-in. More likely, it can be provided with an add-on card, such as a CompactFlash (or PCMCIA) add-on card. One standard that has been established includes a Bluetooth card with a CompactFlash specification. The card is modified to include a SIM bearer and the Bluetooth driver software is modified to include the SIM card reader and control. The SIM carrier and card reader can be added to a wireless local area network card, such as 15 in the 802.11b protocol in CompactFlash or PCMCIA format. Figure 4 is based on the GSM/GPRS network. The top half of the diagram shows the current standard method that GPRS can be fully used. The SIM card and control software are normally installed in the GPRS access card. The GPRS access card is installed in the User Device, which is typically a number of digits assistant, laptop or mobile phone. The principle of this method is shown in Figure 4B. In Figure 4B, a comparison is shown between the upper half of the figure and the bottom half of the figure, in which the standard GPRS is used and the SIM access is accessed via a GPRS. The card 36 is provided, and in the bottom half, a non-PLMN network 42 1262005 玖, invention inter-region arbitration and SIM access are provided via a Bluetooth access card 38. In the lower portion of the figure, the GPRS access card 36 is replaced by a Bluetooth access card 38. The control software is installed on the same card. The blue access card is installed in the user device and communicates through the Bluetooth network. The 5 GPRS message is transmitted via the Bluetooth and on the edge of the network. Bluetooth transmission is replaced by standard GPRS transmission as shown in the figure. An advantage of the above method is that the SIM described above is included in an access card device as compared to that shown in Figure 4A. The specified value is limited to a particular card, that is, the solution can be implemented solely on the basis of providing SI]V[s on the 10 non-pLMN device, and substantially no additional functionality must be provided to Any related network. Applicants are provided with access to all web services. All access and encryption uses standard and complete unmodified PLMN technology. The supplier can be protected from being deceived because it is based on its own security system. The access network switchboard is protected from being spoofed by the same 15 ί test and test PLMN system. Referring to Figure 5, a flow diagram of a method for accessing the cellular or PLMN network via a LAN connection via a non-SIM device. This figure refers to the embodiment of Figure 4A. In contrast, the device of Figure 4B is connected in a completely standard manner. According to Fig. 5, the apparatus is connected to the LAN in step 20, and a subsequent SSL software material structure (socket) is established in the next step S2. The connection to the LAN is preferably performed using a standard web browser, preferably supporting an SSL software profile or other TCP/IP authentication protocol. The software data structure is standard and can typically be encrypted using a 64, 128-bit encryption key or other confusing data link to provide communication security from eavesdropping. . Once the software data structure is created, it is used in the second stage &quot;bearing operation, including the first step S3, where the server authenticates itself to the 'Hail Connection Client'. The server recognizes that the system 5, which is certified by the summer heat certificate, is usually used to achieve, for example, the standard server authentication, which reconfirms the connection device to communicate with the server that is confirmed and can be tracked if necessary. Once the server has authenticated itself to the device, then at step S4, the user is asked to provide a username and password. This is best done using a private alignment box. The username and password are compared to the server profile 10 library and the server can then determine the connection agreement to which the connection device is assigned. If steps 3 and 4 are successfully communicated between the gateway and the device, then in step 5, the gateway prompts the pLMN-connection to be required. In step 6, the PLMN responds by providing a SIM secret triplet (the triplet code includes a random number rand, and the expected response from the SIM to the random triplet code is 8 and an encryption Key &amp; In the normal example of a -SIM device, the RAN is sent to the read, which is used as an input to the one-way function. The SIM sends back the function output, where the base station is compared to the SRES. If the response matches SRES, then the device is authorized. However, in this example, the connecting device is not a device. In step 37, instead, the PLMN system 43 is successfully authenticated to the connection device in steps 3 and 4, and then an authentication response is sent to the PLMN. In step 8, the gateway uses the encryption key Ke for subsequent communication to encrypt the data and sound. Preferably, the sound is always decrypted by the SSL at the time of the invention, and the A5 algorithm and the encryption key Kc can be used to re-encrypt according to the requirements of the PLMN network. The advantages of the above embodiments can be applied to the network user, the LAN switchboard and the PLMN or cellular network switchboard. The network user uses all of the encryption provided by the 5 standard PLMN, but can use a low cost device to connect or simply use a device that was readily available at the time, without the need for any special hardware kit. For this LAN switchboard, it can provide a full range of connectivity services based on its own TCP/IP authentication technology. Finally, for the PLMN switchboard, the present embodiment provides means for the network user to connect via the LAN to have a full set of services to ensure that its response will be accepted by the LAN switchboard. Although the above example has used a standard A or Gb interface to describe the GSM system, this embodiment can be used in EDGE, WBCDMA, UMTS, 3G, CDMAone, CDMA2000, 3GPP 15, 3GGP2, PDC and other PLMs in addition to GPRS. standard. The above listed are not the owners, and it is expected that additional agreements will be added to the PLMN field over time. The non-PLMN network can typically be a wired LAN, Bluetooth, 820·11 (χ), wireless LAN or Similar. 20 Although the above has been described for SIMs and GSM, the same solution uses MIN and ESN in any system as a cellular network for identification and/or privacy, and in particular in CDMA networks. Example: One example of the above may be to use an 802.11 access card to connect to a PDA, one of the 802.11 LAN PDAs, which is connected to the GSM or GPRS cellular network. According to the above embodiment, this connection can be achieved when the PDA is provided with a GSM compatible SIM.

虛擬SIM 5 現請參考第4C圖,其是為一簡化比較圖,其顯示允許 非PLMN裝置存取一 PLMN網路之一變化實施例。該方法 是適合在當連接至該PLMN緊需要在認證及會計目的時, 但沒有使用者流量在該存取裝置及該PLMN之間被交換。 如上所述,在此方法中,該終端使用者存取裝置配備有一 10 虛擬SIM。該模擬蜂巢細胞節點(VBSC或VSGSN+)具有一 認證資料庫,其中所有具有需擬SIM(或其他方法模擬作為 蜂巢細胞辯識之認證替用碼)網路使用者的認證資訊。該 虛擬SIM可以許多方式來啟始或使用該資訊,其中至少部 份者僅可用於一存取或存取嘗試。詳而言之,在後面將被 15 描述之混合網路認證可以被使用來認證安裝在遠端連接裝 置之該虛擬SIM,及使用來讓該蜂巢細胞身份與儲存在該 模擬蜂巢細胞節點的資料庫之該認證資料相關。配備有一 虛擬SIM之一設備是被一 VBSC或一 VSGSN來認證,如後 將詳細描述,其最好存在於該非PLMN網路及該PLMN網 20 路之間,及其可以產生用於虛擬SIMs或在其他網路中之其 他等效者之假三連碼(rand,sres,kc)。然而,如果此方法 被加以使用,則該PLMN不直接認證該使用者(亦即,不會 確認他所擁有的設備中具有SIM或等效蜂巢細胞身份),但 是依賴該閘道器。該閘道器其後可以進一步提供會計資料 46 1262005 玖、發明說明 至該PLMN,或該會計資料可以依據該非PLMN,或者上 述兩種情況皆是。 在當傾向於他們沒有包括有SIM s或其他硬體基礎辨識 器(智慧卡或其等效者)用於非PLMN至PLMN連接時,該虛 5 擬SIM方法可以被使用於存取裝置;或它可以被使用在非 PLMN至PLMN連接,其中該PLMN不支援整合SIM基礎認 證一例如,CDMA。 在此方法中,一虛擬(通常是軟體)SIM被安裝在該遠 端裝置。該遠端裝置不具有一 SIM。該SSG被一指派的閘 10 道器所取代,其產生假三連碼至該遠端裝置。該閘道器及 該遠端裝置共用該虛擬SIM保密鑰匙(其被儲存在該模擬細 胞節點認證資料庫)。該閘道器使用它來產生該三連碼 (RAND,SRES,KC),及產生類GSM挑戰該遠端裝置(亦即 RAND) 〇該三連碼可以藉由為該GSM認證協定所使用的相 15 同演算法來產生(例如,HMAC-SHA-1或HMAC-MD5)。相 同演算法的要求將為該虛擬SIM及該模擬蜂巢細胞節點 (VBSC或VSGSN+)所使用。該遠端裝置接著使用該虛擬 SIM來響應該挑戰,及送出SRES至該模擬蜂巢細胞節點( 經由該非PLMN網路)。當該認證程序被成功地完成時,而 20 後該終端使用者存取裝置及該模擬蜂巢細胞節點共用一加 密鑰匙(Kc)如同在該GSM系統中一樣,其不為其他人所知 悉。該終端使用者存取裝置及該模擬蜂巢細胞可以使用此 加密输匙來加密它們之間的交通流量。然而,此加密鍮匙 不能使用在加密被指定至該PLMN網路之流量,因為該 47 1262005 玖、發明說明 PLMN不具有此加密餘匙。 SIM或USIM可以此種方法實現。不像是SIM--軟體 SIM可以被複製,使得使用虛擬SIM之認證協定包括有複 製偵測機構。 5 虛擬基地台控制器(VBSC) 現請參考第6圖,其是為一標準GSM網路配置的簡化 方塊圖。一基地台系統(BSS)40支援遠端位置行動裝置42 。其透過一 MSC 44連接至一電路交換網路,在此例中為 該PSTN,及其透過一 SGSN被連接至一分封交換網路,像 10 是網際網路。要觀察的關鍵點是該基地台介面至該MSC是 使用A界面於電路交換連接及使用Gb介面於分封連接。此 等介面可以將如後詳述被該V B S C使用使得讓該P L Μ N像是 在該GPS網路中的任何其他BSS—樣。 現請參考第7圖所示,其是顯示一非PLMN網路48之一 15 簡化方塊圖,其係由一虛擬基地台控制器VBSC 50介面連 接至第6圖之該GSM網路。與前面圖式相同的元件給予相 同的標號,及除非在本發明的暸解下必要,否則不再次予 以說明。該非PLMN網路48透過一連串的存取點連接至遠 端裝置52及具有以任何典型網路型式之其自己的網路伺服 20 器。一SIM伺服器56被顯示提供有一模擬SIM閘道器,或 如上述型式的一虛擬SIM伺服器認證。 如在第6圖中所示之該標準基地台,該VBSC 50使用 該A介面以達到電路交換網路像是該PSTN及該GB網路用 以達到分封交換網路。該VBSC(虛擬基地台控制器)是作用 48 1262005 玖、發明說明 為在該非PLMN存取網路(藍芽,802.11等)及該PLMN之間 的一代理閘道器。該VBSC透過該A及Gb介面連接至該 PLMN。有一些介面是該PLMN使用來與一BSC通訊及因此 該VBSC出現將該PLMN視為一 BSC。 5 該VBSC 62與使用該非PLMN網路之一存取裝置52通 訊,例如PDA,或筆記型電腦。該通訊是由安裝在該存取 網路或一網路伺服器上的一客戶端應用軟體來完成,及使 用基於TCP/IP或其他匹配的標準協定之一通訊通道來被執 行。通訊對於該VBSC是需要用於上述該SIM伺服器作為認 10 證及加密服務使用。該終端使用者存取裝置可以具有安裝 在其中的一虛擬SIM,及該SIM伺服器可比是一虛擬SIM驗 證器,或其可以是一模擬SIM閘道器如前述。 該VBSC最好也可以與在該存取裝置上的一分封資料 或在電路交換軟體客戶端通訊。該客戶端可以被網路使用 15 者獲得被請求得該特定服務像是公司VPN,網際網路存取 ,存取至在該蜂巢細胞網路之内的伺服器或聲音交換連接 〇 該存取裝置客戶端應用軟體典型地是為作為應用的下 載軟體,特別是當該存取裝置是一PDA或筆記型電腦。Virtual SIM 5 Referring now to Figure 4C, which is a simplified comparison diagram showing a variant embodiment that allows a non-PLMN device to access a PLMN network. The method is suitable when the connection to the PLMN is urgently required for authentication and accounting purposes, but no user traffic is exchanged between the access device and the PLMN. As described above, in this method, the terminal user access device is equipped with a 10 virtual SIM. The simulated honeycomb cell node (VBSC or VSGSN+) has an authentication database, all of which have authentication information for network users who need to SIM (or other methods to simulate authentication codes as hive cell identification). The virtual SIM can initiate or use the information in a number of ways, at least some of which can only be used for an access or access attempt. In detail, the hybrid network authentication described later in 15 can be used to authenticate the virtual SIM installed in the remote connection device, and to use the cellular identity and the data stored in the simulated cellular node. The library's certification information is relevant. A device equipped with a virtual SIM is authenticated by a VBSC or a VSGSN, as will be described in detail later, preferably between the non-PLMN network and the PLMN network 20, and may be generated for virtual SIMs or A fake triple code (rand,sres,kc) of other equivalents in other networks. However, if this method is used, the PLMN does not directly authenticate the user (i.e., does not confirm that the device he owns has SIM or equivalent cellular identity), but relies on the gateway. The gateway may then further provide accounting information 46 1262005 发明, invention description to the PLMN, or the accounting information may be based on the non-PLMN, or both. The virtual 5 SIM method can be used for access devices when they prefer not to include a SIM s or other hardware base recognizer (a smart card or its equivalent) for a non-PLMN to PLMN connection; or It can be used in non-PLMN to PLMN connections, where the PLMN does not support integrated SIM based authentication - for example, CDMA. In this method, a virtual (usually software) SIM is installed at the remote device. The remote unit does not have a SIM. The SSG is replaced by an assigned gate, which produces a false three-pass code to the remote device. The gateway and the remote device share the virtual SIM secret key (which is stored in the simulated cell node authentication database). The gateway uses it to generate the triple code (RAND, SRES, KC) and generates a GSM-like challenge to the remote device (ie RAND). The triple code can be used by the GSM authentication protocol. Phase 15 is generated with the same algorithm (for example, HMAC-SHA-1 or HMAC-MD5). The requirements of the same algorithm will be used for the virtual SIM and the simulated cellular node (VBSC or VSGSN+). The remote device then responds to the challenge using the virtual SIM and sends an SRES to the simulated cellular node (via the non-PLMN network). When the authentication procedure is successfully completed, the terminal user access device and the analog cellular node share a secret key (Kc) as in the GSM system, which is not known to others. The end user access device and the simulated cellular cell can use the encryption key to encrypt traffic between them. However, this encryption key cannot use the traffic that is assigned to the PLMN network in the encryption because the 47 1262005 发明, invention description PLMN does not have this encryption key. SIM or USIM can be implemented in this way. Unlike the SIM-software SIM, which can be copied, the authentication protocol using the virtual SIM includes a replication detection mechanism. 5 Virtual Base Station Controller (VBSC) Refer to Figure 6 for a simplified block diagram of a standard GSM network configuration. A base station system (BSS) 40 supports the remote location mobile device 42. It is connected to a circuit switched network via an MSC 44, in this case the PSTN, and connected to a packet switched network via an SGSN, such as 10 being the Internet. The key point to observe is that the base station interface to the MSC uses the A interface for circuit switched connections and the Gb interface for the sealed connections. These interfaces may be used by the V B S C as will be described later such that the P L Μ N is like any other BSS in the GPS network. Referring now to Figure 7, there is shown a simplified block diagram of a non-PLMN network 48 connected by a virtual base station controller VBSC 50 interface to the GSM network of Figure 6. The same elements as those in the previous figures are given the same reference numerals and will not be described again unless necessary as understood by the present invention. The non-PLMN network 48 is coupled to the remote device 52 via a series of access points and has its own network servo 20 in any typical network type. A SIM server 56 is shown providing an analog SIM gateway, or a virtual SIM server authentication as described above. As shown in Figure 6, the VBSC 50 uses the A interface to reach a circuit switched network such as the PSTN and the GB network to reach a packet switched network. The VBSC (Virtual Base Station Controller) is a proxy gateway that functions between the non-PLMN access network (Bluetooth, 802.11, etc.) and the PLMN. The VBSC is connected to the PLMN through the A and Gb interfaces. Some interfaces are used by the PLMN to communicate with a BSC and thus the VBSC appears to treat the PLMN as a BSC. 5 The VBSC 62 communicates with one of the non-PLMN network access devices 52, such as a PDA, or a notebook computer. The communication is done by a client application installed on the access network or a network server and executed using one of the standard protocols based on TCP/IP or other matching standards. The communication is required for the VBSC to be used for the above-mentioned SIM server as a license and encryption service. The end user access device can have a virtual SIM installed therein, and the SIM server can be compared to a virtual SIM authenticator, or it can be an analog SIM gateway as described above. Preferably, the VBSC can also communicate with a packet of data on the access device or with a circuit switched software client. The client can be used by the network to obtain the specific service such as a corporate VPN, Internet access, access to a server or voice exchange connection within the cellular network, access The device client application software is typically a download software as an application, particularly if the access device is a PDA or a notebook computer.

20 該VBSC 50作為在該存取,非PLMN,網路及該PLMN 之間的一介面,及最好支援相當廣的範圍,其可以分別透 過該A及Gb介面通訊。該VBSC開始及響應訊息至及由該 PLMN,及與在該存取網路之間的元件互動來執行此等功 能。被選擇的功能如後述。 49 1262005 玖、發明說明 現請參考第8及9圖所述,其分別為顯示SIM服務至Gb 介面之一簡化信號平面及SIM服務至A介面之一簡化信號 平面。在該PLMN與該非PLMN網路之間的保密結構的正 確介面連接是使該介面看起來像是一 PLMN基地台(BTS)或 5 基地台次系統(BSS)的一部份。第8圖顯示透過存取點54連 接至一無線LAN網路之間的一連串行動裝置52。該無線 LAN使用它自己的協定,RF基礎協定,包括有該客互端至 該LAN連接的MAC,及客戶端至VBSC連接及在該網路之 内的其他網路協定。VBSC 62作用為在該網協定信號及該 10 PLMN信號之間的一繼電器。獲得該正確的信號内容需要 該行動元件具有内建SIMs或如上述類型的一模擬SIM閘道 器被加以使用。 該Gb介面被用來在該VBSC及提供GPRS服務支援點 SGSN之間傳送信號,其中標準存取是由該蜂巢細胞基本 15 架構中獲得:在Gr上以該HLR認證,在Gn上資料通道至 GGSN,在Ga上會計資料至Ga等。一 Gs介面68被使用來以 一行動交換中MSC來傳送資料。在此要注意,該VSGSN+ 最好總是具有朝向著該行動介面的一分封資料;然而朝向 著該網路,其可以使用一分封或電路。那也就是說,特定 20 化該VSGSN使得該非PLMN存取網路可以出現作為分封資 料之一 SGSN及作為電路交換資料之BSC。注意在第8圖中 只說明該蜂巢細胞協定,因此該網際網路連接可以被使用 作為轉換站。 該SGSN 66最好是作為該Gb及Gs介面之間的一繼電器 50 1262005 玖、發明說明 。要注意,該MSC只被考慮到電路交換資料。其作為分封 交換資料的等效者是為該SGSN。 第9圖顯示電路交換資料的認證平面。與前面圖式相 同的元件給予相同的標號,及除非在對本發明瞭解上的需 5 要下,不再對其解釋。第9圖除了該SGSN階段被省略之外 ,其餘的與該第8圖相同及該A協定70被使用來在該VBSC 62及該MSC 68之間直接通訊。 現請參考第10圖所示,其是為顯示分封交換傳送通道 服務之通訊協定平面之一簡化圖。與前面圖式相同的元件 10 被給予相同的標號,及除了對本實施例之瞭解有必需時, 不再對其予以解釋。一 GPRS網路伺服器72透果該Gn介面 74被連接至該SGSN 66。對於該圖中的每一元件,不同的 可使用的協定層被加以顯示。 一資料存取客戶端執行GPRS應用軟體,典型地包括 15 有如WAP瀏覽器者。被使用的該通訊路徑是與上述第8圖 中者相同。雖然圖中未示,應用軟體可以經由該閘道器 GPRS支援節點GGSN 76來獲得存取該PLMN GPRS網路之 外如第6圖所示。 在當下載至該存取裝置時,該資料存取客戶端典型地 20 是由標準GPRS軟體協定元件被組合,及透過該TCP/IP通 道與該VBSC通訊。在該VBSC上,該傳輸層最好是以 BSSGP(BSS GPRS協定)來替代以與該SGSN相容。再者, 在該VBSC,該無線電連接控制層訊息最號在該BSSGP需 要時提供支援。 51 1262005 玖、發明說明 現請參考第11圖所示,其顯示在提供的電路交換服務 的不同元件上相關的協定之一簡化協定方塊圖。該通訊路 徑大圖上如第7圖所示及與前圖相同的元件被給予相同的 標號’及及除了對本實施例之瞭解有必需時,不再對其予 5 以解釋。 如上述,在該存取裝置已經被認證之後,其可以被於 分封資料連接或電路交換連接。第11圖說明電路交換服務 之連接路徑,其具有對聲音的特定討論。對於熟習相關技 術者將可瞭解,傳真及HS資料是以類比型式來加以處理。 10 對於聲音存取而言,該連接裝置52最好包括有一電話 按鍵及顯示器及支援音頻伺服器。如果該裝置54本身是為 一電話單元,像是一藍芽無線電話,而後此等結構被使用 在该裝置中及該客戶端僅需要支源存取至該資料通道。 如果該裝置是一標準PDA或膝上型電腦,則該客戶端 15最好包括有一軟電話按鍵及顯示器及最好包括有音頻支援 。此結構在IP電話客戶端在今日已經是標準結構。 講話最好是以AMR(自我調整多頻率·· Adaptive Mum_ Rate)來作聲音傳播,其是為在GSMpLMNt現今所採用的 標準。此聲音傳播可以在該客戶端或在該VBSC上被執行 20 ,每一種可能的優點及缺點如后: 1·在行動裝置中的聲音傳播器 在存取裝置中的AMR聲音傳播具有降低該LAN聲音頻 寬的優點,其在該存取裝置上明顯的處理需求去交換執行 該聲音傳播及與在該VBSC上該AMR分封之再訊框同步。 52 1262005 玖、發明說明 該無線LAN傳輸通道大體上是被期望產生該時間延遲來引 導再同步的需求。分封經該通道通過可能會遭遇到分裂, 但因為該聲音傳播,只有當該全訊框已經接收及再重造可 以讓該VBSC送其經該A介面至該MSC。 5 2.在該VBSC上的聲音傳播器 另一技術被使用在客戶端上的一種已經被使用在讓聲 音通過IP而被稱為輕重量聲音傳播技術。在該VBSC上, 該輕重量編碼而後最好被轉碼成為AMR。 在該無線LAN是藍芽基礎的無線網路時,聲音傳播可 10 以在該客戶端上被一起分配。此是音為該藍芽無線網路協 定支援特定為聲音所設計的一電路交換通道。其同時支援 32 Kbps的ADPCM及64 Kbps的PCM。如果該藍芽聲音通道 被使用,而後所需要的該唯一聲音傳播是在該VBSC。 置放該聲音傳播器於該VBSC上的架構之一缺點是該 15 無線LAN最後結束時攜帶有一相當高資料率的聲音通道。 此導致通道能力的損失,特別是因為此能力必需保證維持 它的即時特性。 如上述該等圖式所示,該VBSC 62被安裝在該LAN上 。然而,其可以被變換跟著PLMN的裝置來安裝,典型地 20 為該載體交換中。前述方法的優點是一 VBSC失敗可能影 響只有一個LAN。後面的例子允許一單一 VBSC去服務很 多個LANs,及緊接著在成本上有節省,但較高層次的可 信度是需要的。 該VBSC提供在該LAN及該蜂巢細胞網路之間的協定 53 1262005 玖、發明說明 橋接,其允許該二者工作在一起如同一整體。因此,電信 服務供應商可以在沒有其他可使用者時來使用非PLMN網 路(藍芽,802.11b等)來提供電信服務使用者3G的服務,無 論是可使用頻寬的理由或者因為該接收裝置不具有複雜的 5 電路來接收它們。因此,例如,大部份的行動電話不能接 收任何簡單的影像,然而可以連接至該LAN網路之大部份 基本型的PDA可以接收相當複雜的影像。電信服務使用者 可以由該非PLMN網路本身來被提供高速,豐富的經驗, 而在同時可以完全存取標準聲音及資料服務。電信服務使 10 用者經由該標準PLMN網路可以額外的被提供完整的請款 及服務概況。電信服務供應商獲得低成本存取網路來允許 他們降低價錢來提供給電信服務使用者。電信服務使用可 以透過像是該SIΜ閘道器之一整合保密機構來被提供在網 路上的通訊隱私性。同樣地,同時的聲音及資料通訊被提 15 供。 虛擬VSGN加成 為了讓在該非PLMN及該PLM網路之間的介面要有效 率及允許該網路的非PLMN部份提供它自己的貢獻給使用 者經驗,一種為熟知的VSGN加成(VSGN+)被提供支援群 20 組對群組(peer-to-peer),群組對區域祠服器(peer to local server)及群組對離線網路通訊,其交換連接至一 PLMN網 路如同是該網路的整體部份。特別地,該VSGSN使得該非 PLMN存取網路同時出現對分封資料的一服務GPRS支援節 點(SGSN)及電路交換資料的BSC。 54 1262005 玖、發明說明 一標準服務GPRS支援節點負責在其地理服務區域之 内的資料分封傳遞至及接收來自該等行動基地台。其工作 包括有分封路由及傳遞,移動管理(附加/分開及位置管理) ,邏輯連接管理,及認證及充電功能。該SGSN的位置暫 5 存器儲存有所有著冊在該SGSN的GPRS使用者的位置資料( 例如,現在的蜂巢細胞,現在的VLR)及使用者資料(例如 ,IMIS,在該分封資料網路中被使用的位置)。命名該加 成(Plus)的意義指的是支援電路交換通訊的功能,其通常 不是該GPRS之一部份及因此不能被一標準SGSN來支援。 10 為了提供此整合性的功能,該介面被要求提供特別是 該下列服務: 認證及著冊該電信服務使用者, 更新該電信服務使用者的位置(或支援送入的訊息或 電話), 15 支援該電信服務使用者產生的服務請求, 整合活動至完整的請款單中,及 提供一定範圍的其他支援服務。 該虛擬基地台控制器(VBSC)如前述致能上述服務,但 本身並不致能群組對群組(peer-to-peer),群組對區域伺服 20 器(peer to local server)及群組對離線網路通訊。該 VSGSN+整合所有的VBSC功能及額外支援群組對群組及群 組對離線網路連接。The VBSC 50 serves as an interface between the access, the non-PLMN, the network and the PLMN, and preferably supports a wide range of communications through the A and Gb interfaces. The VBSC initiates and responds to the message to and from the PLMN, and interacts with components in the access network to perform such functions. The selected function will be described later. 49 1262005 发明, Invention Description Please refer to Figures 8 and 9 for the simplified signal plane of SIM service to Gb interface and SIM service to A interface. The correct interface connection between the PLMN and the non-PLMN network is such that the interface appears to be part of a PLMN base station (BTS) or a 5 base station system (BSS). Figure 8 shows a serial serial device 52 connected between a wireless LAN network via an access point 54. The wireless LAN uses its own protocol, the RF infrastructure, including the MAC from the client to the LAN connection, and the client-to-VBSC connection and other network protocols within the network. VBSC 62 acts as a relay between the network protocol signal and the 10 PLMN signal. Obtaining the correct signal content requires that the mobile component have built-in SIMs or an analog SIM gateway of the type described above. The Gb interface is used to transmit signals between the VBSC and the GPRS service support point SGSN, wherein the standard access is obtained from the basic cellular architecture of the cellular cell: the HLR is authenticated on the Gr, and the data channel is on the Gn. GGSN, accounting information on Ga to Ga and so on. A Gs interface 68 is used to transmit data in an active exchange MSC. It is to be noted here that the VSGSN+ preferably always has a packet of data towards the mobile interface; however, towards the network, it can use a packet or circuit. That is to say, the VSGSN is specifically made such that the non-PLMN access network can appear as one of the packetized information SGSN and the BSC as circuit switched data. Note that only the cellular protocol is illustrated in Figure 8, so the internet connection can be used as a conversion station. The SGSN 66 is preferably used as a relay between the Gb and Gs interfaces 50 1262005 发明, invention description. It should be noted that the MSC is only considered for circuit switched data. The equivalent of the exchange data as the partition is the SGSN. Figure 9 shows the authentication plane for circuit switched data. The same components as the previous figures are given the same reference numerals and will not be explained unless they are required to understand the present invention. In addition to the SGSN phase being omitted, Figure 9 is the same as Figure 8 and the A-Agreement 70 is used to communicate directly between the VBSC 62 and the MSC 68. Referring now to Figure 10, it is a simplified diagram of a communication protocol plane for displaying a packet switched transport channel service. The same components 10 as those of the previous figures are given the same reference numerals and will not be explained except when it is necessary to understand the present embodiment. A GPRS network server 72 is transparent to the GSN interface 74 to the SGSN 66. For each component in the figure, different available protocol layers are displayed. A data access client executes the GPRS application software, typically including 15 as a WAP browser. The communication path to be used is the same as that in the above Fig. 8. Although not shown, the application software can be accessed via the gateway GPRS support node GGSN 76 to access the PLMN GPRS network as shown in Fig. 6. When downloaded to the access device, the data access client is typically 20 combined by standard GPRS software protocol elements and communicates with the VBSC over the TCP/IP channel. On the VBSC, the transport layer is preferably replaced with a BSSGP (BSS GPRS Protocol) to be compatible with the SGSN. Furthermore, at the VBSC, the radio link control layer message number is supported when the BSSGP needs it. 51 1262005 发明, Invention Description Referring now to Figure 11, it shows a simplified agreement block diagram of one of the relevant agreements on the different components of the circuit-switched services provided. Elements of the communication path as shown in Fig. 7 and the same elements as those of the previous figures are given the same reference numerals ' and are not explained unless they are necessary for understanding the present embodiment. As described above, after the access device has been authenticated, it can be connected to a packet or circuit switched connection. Figure 11 illustrates the connection path for a circuit switched service with a specific discussion of sound. It will be appreciated by those skilled in the art that fax and HS data are processed in an analog form. For audio access, the connection device 52 preferably includes a telephone button and display and a support audio server. If the device 54 itself is a telephone unit, such as a Bluetooth radiotelephone, then such structures are used in the device and the client only needs to have access to the data channel. If the device is a standard PDA or laptop, the client 15 preferably includes a softphone button and display and preferably includes audio support. This structure is already a standard structure in IP phone clients today. The speech is preferably transmitted by AMR (Ad MVP) for sound propagation, which is the standard adopted today in GSMpLMNt. This sound propagation can be performed at the client or on the VBSC. 20 Each of the possible advantages and disadvantages are as follows: 1. The AMR sound propagation in the access device by the sound spreader in the mobile device has the LAN reduced. The advantage of audio and audio bandwidth is that it has significant processing requirements on the access device to exchange for performing the sound propagation and synchronization with the resound box of the AMR partition on the VBSC. 52 1262005 发明, DESCRIPTION OF THE INVENTION The wireless LAN transmission channel is generally required to generate this time delay to direct resynchronization. The partition may encounter splitting through the passage, but because the sound propagates, the VBSC can be sent to the MSC via the A interface only if the full frame has been received and reworked. 5 2. Sound Propagator on the VBSC Another technique used on the client has been used to make sound through IP and is called a lightweight sound propagation technique. On the VBSC, the light weight is encoded and then preferably transcoded into an AMR. When the wireless LAN is a Bluetooth-based wireless network, the sound propagation can be distributed together on the client. This is a circuit switched channel designed for the Bluetooth wireless network protocol to support specific sounds. It supports both 32 Kbps ADPCM and 64 Kbps PCM. If the Bluetooth sound channel is used, then the only sound propagation required is at the VBSC. One of the disadvantages of placing the sound spreader on the VBSC is that the 15 wireless LAN ends up carrying a relatively high data rate sound channel. This results in a loss of channel capability, especially since this capability must be guaranteed to maintain its immediate characteristics. As shown in the above figures, the VBSC 62 is mounted on the LAN. However, it can be installed by means of a device that is transformed with the PLMN, typically 20 in the carrier exchange. The advantage of the foregoing method is that a VBSC failure may affect only one LAN. The latter example allows a single VBSC to serve many LANs, and then there is a cost savings, but a higher level of confidence is needed. The VBSC provides an agreement between the LAN and the cellular network of the cell 53 1262005. The invention describes bridging, which allows the two to work together as one. Therefore, the telecommunication service provider can use the non-PLMN network (Bluetooth, 802.11b, etc.) to provide the service of the telecommunication service user 3G when there is no other user, whether it is the reason for using the bandwidth or because of the reception. The devices do not have complex 5 circuits to receive them. Thus, for example, most mobile phones cannot receive any simple images, but most of the basic PDAs that can be connected to the LAN network can receive fairly complex images. Telecommunications service users can be provided with high-speed, rich experience from the non-PLMN network itself, while fully accessing standard voice and data services. Telecommunications services allow 10 users to be additionally provided with complete payment and service profiles via the standard PLMN network. Telecommunications service providers have access to low-cost access networks to allow them to lower their prices for telecom service users. The use of telecommunications services can be provided on the network for communication privacy through the integration of a security mechanism such as one of the SI gateways. Similarly, simultaneous voice and data communications are provided. Virtual VSGN adds the interface between the non-PLMN and the PLM network to be efficient and allows the non-PLMN portion of the network to provide its own contribution to the user experience, a well-known VSGN bonus (VSGN+). ) is provided with support group 20 peer-to-peer, peer-to-local server and group-to-offline network communication, and its exchange connection to a PLMN network is like The whole part of the network. In particular, the VSGSN causes the non-PLMN access network to simultaneously present a serving GPRS support node (SGSN) for the packetized data and a BSC for circuit switched data. 54 1262005 发明, Invention Description A standard service GPRS support node is responsible for the transfer and receipt of data from its geographic service area to and from such mobile base stations. Its work includes separate routing and delivery, mobility management (addition/separation and location management), logical connection management, and authentication and charging functions. The location of the SGSN temporarily stores the location data of the GPRS user registered in the SGSN (for example, the current cellular cell, the current VLR) and the user profile (for example, IMIS, in the packetized data network). The location used in). The meaning of naming the addition refers to the function of supporting circuit switched communication, which is usually not part of the GPRS and therefore cannot be supported by a standard SGSN. 10 In order to provide this integrated functionality, the interface is required to provide, inter alia, the following services: Authenticate and register the telecommunications service user, update the location of the telecommunications service user (or support incoming messages or calls), 15 Support service requests generated by users of the telecommunications service, integrate activities into complete payment forms, and provide a range of other support services. The virtual base station controller (VBSC) enables the above services as described above, but does not itself enable peer-to-peer, peer-to-local server and group For offline network communication. The VSGSN+ integrates all VBSC features and additional support group-to-group and group-to-offline network connections.

現在回到第6圖及要觀察的一個重點是該BBS 40透過 該A介面作為電路交換連接來介面連接該MSC。該SGSN 55 1262005 玖、發明說明 46透過該Gs介面連接至該MSC/VLR 44,透過該Gr介面連 接至該AuC/HLR 78,及透過該Gn介面來與網路中的剩餘 者介面連接。此等介面被VSGSN+所使用來使其讓該 PLMN作為一標準BSS及一標準SGSN二者,及將常態地構 5 成該PLMN網路的部份。 現請參考第12圖所示,其是為顯示該VSGN+之整體及 其如何配置入該網路環境之一簡化方塊圖。元件與前面圖 式相同者給予相同的標號及除非在對於本發明之暸解上之 必要,不再予以說明。一無線LAN 48具有一SIM伺服器56 10 如前述者但額外具有一連接管理器82及一區域伺服器82, 其中後者攜帶特定於該LAN的媒體豐富資料。該網路被連 接至一 VSGSN+單元84,其與前圖的VBSC以相當類似的方 式介面連接在該LAN與該PLMN之間。 該VSGSN+ 84與該PLMN交換連接如同它是為一標準 15 的SGSN ;其也可以使用一附加的A介面。該Gs及Gr及Ga 介面連接被使用來在此一般性的PLMN網路功能來通訊於 該MSC/VLR 44及HLR 78及CGF(未示於圖中),此等網路 功能像是認證,著冊,服務概要及包括有會計之流量量測 ,例如,經過該Ga介面至該CGF。相較之下,傳送資料流 20 量流過該Gn介面至該電信服務提供者的IP交換空間(IP cloud)。然而該不同的Gx介面是功能性不同的,它們典型 地設置在相同的傳輸媒體上。電路交換聲音控制及該個別 傳送信號是透過該A介面再一次經該VSGSN+通訊。 該分PLMN區域網路配置有一連接管理器80如前述, 56 1262005 玖、發明說明 以建立其群組對群組及群組對區域伺服器及群組對離線網 路伺服器。該連接管理器80藉由提供該vsGSN與該被連接 單元的身份識別及在該單元之間被移動資料的總數。該資 訊被該VSGSN使用來規格化撥叫詳細輸入。該規格是該 5 PLMN期待來自一標準SGSN者,及該撥叫詳細記錄是由該 PLMN所請求,以執行它的撥叫管理功能。 該VSGSN+啟始及響應來自該PLMN之訊息,及與在 該存取網路之内的元件互動來執行這些功能。 現請參考第13圖所示,其為顯示在該LAN PLMA介面 10 之不同部份可以取得的協定,特被是使用在認證者。該圖 除了該Gb介面被該Gs介面86取代之外其餘與第8圖相同。 該VBSC 62被該VSGSN+ 84所取代,該VSGSN+ 84操作類 似於LAN協定及該PLMN網路協定之間的一橋標。更特別 地,該圖顯示牵涉到當該VSGSN+ 84介面連接於該PLMN 15 的MSC/VLR 68及該LAN SSG之間作為著冊的該等協定。 第13圖專注在該分封切換側,亦即資料傳輸。對於聲音等 ,在該A介面上與該MSC相互連接是類似的。 現請參考第14圖,其是顯示一資料傳送PLMN似服器 90之網路及協定環境之一簡易圖示。該VSGSN+r介面連接 20 在該LAN及該PLMN之間如同上述第12圖。 除了執些網際網路連接之外,如可以取得,該存取客 戶端52執行標準的GPRS應用,其可典型地包括有存取在 蜂巢細胞IP網路上的服務作為特別電子郵件,視訊資料等 。通訊是错由該資料及協定如第14圖所不。雖然未顯示, 57 1262005 玖、發明說明 應用可以透過該GGSN獲得存取該PLMN GPRS網路之外。 該資料存取客戶端可以由標準的GPRS軟體協定元件 來組合及可以透過TCP/IP與該VSGSN+通訊。 現請參考第15圖所示,其是為一簡化圖顯示該電路交 5 換傳送服務網路及網路桓境之間的一簡化圖。再一次地, 該VSGSN+應用作為在該LAN 60與該PLMN之間的一介面 ,此時透過該A介面連接至該MSC 44。聲音壓縮及聲音傳 播是與上述VBSC中所描述者相同。 現請參考第16圖所示,其是為顯示該網路協定環境及 10 說明分封資料流通管理之一簡化說明圖。如上所述,該 VSGSN+ 84是用來支援非PLMN網路,其可以提供連接型 式包括有群組對群組,群組對伺服器及群組對離線網路。 所有的此等連接型式最好是由該連接管理器80來建立及管 理。該VSGSN+獲得來自該連接管理器節點之流通管理資 15 訊及將其格式化成為相容於該PLMN格式之訊息組。至少 ,在上面有提到的該撥叫詳細記錄(Call Detail Records:CDRs)是以此方式來被產生。 第16圖顯示該分封資料服務之訊息流量。電路交換通 訊是以類似的方式以A介面取代該Gs介面來取代。 20 至於對於上述該VBSC,該VSGSN+可以被安裝在該無 線LAN位置或在該電信服務提供者交換中心。在成本及可 信度之間的效益互換如上述使用。如果一中心化的 VSGSN+被使用,其最好具有高層次的可使用性。 在多數個非PLMN存取網路在地理位置非常接近的時 58 1262005 玖、發明說明 後,一中心化的VSGSN+將最可能是最好的方法。 除了上述關於該VBSC所述的優點之外,該VSGSN+提 供支援群組對群組,群組對伺服器及群組對離線網路通訊 ,而不會被該PLMN影響而有可見度及控制的損失。 5 VSGSN+總結 該VSGSN+執行下列工作: (1) 使用該行動裝置之適當方法的行動裝置的認證質疑 ,其是否具有一 SIM,使用標準或私有的方法,在一些例 子中可能需要VSGSN+去介面連接該HLR ;此即為甚麼要 10 Gr的理由;及 (2) —標準行動裝置對於該網路之扮演角色,如果其要 連接網路交換資料的該MSC,則經過該A或Gs介面,如果 其要連接分封裝置的一標準SGSN,則使用Gb,如果採用 SGSN的角色及直接連至一 GGSN(該Gn介面,其是為真正的 15 —通道攜載,而無論該行動裝置要交換甚麼樣子的資料)。 在此要注意,該VBSC是該VSGSN+中最普通的一個特 殊的例子。 信號交遞(Handoff) 本發明之信號交遞特徵加入信號交遞至目前尚不具有 20 此能力的許多無線網路中的通訊控制。有效的信號交遞允 許使用者是在網路範圍之内但仍然在移動時可獲得一無線 LAN的所有好處,因為當他離開網路範圍時,該連接是藉 由連接另一無線LAN或如果它具有一適當的客戶端時藉由 直接連接至該PLMN網路來被加以保留。 59 1262005 玖、發明說明 為了提供所有的解決方案,五種一般性的例子被考慮 如後,其各具有次實例: 1. 内部熱點(Intra Hot Spot)信號交遞 a)在重疊的無線網路(WNs)之間以相同的技術操作 5 b)在非重疊的WNs之間以相同的技術操作 c)在重疊的WNs之間以不同的技術操作 2. 交互熱點(Inter Hot Spot)信號交遞 a) 在重疊的熱點之間以相同或不同的技術操作 b) 在非重疊的熱點之間以相同或不同的技術操作 10 3.内部無線廣域網路(PLMN)信號交遞 a) 在重疊的PLMNs之間以不同的技術操作 b) 在非重疊的PLMNs之間以不同的技術操作 4. 在無線區域及廣域網路之間的信號交遞 a)由區域至廣域網路之間的信號交遞 15 b)由廣域至區域網路之間的信號交遞 5. 經由一有線網路如網際網露來連接及再連接至該 WWAN(蜂巢細胞,GPRS)網路之信號交遞觀念之解釋 概念上地,以下的範例是被本發明之信號交遞特徵所 保含: 20 1.信號交遞是由一網路控制單體或該使用者啟動所命 令; 2.該網路維持一強工作時期邏輯來考慮信號交遞及暫 時失去通訊。該工作時期可以在通訊已經被新的網路上被 建立之後被繼續。該系統可以決定該使用者已經由一網路 60 l262〇〇5 玖、發明說明 中脫離及加入另一網路,及而後可以重新開始—被中斷的 工作時期; 更仏號父遞或軟信號交遞可以被支援。在軟信號交 遞時沒有被中斷,及連接至新的網路在當通訊在原來的網 5路仍然有效時被建立; 4.信號交遞可以藉由該Ap通訊協定(該中間存取控制 或MAC)來處理。此可能需要該既存協定的修改。如果此 選擇不可獲得,系統邏輯可以支援該MAC外部的控制來啟 動與另一 AP之通訊,而後再建立該工作時期。雖然Ap也 10不知道一信號交遞已經發生,已經被支援通訊執到現在的 該AP最好反應如同該使用者已經離開該網路。在此同時, 該AP至通訊已經被傳送最好反應如同一新使用者(及一新 的工作時期)已經被存取進入它的網路。 5_該邏輯最好支援所有的系統或一部份的系統,包括: 15 多重熱點;每一熱底可以包括有一或多數Aps。熱點 可以操作使用相同或不同區域網路技術或連接協定,例如 802.11 ’藍芽等,及一或多個廣域技術或通訊協定,例如 ,GPRS,CDMA2000,Reflex。 6.該邏輯最好決定搜尋之優先順序來決應當信好交遞 20 是需要於下列之間 相同技術的APs ; 不同技術的APs ; 區域網路及廣域網路技術;及 不同廣域技術。 61 1262005 玖、發明說明 。忒仃動裝置單元最好經由為該服務控制器所設計的邏 /實體來連接’該服務控制器負責該行動電話通訊工作時 』之維持。此等工作時期是在該行動裝置及另-個體或服 5 間的獨立通訊實體’該另-個體是為該工作時期的遠 端G亥仃動裝置被定義為近端)。該服務控制器可以即時或 非即時支援來自該遠端可以似乎是電路交換或分封交換, 声日胃料/在貝料上的聲音之服務。在當該行動裝置改變 匕的存取道時,該信號交遞因此可以確保此等工作時期的 繼續。 1〇 胃工作時期被定義在共同於該行動裝置至該服務控制 器之任何協定,標準或非標準之中。此工作時期被實施作 為在目前使用的該行動單元及該存取單元之上的一層級, 其刺為一無線廣域網路(WWAN),一無線區域網路 (WLAN),網際網路,内部網路,pSTN等。因此,被加諸 15在該本實施例中該網路包括在其他PLMNs(包括有gPRS, EDGE及CDMA蜂巢細胞資料)之中,不同的8〇211 WLANs ,藍芽,ISDN,X.25,訊框中繼(prame Relay)。 多種型式的信號交遞被討論如後。為了觀念澄清的目 的,每一定義說明一特定例子,例如,在wlan&amp;wwan 20之間的信號交遞。直接的強調,在實際上包括有如上定義 的一或多個方法之一複雜信號交遞邏輯可以操作在相同的 行動裝置及在需要&amp;咼時被作動。例如,在一 WLAN之内 遺失通訊的一行動裝置可以嘗試執行信號交遞至在相同 WLAN熱點之内的另一無線網路,以及尋找一可能的信號 62 1262005 玖、發明說明 又遞至一 WWAN,因此當多於一個題的作動可實行時,該 订動裝i,其服務控制或甚至該熱點#制器可以選擇使用 具有較高優先權或優點之信號交遞。 服務的持續為多包裝網路所確保,其沒有整合配置信 5號交遞或信號交遞能力。此服務持續藉由執行在該網路通 訊之上的一層級上的信號交遞來被實施。該實際的細節隨 著被該信號交遞所支援的無線網路型式而變化。 現請參考第17圖所示,其是為顯示具有重疊部份的二 區域無線網路WN1及WN2之簡化概要圖,該二區域無線網 1〇路是被相同的熱點中心點100所控制。該第一無線網路 WN1包括有控制四個電信服務使用者單元〜μ#之一存 取點API。該第二無線網路WN2具有控制二個電信服務使 用者早元SU5〜SU6之一存取點AP2。 行動裝置服務使用者(Mobile subscibler:MS)單元SU4 15現在是由API來提供服務,亦即,其是為WN1的一部份。 當在該WN1之内的通訊條件變得不可以接受時,其可能因 為在SU4或API上的降級信號接收(例如,因為移動或干擾) ,或因為在WN1之内的負載太高,一信號交遞被執行,其 中SU4變成WN2的一部份及經由該WN1執行的相同工作 20 SU4透過WN2持續到現在。 現請參考第18圖戶斤示,纟是為顯示一區域無線網路 110操作在一廣域網路112所覆蓋的區域之内的一簡化示意 圖。該區域無線網路110包括有其被設定要被控制的一存 取點(AP)114,雖然,另一方面,其可以藉由如第17圖所 63 1262005 玖、發明說明 不之一熱點中心點所控制。該廣域網露112是由一 WAN中 心116來控制。許多電信服務使用者單元su在每一網路中 操作。一特定的電信服務使用者單元在該二網路之間傳遞 ,亦即,其已經被操作在WAN 12之間及傳送至該WN 110 5 ,或反之亦然。 卉多解決方案被提出針對在維持該無線電信服使用者 之工作日寸期操作在該網路之内時的信號交遞之實現。該等 解決方案是為了支援相當廣範圍的行動裝置及網路能。 在此要指出,在此所描述的該等解決方案,無論它們 1〇使用硬或軟信號交遞,其可實現在分時基礎上,支援分擔 &gt;源來降低硬體成本及藉此降低在一單一行動裝置單元之 内有超過一個無線電實施時典型發生的干擾。 解決方案1—在重疊無線網路之間的内部熱點信號交遞一 相同技術 15 L在相同卫作時期位準上持續強力切換無線網路通訊。Returning now to Figure 6 and an important point to observe is that the BBS 40 interfaces to the MSC through the A interface as a circuit switched connection. The SGSN 55 1262005, the invention description 46 is connected to the MSC/VLR 44 through the Gs interface, connected to the AuC/HLR 78 through the Gr interface, and connected to the remaining interface in the network through the Gn interface. These interfaces are used by VSGSN+ to make the PLMN both a standard BSS and a standard SGSN, and will be normally configured as part of the PLMN network. Referring now to Figure 12, it is a simplified block diagram showing the overall VSGN+ and how it is configured into the network environment. The same components as those in the previous figures are given the same reference numerals and will not be described unless they are necessary for the understanding of the present invention. A wireless LAN 48 has a SIM server 56 10 as described above but additionally has a connection manager 82 and a regional server 82, wherein the latter carries media rich material specific to the LAN. The network is connected to a VSGSN+ unit 84, which is connected between the LAN and the PLMN in a similar manner to the VBSC of the previous figure. The VSGSN+ 84 is exchanged with the PLMN as if it were a standard 15 SGSN; it can also use an additional A interface. The Gs and Gr and Ga interface connections are used to communicate with the MSC/VLR 44 and HLR 78 and CGF (not shown) in this general PLMN network function. Such network functions are like authentication. The booklet, the service summary and the flow measurement including the accounting, for example, through the Ga interface to the CGF. In contrast, the transport stream 20 flows through the Gn interface to the IP cloud of the telecommunications service provider. However, the different Gx interfaces are functionally different and they are typically placed on the same transmission medium. The circuit switched sound control and the individual transmitted signal are again communicated via the A interface via the VSGSN+. The sub-PLMN regional network is configured with a connection manager 80 as described above, 56 1262005, invention description to establish its group-to-group and group-to-area server and group-to-offline network server. The connection manager 80 provides the total number of pieces of data that are moved between the units by providing the identity of the vsGSN and the connected unit. This information is used by the VSGSN to normalize dialing detailed inputs. The specification is that the 5 PLMN is expected to come from a standard SGSN, and the dialing detailed record is requested by the PLMN to perform its dial management function. The VSGSN+ initiates and responds to messages from the PLMN and interacts with components within the access network to perform these functions. Referring now to Figure 13, it is a protocol that can be found in different parts of the LAN PLMA interface 10, and is used exclusively by the authenticator. This figure is the same as Fig. 8 except that the Gb interface is replaced by the Gs interface 86. The VBSC 62 is replaced by the VSGSN+ 84, which operates like a bridge between the LAN protocol and the PLMN network protocol. More specifically, the figure shows such agreements involving the registration of the VSGSN+84 interface between the MSC/VLR 68 of the PLMN 15 and the LAN SSG. Figure 13 focuses on the switching side, that is, data transmission. For sounds and the like, interconnection with the MSC on the A interface is similar. Referring now to Figure 14, a simplified illustration of a network and protocol environment for a data transfer PLMN server 90 is shown. The VSGSN+r interface connection 20 is as shown in Fig. 12 between the LAN and the PLMN. In addition to performing some internet connections, the access client 52 performs standard GPRS applications, which typically include access to services on the cellular network of the cellular cells as special emails, video material, etc. . The communication is wrong with the information and the agreement as shown in Figure 14. Although not shown, 57 1262005 发明, invention description The application can obtain access to the PLMN GPRS network through the GGSN. The data access client can be combined by standard GPRS software protocol components and can communicate with the VSGSN+ over TCP/IP. Referring now to Figure 15, it is a simplified diagram showing a simplified diagram showing the circuit between the delivery service network and the network environment. Once again, the VSGSN+ application acts as an interface between the LAN 60 and the PLMN, and is connected to the MSC 44 through the A interface. Sound compression and sound propagation are the same as those described in the VBSC above. Please refer to Figure 16 for a simplified illustration of the network protocol environment and 10 description of the data flow management. As mentioned above, the VSGSN+ 84 is used to support non-PLMN networks, which can provide connection types including group-to-group, group-to-server and group-to-offline networks. All of these connection patterns are preferably established and managed by the connection manager 80. The VSGSN+ obtains the flow management information from the connection manager node and formats it into a message group compatible with the PLMN format. At least, the Call Detail Records (CDRs) mentioned above are generated in this way. Figure 16 shows the message traffic for the segmented data service. Circuit switched communication is replaced in a similar manner by replacing the Gs interface with the A interface. 20 As for the VBSC described above, the VSGSN+ can be installed at the wireless LAN location or at the telecommunications service provider switching center. The benefit swap between cost and credibility is used as described above. If a centralized VSGSN+ is used, it preferably has a high level of usability. When most non-PLMN access networks are in very close geographical position, a centralized VSGSN+ will most likely be the best method. In addition to the advantages described above with respect to the VBSC, the VSGSN+ provides support for group-to-group, group-to-server and group-to-offline network communications without being affected by the PLMN with loss of visibility and control. . 5 VSGSN+ concludes that the VSGSN+ performs the following tasks: (1) The authentication challenge of the mobile device using the appropriate method of the mobile device, whether it has a SIM, using a standard or proprietary method, in some examples may require VSGSN + de-interface connection HLR; this is why 10 Gr is required; and (2) - the role of the standard mobile device for the network, if it is to connect to the MSC of the network exchange data, then through the A or Gs interface, if it wants A standard SGSN connected to the decapsulation device uses Gb. If the role of the SGSN is used and directly connected to a GGSN (the Gn interface, it is carried for the real 15-channel, regardless of what the mobile device is to exchange. ). It should be noted here that the VBSC is a special example of the most common of the VSGSN+. Handoff The signal handoff feature of the present invention incorporates signal handoffs to communication control in many wireless networks that do not currently have this capability. Effective signal handoff allows the user to have all the benefits of a wireless LAN while still in the network but still moving, because when he leaves the network, the connection is made by connecting another wireless LAN or if It has a suitable client that is reserved by directly connecting to the PLMN network. 59 1262005 发明, Invention Description In order to provide all the solutions, five general examples are considered as follows, each with sub-examples: 1. Intra Hot Spot signal delivery a) Overlapped wireless network (WNs) operate with the same technology 5 b) operate with the same technique between non-overlapping WNs c) operate with different techniques between overlapping WNs 2. Inter Hot Spot signal delivery a) operate with the same or different techniques between overlapping hotspots b) operate with the same or different techniques between non-overlapping hotspots 10 3. Internal Wireless Wide Area Network (PLMN) signal delivery a) Overlapping PLMNs Operation between different technologies b) Operation of different technologies between non-overlapping PLMNs 4. Signal handover between wireless area and wide area network a) Signal handover between area to wide area network 15 b Signal transfer between wide-area and regional networks. 5. Interpretation of the concept of signal handover via a wired network such as the Internet to connect and reconnect to the WWAN (Hive Cell, GPRS) network. The following example is the invention The signal handover feature is guaranteed to contain: 20 1. Signal handover is commanded by a network control unit or by the user; 2. The network maintains a strong working period logic to consider signal handover and temporarily lose communication. . This period of work can be continued after the communication has been established on the new network. The system can determine that the user has been detached from a network 60 l262 〇〇 5 玖, detached from the invention description and joined to another network, and can then restart - interrupted working period; more nicknamed parent or soft signal Delivery can be supported. Not interrupted when the soft signal is handed over, and connected to the new network is established when the communication is still valid on the original network 5; 4. Signal handover can be achieved by the Ap protocol (the intermediate access control) Or MAC) to deal with. This may require modifications to the existing agreement. If this option is not available, the system logic can support control external to the MAC to initiate communication with another AP and then establish the working period. Although the Ap 10 does not know that a signal handover has taken place, the AP that has been supported by the support communication is best reacted as if the user has left the network. At the same time, the AP-to-communication has been transmitted preferably as a new user (and a new working period) has been accessed into its network. 5_ This logic preferably supports all systems or parts of the system, including: 15 multiple hotspots; each hot bottom can include one or more Aps. Hotspots can operate using the same or different local area network technologies or connection protocols, such as 802.11 'Blue, etc., and one or more wide area technologies or communication protocols such as GPRS, CDMA2000, Reflex. 6. The logic preferably determines the priority of the search to ensure that the delivery is 20 APs that require the same technology between the following technologies; APs of different technologies; regional network and wide area network technologies; and different wide area technologies. 61 1262005 玖, invention description. Preferably, the slamming unit is coupled to the &apos;the service controller is responsible for the mobile telephone communication operation&apos; via a logic/entity designed for the service controller. These working periods are independent communication entities between the mobile device and the other individual or service. The other individual is defined as the near end for the distal end of the working period. The service controller can instantly or non-instantly support services from the far end that can appear to be circuit switched or packet switched, sounds on the stomach/sand. This signal handover thus ensures the continuation of such work periods when the mobile device changes the access path of the mobile device. 1〇 The working period of the stomach is defined in any agreement, standard or non-standard that is common to the mobile device to the service controller. This working period is implemented as a layer above the currently used mobile unit and the access unit, which is a wireless wide area network (WWAN), a wireless local area network (WLAN), an internet, an intranet. Road, pSTN, etc. Therefore, it is added 15 in this embodiment, the network is included in other PLMNs (including gPRS, EDGE and CDMA cellular data), different 8〇211 WLANs, Bluetooth, ISDN, X.25, Frame relay (prame relay). A variety of types of signal delivery are discussed as follows. For the purpose of conceptual clarification, each definition describes a specific example, for example, signal handover between wlan &amp; wwan 20. It is directly emphasized that complex signal delivery logic, which actually includes one or more of the methods defined above, can operate on the same mobile device and be actuated when needed &amp; For example, a mobile device that loses communication within a WLAN may attempt to perform signal handover to another wireless network within the same WLAN hotspot, and look for a possible signal 62 1262005. The invention instructions are forwarded to a WWAN. Therefore, when the actuation of more than one question is practicable, the binding device i, its service control or even the hotspot can choose to use signal delivery with higher priority or advantage. The continuation of the service is ensured by the multi-package network, which does not have the ability to deliver configuration signal 5 or handover. This service is continuously implemented by performing signal handoffs at a level above the network communication. This actual detail varies with the type of wireless network supported by the signal handover. Referring now to Figure 17, a simplified overview of the two-region wireless networks WN1 and WN2 having overlapping portions is shown, which are controlled by the same hotspot center point 100. The first wireless network WN1 includes an access point API for controlling four telecommunication service subscriber units ~μ#. The second wireless network WN2 has an access point AP2 that controls one of the two telecommunication service users, early SU5 to SU6. The Mobile Subscibler (MS) unit SU4 15 is now served by the API, that is, it is part of WN1. When the communication condition within the WN1 becomes unacceptable, it may be received due to a degraded signal on the SU4 or API (eg, due to movement or interference), or because the load within WN1 is too high, a signal The handover is performed, where SU4 becomes part of WN2 and the same work performed via the WN1 20 SU4 continues through WN2 until now. Referring now to Figure 18, a simplified schematic diagram showing the operation of a regional wireless network 110 within an area covered by a wide area network 112 is shown. The area wireless network 110 includes an access point (AP) 114 that is set to be controlled, although, on the other hand, it can be described as a hotspot center by means of the invention as described in FIG. Point controlled. The WAN 112 is controlled by a WAN center 116. Many telecommunications service subscriber units su operate in each network. A particular telecommunications service subscriber unit is transferred between the two networks, i.e., it has been operated between the WAN 12 and transmitted to the WN 110 5, or vice versa. The Huiduo solution was proposed for the implementation of signal delivery while maintaining the working hours of the wireless telecommunications service user within the network. These solutions are designed to support a wide range of mobile devices and network capabilities. It is pointed out here that the solutions described herein, whether they use hard or soft signal handover, can achieve a cost-sharing basis by reducing the hardware cost and thereby reducing it on a time-sharing basis. There is more than one interference typically occurring in a single radio unit within a single mobile unit. Solution 1 - Internal Hotspot Signal Handover between Overlapped Wireless Networks One Same Technology 15 L continues to strongly switch wireless network communications during the same guard period.

現請參考第19圖所示,其是顯示在交互重疊網路之間 使用相同技術的信號交遞。當無論網路或行動裝置識別通 訊條件是不可接受的,該相應個體離開該通訊。該使用者 2裝置可能只是離開及切換至另—無線網路,或該Ap可以包 20括有-停止服務,其主動地放棄該使用者。在此例子中’ 該MS試著要加入另一網路,在此例為购。一但通訊被 再建立之後’該巾⑽邏輯決定有—使用者裝置的請求( 等待或插撥),及該請求卫作時期被自動地再加入。當實 現被分配的中心點邏輯(在該Ap之内的cp邏輯)時,該AP 64 1262005 玖、發明說明 控該被接受的無線網路是藉由推或拉邏輯被通知次MS的 請求工作時期。在該推邏輯的例子卜該前—服務無線網 路之AP㈣通知該巾請玉作時期㈣純無線網路(及可 能的其他相鄰無線網路)之該Ap;該拉邏輯意為前一接收 無線網路之AP請求被加人該新網路之該MS的請求工作時 期上的資訊。 2. /又有區域無線行動協協助之硬網路控制信號交遞 現請參考第20圖所示,其是為顯示信號交遞如何執行 而不需要來自該行動裝置的協助之一簡化流程圖。在此實 10施中’在鄰近無線網路之内的第二接收器量測來自該使用 者的需要被信號交遞之接收。該第二接收器可以是—分離 的接收器或簡單地包括有為此目的所分被的一些時槽(time slots)於該一般的AP接收器工作計晝。 要交遞該行動裝置信號由一 WN至另一 WN的決定如果 15是該中心化邏輯時是由該CP所決定,或藉由該服務八?及 預備接收WNs的該等APs。如果此邏輯決定該預備接收 WNs可以提供改善通訊服務,每一次它的量測的行動裝置 至AP通訊特性及其載入條件中的一個條件(其中一個條件 或二者)時’該信號交遞發生。 20 該行動裝置由該服務的WN至該被接收WN的信號交遞 以下列兩種方式: a)如果該行動裝置可以接收無線網路選擇控制,其命 令信號交遞至該被選擇(接收的)WN,包括有如果可能傳 送該WN通訊參數來加速該信號交遞過程; 65 1262005 玖、發明說明 b)如果該行動裝置不能接受無線網路選擇控制,則其 藉由拒絕服務來放棄對WN的服務;而後該行動裝置^著 登錄另一 WN,及只有該被選擇(接收)WN接受它的請求加 入該網路。 5 3.被硬網路控制信號交遞之行動裝置 在此實施中,該區域無線行動裝置尋找額外的通道來 測3:及決定其他網路的通訊條件及送出此資訊至該Ap。該 網路基礎結構可以是被中心化或分散,據此該Ap區域地維 持該資訊或送出該資訊至該CP。 10 當只有以下的任一條件符合時,該區域無線行動裝置 搜尋額外的通道: 勾該行動裝置被程式化在正常區間内來執行該收尋及 该區間之結束到達為止。該搜尋區間可以經由該Ap傳輸來 被預先程式化或控制。 15 違行動裝置被該AP所命令來搜尋額外的通道。此將 典型地發生在當該AP決定一信號交遞可能是需要的。 c)該行動裝置是由該cp或分散的cp邏輯來命令以執行 搜尋額外的通道。此搜尋被需要用來支援即時熱點(HotReferring now to Figure 19, it shows the signal handover using the same technique between overlapping overlay networks. When the network or mobile device recognizes that the communication condition is unacceptable, the corresponding individual leaves the communication. The user 2 device may simply leave and switch to another wireless network, or the Ap may include a stop-stop service that actively abandons the user. In this example, the MS tries to join another network, in this case for purchase. Once the communication is re-established, the towel (10) logically determines that there is a request from the user device (waiting or inserting), and the requested service period is automatically re-joined. When the assigned central point logic (the cp logic within the Ap) is implemented, the AP 64 1262005 发明, the invention indicates that the accepted wireless network is notified by the push or pull logic to request the secondary MS to work. period. In the example of the push logic, the AP (4) of the service wireless network informs the towel of the Yu (4) pure wireless network (and possibly other adjacent wireless networks) of the Ap; the pull logic means the previous one. The AP receiving the wireless network requests to be added to the information of the MS's requested working period of the new network. 2. / There is also a regional wireless mobile assistant to assist in the hard network control signal handover. Please refer to Figure 20, which is to simplify the flow chart for showing how the signal handover is performed without the assistance from the mobile device. . In this implementation, the second receiver within the proximity wireless network measures the reception from the user that needs to be signaled. The second receiver may be a separate receiver or simply include some time slots allocated for this purpose to the general AP receiver operating meter. The decision to hand over the mobile device signal from one WN to another WN is determined by the CP when the 15 is the centralization logic, or by the service eight? And the APs that are ready to receive WNs. If the logic determines that the pre-receiving WNs can provide improved communication services, each time it measures the mobile device to one of the AP communication characteristics and its loading conditions (one of the conditions or both), the signal is handed over. occur. 20 The mobile device is handed over by the WN of the service to the received WN in two ways: a) if the mobile device can receive wireless network selection control, its command signal is handed over to the selected (received WN, including if it is possible to transmit the WN communication parameters to speed up the signal handover process; 65 1262005 发明, invention description b) if the mobile device cannot accept wireless network selection control, it abandons the WN by denial of service The service; then the mobile device logs into another WN, and only the selected (received) WN accepts its request to join the network. 5 3. Mobile device with hard network control signal handover In this implementation, the regional wireless mobile device looks for additional channels to measure 3: and determine the communication conditions of other networks and send this information to the Ap. The network infrastructure can be centralized or decentralized whereby the Ap area maintains the information or sends the information to the CP. 10 The wireless mobile device in the area searches for additional channels when only one of the following conditions is met: The mobile device is programmed to execute within the normal interval to perform the acquisition and the end of the interval. The search interval can be pre-programmed or controlled via the Ap transmission. 15 Violation of the mobile device is commanded by the AP to search for additional channels. This will typically occur when the AP decides that a signal handover may be needed. c) The mobile device is commanded by the cp or distributed cp logic to perform an search for additional channels. This search is needed to support instant hotspots (Hot

Spot)通訊條件之分析,及允許在必要或為測試目的時作 20 WNs的再分配。 该CP(或在該ap之内的分散cP邏輯)而後決定那一個 疋该行動裝置可以作信號交遞的最佳WN。此決定是基於 该被報導的通訊條件,該WNs的下載條件及該行動裝置所 需要的服務。該AP控制該WN而後被提示。 66 1262005 玖、發明說明 忒仃動裝置以參考第20圖所示之討論中的兩種方法之 一來作信號交遞由該服務的WN至該接收的WN : a) 如果該行動裝置可以接受無線網路選擇控制時,其 命令作信號交遞至該被選擇的(接收)WN,包括有如果可 5能傳送該WN通訊參數來加速該信號交遞程序。 b) 如果該行動裝置不能接受無線網路選擇控制時,其 可藉由拒絕服務來放棄該服務WN;而後該行動裝置試著 登錄至另一 WN,及只有該被選擇(接收)WN接受它的請求 來加入該網路。 10 4 ·被硬信號交遞所控制的行動裝置 在本實施中,該區域無線行動裝置搜尋額外通道是在 當⑴服務的品質漸漸不能滿足,或(ii)當其接收一指令來 父遞信號至不同WN的一較好的通道時。 該行動裝置而後執行所有無線網路之搜尋及測量,其 15可接收及決定那一個是最好的網路來加以切換。決定要切 換的最佳W N的條件可以包括有通訊特性的測量及網路的 負載。 該行動裝置而後脫離提供服務給它的該WN。該選擇 被保留給該行動裝置而在脫離該WN之前遞送出一提示, 20 以加速該信號交遞程序。 在由該現在的服務WN脫離之後,該行動裝置試著加 入被選擇來作信號交遞之該WN。該系統可以辨識該行動 裝置已經由其現在服務WN脫離至一新的WN作信號交遞及 確保經由該新的WN來重新開始的它的電信工作時期。 67 1262005 坎、發明說明 雖然在該信號交遞方法的較佳實施例中,沒有網路協 助的必要,該選擇可以被保留來實現具有網路協助的如所 述的该仏號交遞。網路協助可以被提供於下列之任一中: (I) 可接收的相鄰WNs之辨識,亦即,它們的通訊參數 5之規定,例如為了避免登錄至屬於其他系統之WNs ; (II) 在負載條件上的資訊及其它相鄰WNs的可使用參 數;及 (Hi)該服務WN之期望負載條件之資訊。 5·網路命令,行動控制硬信號交遞 10 現請參考第21圖所示,其為顯示實現當存在於該CP或 4 AP中任一的網路控制決定該服務WN不能支援該行動服 務通訊條件。網路控制可能會或可能不會決定具有支援服 務月b力的可能鄰近網路;如果此能力被決定,則網路控制 (經由該AP通訊)遞送在可使用WNs之通訊參數上的資訊至 15 該區域無線行動裝置。 忒行動裝置而後搜尋可以支援其服務要求的其他的 WNs。在此方法的較佳實施例中,該行動單元時間多工在 该服務WN之内具有其通訊之相鄰網路之搜尋,因此最小 化該信號交遞服務的衝擊。當此不可行時,一選擇性的實 20施例被保流,其中該行動裝置脫離服務網路存取及搜尋相 鄰WNs。在該等實施例中,該行動裝置可以使用由該網路 所提供的資料或用在一任意搜尋中。 基於此搜尋,該行動裝置決定哪_WN將信號交遞試 著存取此WN。 68 1262005 玖、發明說明 如果該行動裝置沒有成功地存取 — 十取邊破選擇的WN,該 行動存取根據其搜尋結果來嘗試存 于取下一最佳WN,而後 以此類推。 在存取已經成功地完成之後,網路確認此是為前一電 5信工作時期的重信開始以確保此電信工作時期的繼續。 6·軟信號交遞(s〇ft handoff) 具有硬信號交遞之上述五個方法中的四個方法也可以 使用“軟(’’’信號交遞。此用語“軟”信號交遞在此是用來 指在當由-WN傳遞轉換至另一職時維持通的的無縫連續 1〇 ,而不論在該區域無線行動電話之内的電信工作時期活動 是如何,包括有那些依據通訊的時間界限連續而定者,都 不會有影響。 如本實施例所支援之軟信號交遞可以在脫離現該現在 服務AP之前,藉由在該行動裝置單元及該第二Ap之間建 15立通訊來加以實施。在另一種方法中,其也可以藉由在 WNs之間切換快速到在電信工作時期通訊中沒有中斷來達 成。 軟信號交遞例如可以在當該第二Ap使用設計作為向外 傳送而實際上是聽取該現在的行動裝置之一時槽時來達成 20 。在相反的例子中,其中該行動裝置單元採取主動,該行 動裝置可以使用為其設計來聽取一主動相鄰系統之時槽。 有許多種方法在以下被討論來在一 WN之内實施軟作 號交遞。 a)沒有區域無線行動裝置協助之軟網路控制信號交遞 69 1262005 玖、發明說明 在此實施中,在相鄰無線網路中的第二接收器测量被 該使用者請求信號交遞之接收。該第二接收器可以是一八 離的接收器或為此目的分配在該正常AP接收器控作計劃中 的一些時槽。 5 網路控制提供該新的服務AP之精準參數至該行動裝置 及提供信號交遞控制給該新的服務WN,因此在電信服務 中是沒有中斷的。 b)提供有軟網路控制信號交遞協助之行動裝置 在此實施中,該區域無線行動裝置搜尋額外的通道以 1〇測量及決定其他網路的通訊條件及傳送此資訊改該Ap,其 依據該中心化或分散的基礎架構來區域地維持該資訊或送 出該資訊至該CP。 該HS網路(中心化或分散式)現在基於該行動裝置所提 供的資訊及它的WNs之操作狀態來選擇新的服務聰。 15 網路控制提供該新的服務AP之精確的參數給該行動裝 置及提供信號交遞控制給該新的服務w N。 為了確保不被中斷的通訊,該行動裝置現在建立在該 新的服務WN之内的通訊而不會切斷其舊的職通訊。一旦 通訊被建立’該行動衷置脫離已經服務它的職。一變化 20實施允許該行動裝置在脫離該職之前送出一提示。 C)軟信號交遞控制之行動裳置 在此實施中,該區域無線行動裝置搜尋額外的通道在 當⑴服務的品質逐漸不能滿足時,或(ii)當其接收到-命 令來進行信號交遞至在—不同職中的一較佳通道。 70 1262005 玖、發明說明 该订動裝置而後執行所有無線網路的搜尋及測量,而 後其可接收及決定那一個是要被切換的最佳網路。決定要 被切換之最佳w_條件可以包括有被量測的通訊特性及/ 或網路負載。 5 该仃動裝置而後提示網路控來指示它所選的那一個 WN要作為信號交遞及等待一確認或時間結束,其中其與 该新的WN建立通訊而不會切斷現在的WN。在通訊已經被 建立之後,该行動電話脫離其已經被服務的WN。選擇是 被保留給該行動裝置而在脫離該WN之間送出一提示信號 10 〇 c)網路命令,行動裝置控制軟信號交遞 此方法是實現在當存在於該cp或Ap中的網路控制決 定該服務WN不能支援該行動服務通訊條件時。網路控制 會或不會決定具有支援服務能力之可能相鄰網路;如果該 15能力被決定,則網路控制(經由該AP通訊)遞送出在該可使 用的WNs之通訊參數上的資訊該區域無線行動裝置。 一但該行動裝置擁有該可能WNs,該程序繼續如前述 例子(行動控制軟信號交遞)。 在非重疊WN之間以相同技術運作之内部熱點信號交 20 遞(Intra Hot Spot handoff)。 現請參考第22圖所示,其為繪示在相同熱點之内的二 個分重疊WN之一簡化概要圖,及其被連接至一單一中心 點100。該熱點可以包括有額外的WNs。當一行動裝置單 元脫離一 WN之通訊時,及在同時,該通訊條件不允許與 71 1262005 玖、發明說明 另-WN建立通訊,其假設該使用不在該熱點所涵蓋的範 圍之内。其可能是該熱點實際上是涵蓋著著該行動裝置單 元,但是現在不&amp;支援它,然、而此例子最好以與該行動裝 置單元是不在該被涵蓋的區域之内的相同方式來處理。然 而對於暫裇的時間可以是常數或是可以改變的,該行動 裝置單元之邏輯通訊可以被保持或凍結。該暫停可以因應 電路切換通訊及分封通訊,或聲音及資料,來作不同的定 義。一直到暫停結束之時,與該行動裝置單元的通被假設 是遺失的。 如果在當該通訊繼續時,該行動裝置單元存取另一 WN,該熱點最好即刻控制視期為以上所定義的第一信號 交遞例子(在該電信工作位準上,持續的無線網路通訊之 強力切換)。 以不同技術操作,在WNs之間的内部熱點信號交遞 再一實施例中也由第22圖來加以描述,其不同點在本 範例中是該WNs以不同的技術來運作,分別例如8〇2.Ub無 線網路(Wi-Fi)及藍芽。因為不同的的技術被使用,其使得 該等WNs有無重疊變得沒有影響;該假設是該行動裝置單 元在另一 WN建立通訊之前是由一 WN進行信號交遞。 較佳地,信號交遞在以上所詳細描述相同的技術操作 该等重璺WNs之間分常相近的方式執行及如上詳細的被加 以描述。 如先前,該行動裝置單元並不被視為如同其已經由一 網路脫離。而是,對於固定或可以調整的暫停的時間長度 72 l262〇〇5 玖、發明說明 而言,該行動裝置單元的邏輯通訊是被保留或凍結,其是 I亥電信卫作期間被保持在請求狀態。該暫停可以對於該 交換電路通訊及對於分封通訊給予不同的定義。在暫停結 束之時,與該行動裝置單元之通訊被假設為遺失。 5 該通訊被定義遺失及一新的通訊被再建立。該熱點控 制器(Hot Spot contr()ller),或在其上的任何連接邏輯,檢 查該使用者行動裝置單元之請求電信工作時期建立通訊。 如果該熱點連接邏輯成功的將該行動裝置單元建立保持的 通Λ (個或夕個電信工作時期)時,該熱點控制即刻視其 1〇為在電信工作時期位準上連續的無線網路通訊之強力切換 的上述定義之該信號交遞的例子,及該電信工作時期或該 等電信工作時期是在很短的時間之内被再建立而不會有資 料遺失。 以相同或不同的技術在重疊熱點之間的内部熱點信號交遞 15 以上所疋義的该#號父遞實施例可以被擴充包括有該 行動元存取屬於不同的熱點之一WN,而不是藉由相同熱 點所控制的一新的WN,如在第23圖中所示之重疊wNs及 第24圖所示之非重疊WNs。 在第24圖的例子中(重疊WNs),信號交遞被視為具有 20對在相同熱點中的該等WNs之間的信號交遞所描述者有許 多相同之處。在此上述提到的所有信號交遞技術用到此例 子中以及硬及軟信號交遞。 以相同或不同的技術在非重疊熱點之間的内部熱點信號交遞 一實施例被提供在熱點是非疊時的内部熱點信號交遞 73 1262005 玖、發明說明 之範例。此一範例如第24圖所示,其顯示一熱點控制器 110及二非重疊熱點HS1及HS2。在每一熱點之内是一無線 LAN,分別為WN1&amp;WN2。該熱點可以使用相同或不同的 技術。該實施例以相同的方式操作於在該相同熱點之内的 5非重疊WNs之例子,如以上關於第23圖所述者,及其在當 該行動裝置單元超出了任一 WN之涵蓋範圍時藉由通訊的 暫時遺失來被以描述。 上述的解決方案也可以被應用在第24圖的範例中。該 熱點控制器110為控制該等熱點二者之任一實體的或在該 10等熱點之間至少交換資訊,其確保該行動裝置單元電信工 作時期保持凍結,也就是說請求中但不遺失。另一方面, 上次服務該行動裝置單元之該熱點維持該等電信工作時期 於凍結狀態。維持該電信工作時期打開可以藉由不提供與 該行動裝置之通訊遺施之指示來被加以執行。在該系統之 15内的其他元件可以確保只要沒有此等資訊被提供,及至少 對於該需要的暫停之時間,該等電信工作時期可以真正地 維持在此凍結狀態。 現請參考第24圖所示,其假設該行動裝置M上一次是 在無線網路WN1中受到服務,該無線網路網路WN1是位在 2〇熱點HS1之内。在該行動裝置Μ失去在WN1之内的通訊或 服務之後,而後當其接著來到在熱點HS2之内的WN2涵蓋 範圍之内時,其建立與此無線網路之通訊。與此通訊建立 相關的資訊被遞送至該熱點控制器丨i 〇,無論該控制器是 以中心化或分散處理。一搜尋而後被執行來決定是否有該 74 1262005 玖、發明說明 行動裝置Μ的凍結電信工作期間。如果一凍結電信工作期 間被發現,其被再建立以確保在通訊中沒有遺失。該選擇 的通訊技術支援此信號交遞程序的是與在相同熱點之WNs 之間的信號交遞的例子相同。 5 本實施例因此確保在相同熱點或不同熱點之WNs之間 的傳送維持相同的無縫特性。 以不同技術操作在重疊PLMNs之間的内部PLMN信號交遞 現請參考第25圖所示,其是為說明在重疊PLMNs之間 的信號交遞之一簡化概要圖,其是具有二蜂巢細胞網路。 10 二 PLMNs,PLMN1 120及 PLMN2 122 重疊。每一 PLMN分 別具有一存取點124及126,及該存取點最後連接至一共用 邏輯控制器128。 現在參考第25圖所述之一實施例說明一種改善的方法 來提供服務給一行動裝置單元,該行動裝置單元可以接收 15 其現在所處的二PLMNs所涵蓋的區域之内的該二PLMNs之 信號。亦即該二PLMNs使用相同的技術或該行動裝置單元 可以使用兩種技術來連接。 該行動裝置所使用的資料通訊(包括有通過IP VoIP之 聲音)現在是由PLMN1 120來服務。服務的品質變得難以 20 接受,及該行動裝置被指示要進行搜尋,或它自己進行搜 尋,另一個服務。該搜尋的結果指示其要被PLMN2 122所 服務。 根據本實施例,該行動裝置單元最好是由該服務控制 器128所服務。該服務控制器典型地是藉由非該PLMN之一 75 1262005 玖、發明說明 不同服務來操作,雖然在一些例子中,其可以事實上屬於 該等PLMN載體之一。 如在後將解釋,實施例將同時提供即時連續的服務, 如果該行動裝置可以配置來與PLMNs二者保持同步通訊時 5 ,及對於該較簡單的例子,該行動裝置離開與該plmN1之 通訊及接著建立與PLMN2的通訊。 當提供給在PLMN 1之内的該行動裝置的服務變得不可 以接文時,不論是因為不良通訊條件,負載或在pLMN1之 内的其他條件,該行動裝置單元搜尋另一服務。該服務控 1〇制器絲該行動裝置正在進行的電信王作時期成為 一預設 暫的最長的暫態,其中該暫停可以是固定或可以被設定 的。該行動裝置單元之邏輯通訊因此被保留或束結,而實 體通訊是不能操作或正在被再建立中。該暫停可以因聲音 或不同型式的資料來作不同的定義。在該暫停結束之前, 15與該行動裝置之通訊是被假設是遺失的。 接下來的選擇性技術被提出來使用在該等pLMNs之間 的信號交遞。 1.在電信卫作時期位準上連續地作無線網路通訊之強 力切換 20 當PLMN’服務控制器或行動裝置單元辨識通訊條件 是不可以被接受時’該相對端放棄通訊。由該服務控制器 所放棄的通訊最好是藉由傳送一 徑制^號至一行動裝置單 元或藉由中斷該電信工作時里六 予功机%來使其讓該行動裝置 元決定通訊必需要被切換。該行 — 動裝置單70而後可以只要 76 1262005 玖、發明說明 脫離通訊及搜尋另一PLMN來切換,或者該PLMN1停止服 務來有效地脫離該行動裝置單元。在此二例中,該行動裝 置單元發現另一PLMN在該區域是存在的及試著加入它的 網路,在此例中是為PLMN2。一但通訊被再建立,該服務 5控制器辨識有一或多個請求電信工作時期存在於該再連接 的行動裝置單元及該電信工作時期(或該等電信工作時期) 因此被辨識為一自動再加入。 另一實施例使用存在於該PLMN中的服務控制邏輯。 在此例中,接受該行動裝置單元之該PLMN藉由接觸在該 1〇區域之内操作的PLMNs來發現該行動裝置單元隨後是否已 經被服務及是否有請求(凍結)電信工作時期;另一方面, 維持一開放工作時期之一以通知鄰近的pLMNs。 2.硬網路控制信號交遞協助之行動裝置單元 在又一實施例中,該行動裝置單元在脫離該PLMN之 15前搜尋及辨識另一可接受的pLMN,其巾該凡顧是現在 可以接受或可供使用的。該行動裝置而後送出通知給該服 務控制器或至另-實體來控制其實體通訊之邏輯。此實體 而後指不該行動裝置切換至該新的PLMN,其中該新的 PLMN是被決定為可接受每一^義的邏輯條件(工作關係, 20負載條件,行動裝置服務申請合約等)。 該區域無線行動裝置單元在當下列條件之任一符合時 搜尋另一 PLMN所覆蓋的範圍: a)心丁動裝置單元被程式化來常態地執行搜尋。該搜 寸區間可以、丄由服務控制器或通訊邏輯控制器指令來被預 77 1262005 玖、發明說明 先設定或控制。 b)該行動裝置被該服務控制器或通訊邏輯控制器來命 令去搜尋額外的通道。此典型發生在當後者決定信號交遞 是需要的時後。 5 該服務邏輯(或等效的通訊控制邏輯)而後可以決定該 行動單元是否健康地可以真正地進行信號交遞至另一 PLMN。此一決定是基於該被回覆通訊條件,該參與的 PLMN之負載條件及被該行動裝置所需要的服務。如果此 一信號交遞是被視為值得的時,該PLMN會被提示。 10 該行動裝置最好是以下列兩種方法中的一種來由該服 務的WN交給該接收的WN : a)如果該行動裝置可以接受無線網路選擇控制,則其 被命令交出給該被選擇(接收)PLMN。此一信號交遞最好 包括有該PLMN通訊參數之傳送以加速該交出程序; 15 b)如果該行動裝置不能接受無線網路選擇控制,則由 於该網路拒絕提供服務給它而脫離該服務PLmn。 1 ·硬信號交遞控制的行動裝置 在又一實施例中,該區域無線行動裝置搜尋另一 PLMN覆蓋在當 20 ⑴服務品質逐漸被視為不能滿足之時,或 ⑼當其接收來自該服務控制器128或類似的通訊控制 邏輯的一指令要求換到一較佳通訊服務時。 該行動裳置而後執行它可以偵測到所机麻之搜尋 及量測及決定那-個是可以切換的最佳pLMN。決定那一 78 1262005 玖、發明說明 個是要被切換的最佳PLMN之可能條件包括有被測量的通 訊條件特性或可以被該特定PLMN所提供的任何其他相關 的參數。 該行動裝置脫離現在正服務它的該PLMN。在一最佳 5 實施例中,該行動裝置單元在脫離該PLMN之前送出一提 示,以加速該信號交遞程序。 在由該現在服務PLMN脫離之前,該行動裝置單元試 著加入已經被選擇用來信號交遞之該PLMN。該服務控制 器128辨識該行動裝置單元已經由前一服務的PLMN信號交 10 遞至一新的PLMN,典型地是藉由匹配它至如先前的一請 求工作時期,及經由該新的PLMN來重新啟動它的工作時 期。 在上述信號交遞方法之一較佳實施例中,沒有網路協 助是需要的。然而,在另一實施例中,網路協助被使用。 15 網路協助典型地被提供給下列任一: (i) 可接受的相鄰PLMNs之辨識,亦即它們的通訊參數 的提供,例如避免嘗試登錄至因為其它限制在該區域之内 操作但不可以被接受的PLMNs ; (ii) 負載條件之資訊或其他相鄰PLMNs之可使用參數 20 :及 (iii) 在該服務PLMN之期網負載條件上的資訊。 1.網路命令,行動控制硬信號交遞 一再一實施例包括有一硬信號交遞,其是為一網路命 令但被該行動裝置單元所控制。本實施例是實施於當存在 79 1262005 玖、發明說明 於该服務控制器或其他通訊控制邏輯之該電信工作時期邏 輯決定該服務PLMN不能支援該行動裝置通訊條件時。網 路控制會或不會決定具由支援該服務之能力之鄰近網路之 可此可利用性。如果一能力被辨識,而後該網路控制最好 5傳送與可能的PLMN2通訊參數有關之資訊給該區域無線 行動裝置單元。 該行動裝置而後搜尋可以支援其服務要求的其他 PLMNs。在此發明的較佳實施例中,該行動裝置單元時間 跟著在該服務PLMN之通訊來多工搜尋相鄰的網路,因此 1〇將該信號交遞服務的影響降到最低。當信號交遞是不可行 時,對於該行動裝置單元之-選擇是脫離服務的pL_存 取及搜尋取代以相鄰的PLMNs。在這兩個例子中,該行動 電話可以使用先前由該服務控制器網路所提供的搜尋或其 可執行一任意搜尋。 15 綠該搜尋,該行動裝置決定期是錄行信號交遞至 另一 PLMN及試著存取此PLmn。 如果該行動裝置沒有成功的存取該被㈣的plmn, 該行動裝置試著存取下一個最佳PLMN如由其搜尋結果所 指示者,以此類推。 20纟存取已經被成功地完成之後,該服務控制器確認該 連接實際上是電信工作時期之除重新啟動及藉此可以確保 該電信工作時期的連續。 2·軟k 號交遞(s〇ft Handoff) 上述使用硬信號交遞之四個實施例中的三個實施例也 80 1262005 玖、發明說明 可以使用軟信號交遞來實現。如上述,在此所用的該用語 “軟信號,遞”指定示當由一 pLMN轉換至另一扎顧時維持 無縫連續的通訊,而且不會影響到在區域無線行動裝置之 内的電作時期活動,包括有那些依據限時的連續通訊 。也就是說,其存在有限時通訊的限制,例如TCP,及限 時應用,例如,訊號流。關於該軟信號交遞是沒有電信工 作時期被凍結,因此不會感覺到有服務被降級。 10 15 由本實施例所支援之軟信號交遞可以藉由在脫離與現 在服務的PLMN之前來建立該行動裝置單元與該第二 PLMN的通訊來加以實現。另一方面,其可以藉由切換 PLMNs快速到在電信工作時期通訊中沒由中斷來達成。為 了支援後者的條件,該服務控制器128可以提出先前資料 給該行動裝置單元。該先前資料可以在信號交遞期間暫時 地維持在該服務中。行動裝置邏輯也可以切換至需要較少 資料之一降級的模式,以在該行動裝置單元之使用者可以 接受情況下延伸為提供連續服務之該緩衝器所支援的時間 如果共同的服務在二PLMN網路之間是可以使用的, 至少在該行動裝置之傳送的方向上是可以使用的,則該信 20 號交遞可以是軟的。以使得在該信號交遞真正發生之前, 該候選的PLMN可以使其自身的資源來聽取該行動裝置; 或相反地,當該行動裝置開始負責該軟信號交遞時,而後 仍然連接在該第一 PLMN之該行動裝置單元可以使用其自 身的資源來監視該相鄰的PLMN。 81 1262005 玖、發明說明 許多種方法藉由下列的實施例來代表實施此軟信號交 遞: a)沒有行動裝置協助的軟網路控制信號交遞 在此實施例中,在該相鄰(候選)PLMN之内的第二接 5收器在其已經被該行動裝置之服務控制器提示其可能需要 被父出之後’其測量來自該行動裝置之接收信號。該第二 接收器可以是一專用接收器,其可以包括有暫時可利用的 資源或簡單地為此目的在該PLMN工作計劃之内的一些時 槽。 10 該服務控制器提供該新的PLMN的參數給該行動裝置 單元,使其在服務中不會有中斷。 b)行動裝置協助軟PLMN信號交遞 一再一實施例包括有由PLMN至另一具有來自該行動 裝置單元協助的PLMN之一軟信號交遞。在此實施例中, 15忒行動裝置搜尋額外的通道來測量及決定其他PLMN之通 訊條件及遞送出該資訊給該服務控制器或類似的通訊控制 邏輯。 該服務控制器或類似的通訊控制邏輯無論是中心化的 或分散的現在基於該行動裝置單元及該等pLMNs之操作狀 2〇恶選擇新的服務PLMN。較佳地,該等PLMNs提供此狀態 賣訊給該服務控制器/通訊邏輯來支援該行動裝置。 该服務控制器而後提供該新的服務PLMN之參數給該 订動装置。再者,如果新的服務PLMN可以接收的話。該 服務控制器提供信號交遞控制/指示給該新的服務PLMN。 82 1262005 玖、發明說明 為了確保不中斷的通訊,該行動裝置單元現在建立在 该新服務PLMN之内的通訊而不會中斷舊的PLMN通訊。 一旦通訊被建立之後,該行動裝置脫離該舊的pLMN。在 變動中,該行動裝置單元在脫離該PLMN之前送出一提示 5 信號。 c)行動裝置控制軟信號交遞 一再一實施例是關於在該行動裝置單元的完全控制下 由PLMN至另一 PLMN的軟信號交遞,相較於前一實施 例只疋行動裝置協助而已。再該實施例中,該行動裝置單 10 元本身搜尋額外PLMNs之通道在當 ⑴服務的品質逐漸不能滿足及其不能在現在的1&gt;1^1^^ 之内獲的較佳的服務,或 (ii)其接收到一指令要進行信號交遞至另一 plmn。 該行動裝置而後執行該搜尋及參與測量它可以接收的 15所有的無線網路。由該測量的結果,其可以決定那一個是 要切換最佳網路。決定要被切換之最之條件包括 有被測量的通訊特性及如果有來自該服務控制器之傳播或 有服務控制器可用時的網路負載。 该行動裝置而後提示該服務控制器/通訊邏輯,那 20 -個PLMNS它選擇來作該信號交遞及等待—確認或時間 結束,那-點是它建立與該新的PLMN通訊而不會與該現 在的PLMN中斷。在通訊被建立之後,該行動裝置|⑽ 離已經服務它的該PLMN。在變動中,該行動裳置在脫離 該PLMN之前送出一提示信號。 83 1262005 玖、發明說明 d)網路命令,行動控制軟信號交遞 一再一實施例包括一網路命令信號交遞,一但被該網 路所命令已經在該行動裝置單元之控制之下完全實施之時 。該方法是在當該行動裝置服務控制/通訊邏輯控制器決 5 定該服務PLMN不能支援該行動裝置服務通訊條件之時被 加以實施。服務控制可能會或不會決定具有支援服務能力 之可能相鄰PLMN網路。如果該能力被加以決定,而後該 服務控制傳送可使用的PLMN之通訊參數上的資料至該區 域無線行動裝置。 10 一但該行動裝置擁有該候選PLMN,該程序繼續如先 前行動控制軟信號交遞實施例一樣。 在此要注意,上述PLMN觀念可以被擴充至任何型式 的無線廣域網路(WWAN)。此等擴充使用是可預期的包括 在本發明之範圍之内。 15 在非重疊PLMNs以不同技術操作的交互PLMN信號交遞 現請參考第26圖,其是為說明具有共同服務/通訊邏 輯控制器之二非重疊PLMN網路之一簡化概要圖。二網路 PLMN1 130及PLMN2 132,每一個具有個別的存取點134 及136。一行動裝置單元138是在該PLMN1覆蓋的邊緣上, 20 及PLMN2的覆蓋是在附近但沒有任何真正的重疊。為了說 明目的,其可以是該等PLMNs在某些區域具有重疊但不包 括有現在的MS區域,但只要該行動裝置單元138可以到達 時,此不影響到操作。邏輯控器140是位在該PLMN網路二 者可以存取的一點上。 84 1262005 玖、發明說明 一旦該行動裝編與— PLMN麟通訊時,在此範例 為PLMN1,其工作時期被該服務㈣器_所保持 10 15 。該服務控制器; 東結該正在進行的行動裝置電信工作時^ 最常至一預選的最大時間長度。因此,該行動裝置單元之 邏輯通訊將被保持或凍結,而該實際的通訊是被不可以操 作的或正在被建立。該最大的時間長度可以針對聲音及不 同型式的資料來被加以定義。在該暫停結束之時,與該行 動裝置單元138之通訊被假定是遺失的。 在與該現在的PLMN之通訊被遺失之時,典型地在該 仃動裝置單元中的每一邏輯,其連續或間續地接觸另一 PLMN服務。當它進入另一 PL_之覆蓋範圍之内時,在 此例為PLMN2,其與該凡讀2建立通訊,然而在該較佳 實施例之内,該行動裝置單元在加入該PLMN網路之後提 供它的服務控制器之位址。 该信號交遞程序在此例子中是被實施在該電信工作時 期位準,而不會牽涉到該PLMN。當該行動裝置單元再建 立與该服務控制器140之通訊時,該服務控制器檢查該行 20動裝置仍然請求的任何電信工作時期,亦即,那些暫停已 經結束及沒有被它們所被保持的參與者切斷的電信工作時 期。該唯一的要求是該行動裝置可以經由現在正使用來通 訊的該PLMN達成與該服務控制器的通訊。 85 1262005 玖、發明說明 在無線區域及無線廣域網路之間的信號交遞 更進一步的實施例是有關於自在無線LAN及WAN之間 的信號交遞。更特別地,本發明額外的實施例一方面說明 用於具有存取像是一 PLMN(例如GPRS)之一無線廣域網路 5 之雙模式行動裝置的最佳服務的信號交遞,另一方明說明 由一或多個無線區域網路像是802.11 WLAN或一藍芽所支 援之一位置的一熱點(Hot Spot),該區域網路是由一或多 個存取點所服務。此等廣域或區域網路在此是指使用該用 語“通訊模式(communication modes)”。該相意的情節是在 10 第18圖中被加以說明。 如先前,該行動裝置單元經由為服務控制器所設計的 一邏輯實體連接,該服務控制器是負責蕪持該行動通訊信 工作時期。 在此例中,該信號交遞的目的是支援使用在該行動裝 15置之最佳通訊,每一定義的系統服務條件受制於該WWAN 及該WLAN之限制。典型的服務系統條件是最佳服務品質 最低成本,,然而其他的條件τ以被使用在控制該通訊流向 的該實體之内:該行動裝置客戶端,該服務控制器及該通 訊網路(該WWAN及該WLAN)。將要瞭解,因為熱點是完 2〇全在該WWAN之的範圍之内,掉、落到臨界水準之下的服務 品質之問題並不會發生。 另一貫施例考慮一行動梦署蛋J丨*3* 叮勒在置早7L具有搜尋另一通訊模Spot) Analysis of communication conditions and allowing for the redistribution of 20 WNs when necessary or for testing purposes. The CP (or the decentralized cP logic within the ap) then determines which of the best WNs the mobile device can signal for. The decision is based on the reported communication conditions, the download conditions of the WNs and the services required by the mobile device. The AP controls the WN and is then prompted. 66 1262005 发明, Invention Description The swaying device signals the transmission of the WN of the service to the received WN by reference to one of the two methods discussed in Figure 20: a) if the mobile device is acceptable When the wireless network selects control, its command is signaled to the selected (received) WN, including if the WN communication parameter can be transmitted to accelerate the signal handover procedure. b) if the mobile device is unable to accept the wireless network selection control, it may waive the service WN by denial of service; then the mobile device attempts to log in to another WN, and only the selected (received) WN accepts it Request to join the network. 10 4 · Mobile device controlled by hard signal handover In this implementation, the wireless mobile device in the area searches for additional channels when (1) the quality of the service is gradually unsatisfiable, or (ii) when it receives an instruction to send the parent signal When a better channel to a different WN. The mobile device then performs a search and measurement of all wireless networks, which can receive and determine which one is the best network to switch. The conditions for determining the optimum W N to be switched may include measurement of communication characteristics and load of the network. The mobile device then leaves the WN that provides the service to it. The selection is reserved for the mobile device and a prompt, 20 is delivered prior to exiting the WN to speed up the signal handover procedure. After being detached from the current service WN, the mobile device attempts to add the WN selected for signal delivery. The system can recognize that the mobile device has been disconnected from its current service WN to a new WN for signal delivery and to ensure that its telecommunications work period is resumed via the new WN. 67 1262005 Although the preferred embodiment of the signal handover method is not necessary for network assistance, the selection may be retained to implement the nickname handover as described with network assistance. Network assistance can be provided in any of the following: (I) Identification of acceptable WNs that can be received, that is, their communication parameters 5, for example, to avoid logging into WNs belonging to other systems; (II) Information on load conditions and available parameters of other neighboring WNs; and (Hi) information on expected load conditions of the service WN. 5. Network command, action control hard signal delivery 10 Please refer to Figure 21, which shows that the network control that exists in any of the CP or 4 AP determines that the service WN cannot support the mobile service. Communication conditions. The network control may or may not determine the possible neighboring network with the support service monthly force; if this capability is determined, the network control (via the AP communication) delivers the information on the communication parameters that can use the WNs to 15 Wireless mobile devices in the region. The mobile device then searches for other WNs that can support its service requirements. In a preferred embodiment of the method, the mobile unit time multiplexes the search for the neighboring network of its communication within the service WN, thereby minimizing the impact of the signal handover service. When this is not possible, an optional embodiment is maintained, wherein the mobile device accesses the service network and searches for neighboring WNs. In such embodiments, the mobile device can use the data provided by the network or use it in an arbitrary search. Based on this search, the mobile device decides which _WN will hand over the signal to try to access the WN. 68 1262005 发明, Invention Description If the mobile device does not successfully access — the WN is selected, the action access attempts to fetch the best WN based on its search results, and so on. After the access has been successfully completed, the network confirms that this is the beginning of the previous period of the letter to ensure the continuation of this telecommunications work period. 6. Soft signal handover (s〇ft handoff) Four of the above five methods with hard signal handover can also use "soft (''' signal handover. This term "soft" signal is handed over here. Is used to refer to the seamless continuity of maintaining communication when transferred from -WN to another, regardless of the telecommunications work period activities within the wireless mobile phone in the area, including those based on communications. The time limit is continuous, and there is no impact. The soft signal handover supported by this embodiment can be established between the mobile device unit and the second AP before leaving the current serving AP. In another method, it can also be achieved by switching between WNs quickly and without interruption in the telecommunications work period. Soft signal handover can be used, for example, when the second Ap is used as a design Transmitting outwards is actually achieved by listening to one of the current mobile devices. In the opposite example, where the mobile device unit takes the initiative, the mobile device can be designed to listen to it. Time slots for active neighboring systems. There are a number of methods discussed below for soft handoff within a WN. a) Soft network control signal delivery without regional wireless mobile device assistance 69 1262005 In this implementation, the second receiver in the adjacent wireless network measures the reception of the handover by the user request signal. The second receiver may be an eight-way receiver or allocated for this purpose. The normal AP receiver controls some time slots in the plan. 5 The network control provides the precise parameters of the new service AP to the mobile device and provides signal handover control to the new service WN, so there is no in the telecommunication service. b) providing a mobile device with soft network control signal handover assistance. In this implementation, the wireless mobile device in the area searches for additional channels to measure and determine the communication conditions of other networks and transmit the information. Ap, which maintains the information or sends the information to the CP regionally based on the centralized or decentralized infrastructure. The HS network (centralized or decentralized) is now based on the mobile device The information provided and the operational status of its WNs are used to select a new service. 15 The network control provides the precise parameters of the new service AP to the mobile device and provides signal handover control to the new service w N. To ensure uninterrupted communication, the mobile device now establishes communication within the new service WN without cutting off its old job communication. Once the communication is established, the action is out of service and has served its position. The change 20 implementation allows the mobile device to send a prompt before leaving the job. C) Soft Signal Handover Control Actions In this implementation, the wireless mobile device in the region searches for additional channels when the quality of the (1) service is gradually unsatisfied. Or, (ii) when it receives a command to signal the delivery to a preferred channel in a different position. 70 1262005 玖, invention describes the tracking device and then performs all wireless network searches and measurements, It can then receive and decide which one is the best network to be switched. The optimal w_ condition to decide to be switched may include measured communication characteristics and/or network load. 5 The slamming device then prompts the network controller to indicate which WN it selected is to be handed over as a signal and wait for an acknowledgment or end of time, where it establishes communication with the new WN without cutting off the current WN. After the communication has been established, the mobile phone leaves the WN that it has been served. The selection is reserved for the mobile device and a prompt signal is sent between the WNs and the network command. The mobile device controls the soft signal handover. The method is implemented in the network that exists in the cp or Ap. Control determines when the service WN cannot support the mobile service communication condition. The network control may or may not determine the possible neighboring network with the support service capability; if the 15 capabilities are determined, the network control (via the AP communication) delivers the information on the communication parameters of the available WNs. Wireless mobile device in the area. Once the mobile device has the possible WNs, the procedure continues as in the previous example (action control soft signal handover). An intra hot spot handoff that operates in the same technology between non-overlapping WNs. Referring now to Figure 22, a simplified summary of one of the two sub-overlapping WNs shown within the same hotspot is shown and is coupled to a single central point 100. This hotspot can include additional WNs. When a mobile device unit is disconnected from a WN communication, and at the same time, the communication condition does not allow communication with the 71N 1262005, the invention description, another -WN, which assumes that the use is not within the coverage of the hotspot. It may be that the hotspot actually covers the mobile device unit, but it is not supported now, but this example is preferably in the same way that the mobile device unit is not within the covered area. deal with. However, the time for the pause can be constant or can be changed, and the logical communication of the mobile unit can be maintained or frozen. This pause can be defined differently depending on the circuit switching communication and the divided communication, or the sound and data. The communication with the mobile device unit is assumed to be lost until the end of the suspension. If, when the communication continues, the mobile device unit accesses another WN, the hotspot preferably controls the first signal delivery example defined by the above-mentioned time period (at the telecommunication work level, the continuous wireless network) Powerful switching of road communication). Operation in different techniques, internal hotspot signal handover between WNs is also described in FIG. 22 in an embodiment, the difference being that in this example the WNs operate with different techniques, for example 8 分别2. Ub wireless network (Wi-Fi) and Bluetooth. Since different techniques are used, it makes no effect on the overlap of the WNs; the assumption is that the mobile device unit performs signal handover by a WN before another WN establishes communication. Preferably, signal handoff is performed in the same manner as described above in detail in the same technical operation as described above and is described in detail above. As before, the mobile device unit is not considered as if it has been detached from a network. Rather, for a fixed or adjustable pause duration of 72 l262〇〇5 玖, the inventive device's logical communication is reserved or frozen, which is maintained during the request of Ihai Telecom. status. This pause can give different definitions for the switching circuit communication and for the packetized communication. At the end of the suspension, communication with the mobile unit is assumed to be lost. 5 The communication was defined missing and a new communication was re-established. The hot spot controller (Hot Spot contr() ller), or any connection logic thereon, checks the requesting telecommunications work period of the user mobile device unit to establish communication. If the hotspot connection logic successfully establishes the mobile device unit to maintain the overnight (one or the evening telecom working period), the hotspot control immediately considers that it is a continuous wireless network communication in the telecommunications working period level. The example of the signal handover as defined above for the strong handover, and the telecommunications work period or the telecommunications work period are re-established in a short period of time without data loss. The internal hotspot signal delivery between the overlapping hotspots by the same or different techniques 15 or more may be extended to include the action element accessing one of the different hotspots WN instead of A new WN controlled by the same hotspot, such as the overlap wNs shown in Fig. 23 and the non-overlapping WNs shown in Fig. 24. In the example of Fig. 24 (overlapping WNs), signal handoff is considered to have many similarities to those described by 20 pairs of signal handoffs between the WNs in the same hotspot. All of the signal handoff techniques mentioned above are used in this example as well as hard and soft signal handoffs. Internal Hotspot Signal Handover Between Non-Overlapping Hotspots Using the Same or Different Techniques An embodiment is provided for internal hotspot signal delivery when the hotspot is non-stacked. 73 1262005 范例, an example of an inventive description. This is shown, for example, in Fig. 24, which shows a hotspot controller 110 and two non-overlapping hotspots HS1 and HS2. Within each hotspot is a wireless LAN, WN1 &amp; WN2. This hotspot can use the same or different technologies. This embodiment operates in the same manner as an example of 5 non-overlapping WNs within the same hotspot, as described above with respect to Figure 23, and when the mobile device unit exceeds the coverage of any WN It is described by the temporary loss of communication. The above solution can also be applied in the example of Fig. 24. The hotspot controller 110 controls at least one of the entities of the hotspots or at least exchanges information between the hotspots, which ensures that the mobile device unit remains frozen during the telecommunications period, that is, the request is not lost. On the other hand, the hotspot that last served the mobile device unit maintained the telecommunications operation period in a frozen state. Maintaining the telecommunications work period opening can be performed by not providing an indication of the communication with the mobile device. Other components within the system 15 can ensure that the telecommunications service period can be truly maintained in this frozen state as long as no such information is provided, and at least for the time of the required suspension. Referring now to Figure 24, it is assumed that the mobile device M was last served in the wireless network WN1, which is located within the hot spot HS1. After the mobile device loses communication or service within WN1, it then establishes communication with the wireless network as it then comes within the coverage of WN2 within hotspot HS2. Information related to the establishment of this communication is delivered to the hotspot controller 无论i 〇, whether the controller is centralized or decentralized. A search is then carried out to determine whether there is a frozen telecommunications work period during the operation of the device. If a frozen telecommunications work is discovered, it is re-established to ensure that no loss is lost in the communication. The selected communication technology supports this signal handover procedure in the same way as the signal handover between WNs of the same hotspot. 5 This embodiment thus ensures that the transmission between WNs of the same hotspot or different hotspots maintains the same seamless characteristics. Internal PLMN signal handover between overlapping PLMNs operating in different techniques. Referring now to Figure 25, it is a simplified overview of signal delivery between overlapping PLMNs, which has two cellular networks. road. 10 2 PLMNs, PLMN1 120 and PLMN2 122 overlap. Each PLMN has an access point 124 and 126, respectively, and the access point is ultimately connected to a shared logic controller 128. Referring now to an embodiment illustrated in Figure 25, an improved method is provided for providing a service to a mobile device unit that can receive 15 of the two PLMNs within the area covered by the two PLMNs in which it is currently located. signal. That is, the two PLMNs use the same technology or the mobile device unit can be connected using two techniques. The data communication used by the mobile device (including voice over IP VoIP) is now served by PLMN1 120. The quality of the service becomes difficult to accept, and the mobile device is instructed to search, or it searches for itself, another service. The result of this search indicates that it is to be served by PLMN2 122. According to this embodiment, the mobile device unit is preferably served by the service controller 128. The service controller is typically operated by a different service than the PLMN, although in some instances it may in fact belong to one of the PLMN carriers. As will be explained hereinafter, embodiments will provide instant continuous service, if the mobile device can be configured to maintain synchronous communication with both PLMNs 5 , and for this simpler example, the mobile device leaves communication with the plmN1 And then establish communication with PLMN2. When the service provided to the mobile device within the PLMN 1 becomes unreachable, the mobile device unit searches for another service whether due to bad communication conditions, load or other conditions within the pLMN1. The service control device is in the ongoing telecommunications mastering period to become a preset temporary longest transient, wherein the pause can be fixed or can be set. The logical communication of the mobile device unit is thus retained or bundled, while the physical communication is inoperable or is being re-established. This pause can be defined differently by sound or different types of data. Before the end of the suspension, 15 communication with the mobile device is assumed to be lost. The next selective technique was proposed to use signal handoff between the pLMNs. 1. Continuous switching of wireless network communication during the telecommunications satellite level 20 When the PLMN' service controller or mobile device unit recognizes that the communication condition is unacceptable, the opposite end abandons communication. Preferably, the communication abandoned by the service controller is configured to cause the mobile device to determine the communication by transmitting a path to a mobile device unit or by interrupting the % of the mobile device during the telecommunications operation. Need to be switched. The line - the mobile device unit 70 can then be switched as long as 76 1262005, the invention description is disconnected from communication and another PLMN is searched, or the PLMN 1 stops the service to effectively detach from the mobile device unit. In both cases, the mobile device unit finds that another PLMN is present in the area and attempts to join its network, in this case PLMN2. Once the communication is re-established, the service 5 controller recognizes that one or more requested telecommunications work periods exist in the reconnected mobile device unit and the telecommunications work period (or the telecommunications work period) and is thus recognized as an automatic re Join. Another embodiment uses the service control logic present in the PLMN. In this example, the PLMN accepting the mobile device unit discovers whether the mobile device unit has subsequently been serviced and whether there is a request (freeze) of the telecommunications work period by contacting the PLMNs operating within the area; In respect, one of the open working periods is maintained to notify neighboring pLMNs. 2. Hard Network Control Signal Handover Assistance Mobile Device Unit In yet another embodiment, the mobile device unit searches for and identifies another acceptable pLMN before exiting the PLMN 15, which is now acceptable or Available for use. The mobile device then sends a notification to the service controller or to another entity to control the logic of its physical communication. This entity then refers to the mobile device not switching to the new PLMN, where the new PLMN is determined to accept each logical condition (work relationship, 20 load conditions, mobile device service application contract, etc.). The area wireless mobile device unit searches for a range covered by another PLMN when either of the following conditions is met: a) The heart unit is programmed to perform the search normally. The search interval can be set or controlled by the service controller or the communication logic controller command. b) The mobile device is commanded by the service controller or communication logic controller to search for additional channels. This typically occurs when the latter decides that signal delivery is needed. 5 The service logic (or equivalent communication control logic) can then determine if the mobile unit is healthy enough to actually hand over the signal to another PLMN. This decision is based on the replies to the communication conditions, the load conditions of the participating PLMNs and the services required by the mobile device. If this signal handover is considered worthwhile, the PLMN will be prompted. 10 The mobile device is preferably handed over to the receiving WN by the WN of the service in one of two ways: a) if the mobile device can accept wireless network selection control, it is ordered to hand over to the mobile device The PLMN is selected (received). Preferably, the signal delivery includes the transmission of the PLMN communication parameter to speed up the delivery procedure; 15 b) if the mobile device is unable to accept the wireless network selection control, the network is denied the service because it refuses to provide the service Serving PLmn. 1 - Hard Signal Handover Controlled Mobile Device In yet another embodiment, the regional wireless mobile device searches for another PLMN coverage when 20 (1) quality of service is gradually deemed to be unsatisfiable, or (9) when it receives from the service An instruction of controller 128 or similar communication control logic requires a change to a preferred communication service. The action is executed and then it can detect the search and measurement of the machine and determine which one is the best pLMN that can be switched. The possible conditions for determining the best PLMN to be handed over include the measured communication condition characteristics or any other relevant parameters that may be provided by the particular PLMN. The mobile device leaves the PLMN that is currently serving it. In a preferred embodiment 5, the mobile device unit sends a prompt before disengaging the PLMN to speed up the signal handover procedure. Prior to detachment from the current serving PLMN, the mobile device unit attempts to join the PLMN that has been selected for signal delivery. The service controller 128 recognizes that the mobile device unit has been handed over by the PLMN signal of the previous service to a new PLMN, typically by matching it to a requesting service period as before, and via the new PLMN. Restart its working period. In a preferred embodiment of the above signal handoff method, no network assistance is required. However, in another embodiment, network assistance is used. 15 Network assistance is typically provided to any of the following: (i) the identification of acceptable adjacent PLMNs, ie the provision of their communication parameters, for example to avoid attempting to log in to operate within the area due to other restrictions but not PLMNs that can be accepted; (ii) information on load conditions or available parameters of other neighboring PLMNs 20: and (iii) information on the network load conditions of the service PLMN. 1. Network Command, Action Control Hard Signal Handover Again and again, the embodiment includes a hard signal handoff that is a network command but is controlled by the mobile device unit. This embodiment is implemented when the telecommunications operating period logically determines that the serving PLMN cannot support the mobile device communication condition when there is a 79 1262005 发明 invention described in the service controller or other communication control logic. Network control may or may not determine the availability of a neighboring network with the ability to support the service. If a capability is recognized, then the network control preferably transmits information about the possible PLMN2 communication parameters to the regional wireless mobile device unit. The mobile device then searches for other PLMNs that can support its service requirements. In a preferred embodiment of the invention, the mobile device unit multiplexes the neighboring network with the communication at the serving PLMN, thereby minimizing the impact of the signal delivery service. When signal handoff is not feasible, the choice for the mobile device unit is to replace the service's pL_ access and search with the adjacent PLMNs. In both examples, the mobile phone can use the search previously provided by the service controller network or perform an arbitrary search. 15 Green search, the mobile device decides that the recording signal is handed over to another PLMN and attempts to access the PLmn. If the mobile device does not successfully access the plmn of (4), the mobile device attempts to access the next best PLMN as indicated by its search results, and so on. After the 20-inch access has been successfully completed, the service controller confirms that the connection is actually a restart of the telecommunications service period and thereby ensures continuity of the telecommunications service period. 2. Soft k number handover (s〇ft Handoff) The three embodiments of the above four embodiments using hard signal handover are also 80 1262005. The invention description can be implemented using soft signal handover. As used above, the term "soft signal," as used herein, is intended to mean seamlessly continuous communication when switching from one pLMN to another, without affecting the electrical work within the regional wireless mobile device. Period activities, including those based on time-limited continuous communication. That is, it has limited communication limitations, such as TCP, and time-limited applications such as signal streaming. Regarding the soft signal handover, it is not frozen during the telecommunications work period, so there is no feeling that the service is downgraded. The soft signal handover supported by the present embodiment can be implemented by establishing communication between the mobile device unit and the second PLMN prior to disengagement from the currently serving PLMN. On the other hand, it can be achieved by switching PLMNs quickly to no interruption in telecommunications work period communication. In order to support the latter conditions, the service controller 128 can present prior information to the mobile device unit. This prior information can be temporarily maintained in the service during signal delivery. The mobile device logic can also switch to a mode that requires less degradation of one of the data to extend the time supported by the buffer providing continuous service if the user of the mobile device unit is acceptable if the common service is in the second PLMN The network can be used, at least in the direction of transmission of the mobile device, the letter 20 can be soft. So that the candidate PLMN can have its own resources to listen to the mobile device before the signal handover actually occurs; or conversely, when the mobile device begins to be responsible for the soft signal handover, and then still connected to the The mobile device unit of a PLMN can use its own resources to monitor the neighboring PLMN. 81 1262005 发明, Invention Description A number of methods represent the implementation of this soft signal handover by the following embodiments: a) Soft network control signal handover without mobile device assistance In this embodiment, in the neighbor (candidate The second receiver within the PLMN 'has measured the received signal from the mobile device after it has been prompted by the service controller of the mobile device that it may need to be taken out by the parent device. The second receiver can be a dedicated receiver that can include temporarily available resources or simply some time slots within the PLMN work plan for this purpose. 10 The service controller provides the parameters of the new PLMN to the mobile device unit so that there is no interruption in the service. b) Mobile device assists soft PLMN signal handover. Still another embodiment includes soft signal handover from one of the PLMN to another PLMN with assistance from the mobile device unit. In this embodiment, the 15 忒 mobile device searches for additional channels to measure and determine the communication conditions of other PLMNs and to deliver the information to the service controller or similar communication control logic. The service controller or similar communication control logic, whether centralized or decentralized, now selects a new service PLMN based on the mobile device unit and the operational status of the pLMNs. Preferably, the PLMNs provide this status to the service controller/communication logic to support the mobile device. The service controller then provides the parameters of the new serving PLMN to the subscriber. Furthermore, if the new service PLMN can receive it. The service controller provides signal handover control/indication to the new serving PLMN. 82 1262005 发明, Invention Description In order to ensure uninterrupted communication, the mobile device unit now establishes communication within the new serving PLMN without interrupting the old PLMN communication. Once the communication is established, the mobile device leaves the old pLMN. In the event of a change, the mobile device unit sends a prompt 5 signal before leaving the PLMN. c) Mobile Device Control Soft Signal Handover A further embodiment relates to soft signal handover from the PLMN to another PLMN under full control of the mobile device unit, which is only assisted by the mobile device as compared to the previous embodiment. In this embodiment, the mobile device itself searches for the channel of the extra PLMNs by itself. (1) The quality of the service is gradually unsatisfied and the better service that cannot be obtained within the current 1&gt;1^1^^, or (ii) It receives an instruction to signal the delivery to another plmn. The mobile device then performs the search and participates in measuring all of the wireless networks it can receive. From the results of this measurement, it can be determined which one is to switch the best network. The most appropriate conditions for deciding to be switched include the measured communication characteristics and the network load if there is a propagation from the service controller or a service controller is available. The mobile device then prompts the service controller/communication logic, the 20-PLMNS it chooses to make the signal handover and wait--acknowledgement or time-out, that-point is that it establishes communication with the new PLMN without The current PLMN is interrupted. After the communication is established, the mobile device|(10) is away from the PLMN that has served it. In the event of a change, the action is sent to send a prompt signal before leaving the PLMN. 83 1262005 玖, invention description d) network command, action control soft signal handover again and again embodiment includes a network command signal handover, once commanded by the network has been completely under the control of the mobile device unit At the time of implementation. The method is implemented when the mobile device service control/communication logic controller determines that the serving PLMN cannot support the mobile device service communication condition. Service Control may or may not determine possible neighboring PLMN networks with support capabilities. If the capability is determined, then the service control transmits the data on the communication parameters of the available PLMN to the regional wireless mobile device. 10 Once the mobile device owns the candidate PLMN, the procedure continues as in the previous action control soft signal handover embodiment. It should be noted here that the above PLMN concept can be extended to any type of wireless wide area network (WWAN). Such extended use is contemplated to be encompassed within the scope of the invention. 15 Interacting PLMN Signal Handover with Different Techniques in Non-Overlapping PLMNs Referring now to Figure 26, it is a simplified overview of one of the two non-overlapping PLMN networks with a common service/communication logic controller. The two networks PLMN1 130 and PLMN2 132 each have individual access points 134 and 136. A mobile device unit 138 is on the edge covered by the PLMN 1, and the coverage of 20 and PLMN 2 is nearby but without any real overlap. For purposes of illustration, it may be that the PLMNs have overlaps in certain areas but do not include the current MS area, but this does not affect the operation as long as the mobile device unit 138 can arrive. Logic controller 140 is located at a point accessible to both PLMN networks. 84 1262005 发明, invention description Once the action is installed and PLMN communication, the example is PLMN1, and its working period is maintained by the service (4) _ 10 15 . The service controller; East knot the ongoing mobile device telecommunications work ^ most often to a preselected maximum length of time. Therefore, the logical communication of the mobile device unit will be maintained or frozen, and the actual communication is not operational or is being established. This maximum length of time can be defined for sound and different types of data. At the end of the pause, communication with the mobile unit 138 is assumed to be lost. While the communication with the current PLMN is lost, each of the logic in the panning unit typically contacts another PLMN service continuously or sequentially. When it enters the coverage of another PL_, in this case PLMN2, which establishes communication with the RAM 2, however, in the preferred embodiment, the mobile unit is added to the PLMN network. Provide the address of its service controller. The signal handoff procedure in this example is implemented at the telecommunications work time level without involving the PLMN. When the mobile device unit re-establishes communication with the service controller 140, the service controller checks for any telecommunications work periods that the line 20 is still requesting, that is, those pauses have ended and are not maintained by them. Participants cut off the period of telecommunications work. The only requirement is that the mobile device can communicate with the service controller via the PLMN currently being used to communicate. 85 1262005 玖, DESCRIPTION OF THE INVENTION Signal Handover Between Wireless Areas and Wireless Wide Area Networks A further embodiment is related to signal handoff between a wireless LAN and a WAN. More particularly, an additional embodiment of the present invention illustrates, on the one hand, signal handover for optimal service with dual mode mobile devices accessing a wireless wide area network 5 such as a PLMN (e.g., GPRS), the other illustrative By one or more wireless area networks like 802. 11 A hot spot in a location of a WLAN or a Bluetooth support that is served by one or more access points. Such wide area or regional networks are used herein to refer to the term "communication modes." The desired plot is illustrated in Figure 10 on page 18. As before, the mobile device unit is connected via a logical entity designed for the service controller, which is responsible for maintaining the operational time of the mobile communication message. In this example, the purpose of the signal handover is to support the use of the best communication in the mobile device, and each defined system service condition is subject to the limitations of the WWAN and the WLAN. Typical service system conditions are the lowest cost of best service quality, however other conditions τ are used within the entity that controls the flow of the communication: the mobile device client, the service controller and the communication network (the WWAN) And the WLAN). It will be understood that because the hotspots are all within the scope of the WWAN, the problem of service quality falling below the critical level will not occur. Another consistent example considers a mobile dream office egg J*** Muller has another search module in the early 7L

式之能力的例子,及老廢i i , a . tI 哼應其再一次具有搜尋另一通訊模式 的能力,但只藉由中斷該現在的通訊模式。 86 1262005 玖、發明說明 使用在現在的較佳實施例之邏輯簡單地藉由優先的自 動與該WLAN連接相關來操作。此意為無論何時該熱點連 接及PLMN連接是可獲得,該熱點連接是較受歡迎的。 在本實施例中,一行動裝置單元在當其偵測到一 5 WLAN存在之時被連接至一 PLMN。當該WLAN服務有優 先權,該行動裝置單元試著連接該WLAN。該行動裝置單 元驗證該WLAN可否使用及經由該WLAN建立與其服務控 制器通訊之方法是如上述及在此不再加以重覆。 在一信號交遞的過程中,該行動裝置單元與該新的網 10 路連接及再一次與該服務控制器建立通訊。另一方面,該 服務控制器建立與該行動裝置單元之通訊。該打開的蜂巢 細胞電信工作時期只要在需要,其被加以維持,及至少直 到該再連接的行動裝置被辨識或執到暫停時間已經達到。 維持該工作時期於一蜂巢細胞資料服務意為該蜂巢細 15 胞資料協定被使用及使用者資料是經由被使用的任何存取 通道,例如在WLAN中,來真正的被傳送。此確保該蜂巢 細胞服務在即使一非蜂巢細胞通道被使用在行動裝置存取 時也不會受到影響。如果加以考慮,實際上被使用的該存 取通道可以是實際賞可以被想到型式的通道,特別是區域 20 LAN可以使用者。為進一步澄清此點,一 GPRS網路之電 信服務使用者可以經由以上討論之一閘道器來存取其蜂巢 細胞服務。在此例中的該服務控制器可以被實現在該 GPRS閘道器之内或是作為一分離的個體。 該行動裝置使用該WLAN存取,只要該WLAN的服務 87 1262005 玖、發明說明 品質是可以接受的’在該行動裝置客戶端之内所定義的每 一條件,該服務控制器或二者。 當該行動裝置偵測到在該WLAN熱點之内的服務品質 是不可以接受時,或當其服務控制器這樣指示時,其最後 5進行WWAN存取的搜尋。如果通訊仍然在WLAN中可以使 用’該行動裝置可以提示它的服務控制器關於信號交遞及 其搜尋不同存取路徑的需求,包括有WWAN存取。一不同 的實施例具有指示該行動裝置單元應信號交遞至該WWAN 之该服務控制器。其可以是一般性的指令或可以是特定為 10期待操作在行動裝置位置所在的區域之内的一 WWAN存取 。由無線區域回到無線廣域網路之信號交遞因此總是或幾 乎總是發生在當該行動裝置的WLAN連接被嚴重的降級或 幾乎遺失及該行動裝置偵測可以使用的WWAN(例如, PLMN,GPRS)。大體而言其意為該行動裝置單元是簡單 15 地移出該WLAN的範圍。 在上面經討論的多種信號交遞方法大體上可以使用在 目前的WLAN至WWAN例子。五種不同的實施例被討論如 後: 1.具有在電信工作位準連續之無線網路之強力切換 2〇 在第一實施例,當熱點控制器,服務控制器或行動裝 置辨識通訊條件不能接受時,該相對端放棄通訊。被該服 務控制器所放棄的通訊將是藉由傳送一信號交遞控制信號 至該行動裝置或藉由中斷該電信工作時期流至引起該行動 裝置早兀決定通訊必需被切換的該點。該Ms而後簡易地 88 1262005 玖、發明說明 放棄通訊及尋找要切換的一WWAN存取,或在當其不再獲 知來自该WLAN之服務時放棄通訊。在任一例子中,如果 该MS發現在該區域中有一 WWAN活動,其會試著登錄於 其中。一但通訊被再一次建立時,該服務控制器辨識對該 行動裝置單元之一或多個請求電信工作時期及該被辨識的 電信工作時期(或多個電信工作時期)是自動地被再加入。 本發明之另一實施例是有關於服務控制邏輯存在於嘎 WLAN熱點之内的例子。在此例中,在該wlan之内的該 服務控制器是藉由接觸該WLAN控制器來發現該行動裝置 1〇疋否奴後已經被服務及藉由此無請求(凍結)的電信工作時 期。 2·行動裝置協助應網路控制信號交遞 在本實施例中,該行動裝置在脫離仍連被連接且儘管 在一不可以接受的服務品質下該WLAN之逐漸降級服務之 15前搜尋及辨識—可接受的WWAN之操作。此行動裝置而後 运出其為該服務控制器所產生的身份資料的詳細細節至該 服務控制器,或至實際控制該實際通訊之邏輯之另一實體 女果,、决疋疋為可接文的每一定義邏輯條件時(漫遊協 定,負載條件,行動裝置電信服務合約等),該實體而後 20 指不或使該行動裝置切換至該WWAN。 。玄行動裝置由該服務的WLAN交到該接收WWAN是以 下列兩種方式中的一種: a)如果該行動裝置可以接收無線網路選擇控制,其被 π令父接至該W WAN。較佳地,如果可能且需要,傳送包 89 l262〇〇5 玖、發明說明 括有該WWAN通訊參數,藉此加速交接程序。 b)如果该行動裝置不能接受無線網路選擇控制,其簡 易地藉由中斷服務來脫離該服務的WLAN ;在那時,該行 動裝置單元試著登錄至該WWAN及接觸到它的服務控制邏 3.行動裝置控制硬信號交遞 在一再一實例中,該行動裝置單元搜尋WWAN覆蓋在 ⑴服務的品質逐漸不能滿足時;及 1〇 (⑴當其接收來自該服務控制器或類似通訊控制邏輯 的一扎令要#號交遞至另一較佳通訊服務時。 該行動裝置而後執行關於其可以價測的一或多個 ANs之測里之-搜尋,及決^那_個是要被切換的最 佳者。優先選擇通常是由其原先電信服務供應者來授與, 15但在該行動客戶專内的特定邏輯或來自該肌频之控制可 以改變此優先權。 該行動裝置而後脫離已經服務它的該脱频,如果其 尚未被切斷。在本實施例之—變化實施中,該行動裝置在 脫離該WLAN之前遞送出—提示以加速㈣交遞程序及改 20 善系統及電信工作期間控制。 在由該服務WLAN脫離之後,該行動裝置單元試著加 入被選擇來進行信號㈣之該Wan。該服務控制器最好 決定該行動裝置單元p勉士止乂 早疋已&amp;由先前服務的WLAN被信號交遞 至该WWAN,_該相應電信工作時期及允許該工作時期 90 !262〇〇5 玖、發明說明 或該等工作時期經由新的連接重新開始。 雖然在此信號交遞方法之較佳實施例中並不需網路協 助,其有一額外實施例被提供來實施具有網路協助的信號 交遞。網路協助可以被下列任一提供: 5 ⑴可接受相鄰WWANs之身份,亦即,提供它們的通 訊參數,例如避免試著登錄已知操作在此區域之内但因為 其他因素不可以被接受的WWANs ; (Π)服務條件之資訊或相鄰|\^比之其他可用參數, 例如,如果在該區域中它們的服務已知或可預期具有問題 10 ;及 (111)在該服務WLAN之期望可使用的資訊。 4.網路命令,行動裝置控制硬信號交遞 一再一實施例是有關於一網路命令信號交遞。遵循著 該命令,該信號交遞本身是被該行動裝置單元所控制。該 15方法是實現在當存在於該服務控制器或其通訊控制邏輯之 中之該電信工作時期控制》定該服務机额不能支援行動 服務通訊條件。網路控制可以被使用來決定在該服務區域 之内可能可使用的WWANs,但此並非必要的。如果此一 可使用者被決定,網路控制傳送與候選_趟相關之通 20訊參數的資訊給該行動裝置單元。 該行動裝置單元現在搜尋可以支援它的服務請求的任 WWAN在本方法的較佳實施例中’該行動裝置單元分 時多工搜尋它靠她,而同時試著維持與該WLAN之通 Λ以提供匕的使用者具有一預定水準的服務,因此將該信 91 1262005 玖、發明說明 “遞服務影響降到最小。當此不可行時,—變化實施允 u仃動裝置脫離該机鼎存取而只搜尋鄉祕服務。在 兩個實知例中,該行動裝置可以使用先前由該服務控制器 網路所提供之資料或進行一任意搜尋。 基於该搜尋,該行動裝置決定是否有一位置可以執行 信號交遞至該WWAN,及,如果如此,其試著存取該 WWAN。 如果忒行動裝置不能成功地存取所嘗試的該第一 WWAN ’而後其會試著存取在它搜尋結果中的下一最佳 10 WWAN,以此類推。 在存取被成功地完成之後,該服務控制器_認此為前 -電信工作時期或先前多數個電信工作時期的重新開始, 以確保該電信工作時期的繼續。 5·軟信號交遞 15 相關於硬信號交遞之上述四個實施例中的三個實施例 也可以被實現來提供軟信號交遞。如上所解釋,在此所使 用之該用語軟信號交遞是指當由該WLAN轉換至|^^^時 維持通訊的無縫連續,而不會影響到在該區域無線行動裝 置之内的電信工作時期活動,包或有那些視限時連續通訊 20者。此差別是其沒有電信工作時期被凍結,及因此服務上 不會有降級被察覺。 被本發明所支援之軟信號交遞可以藉由在脫離與該服 務WLAN之前建立與該WWAN之行動裝置單元通訊,或藉 由加入該WWAN快速到脫離該WLAN時不會在電信工作時 92 1262005 玖、發明說明 期通訊中斷。為了支援後者條件,該服務控制器可以先提 供資料給該行動裝置。該先前提供資料可以被暫存以維持 在信號交遞期間的服務。行動裝置邏輯也可以切換至需要 較少資料之一降級模式,以延長該緩衝器所支援之時間以 5為該行動裝置單元之使用者可以接收的連續服務。 該軟信號交遞實施例之一變化實施例考慮到該行動裝 置單元可以在脫離該WLAN之前加入該WWAN及有效地進 行該信號交遞。 軟信號交遞可以是網路控制或行動裝置控制的。 10 a)網路控制軟信號交遞 在該網路控制實施例中,該行動裝置單元搜尋它自己 的每一邏輯,或來自該服務/通訊控制WWAN通道之每一 才曰令’以測量及決定它們的通訊可使用性。可使用性資料 而後被轉送至該服務控制器或類似的通訊控制邏輯,其中 15 如上述可已是中心化或分散的。 该服務控制器或類似通訊控制邏輯現可以基於該行動 裝置單元所提供的資料及該WWANs之操作狀態來選擇該 新的服務WWAN。後者可以藉由該wWANs提供此狀態資 料至該服務控制器或通訊邏輯支援該行動裝置來實現。 1〇 該服務控制器可以提供該新的服務WWAN之參數給該 行動裝置或信號交遞控制/指示至該被選擇的WWAN。 為了確保不中斷的通訊,該行動裝置單元最好在切斷 它的WLAN連接之前,建立在該WWAN之内的通訊。 b)行動裝置控制軟信號交遞 93 1262005 玖、發明說明 在該行動裝置控制實施中,該行動裝置單元搜尋活動 的WWANs之通道在當 ⑴有指示服務的品質變的不能滿足;或 00其接收一指令來進行信號交遞至一 WWAN。該後 5者可能發生在當該服務控制器接受到該WLAN服務要被脫 離之先前通知指示。 «亥行動裝置而後最好執行關於現在可以衔收的所有可 用的無線網路之搜尋,及決定那一個網路是要切換的最佳 者。決定那一個是要切換的最佳WWAN之條件可以包括有 1〇被’則量的通汛特性及網路負載,如果來自該服務控制器之 廣播或可由該服務控制器取得的話。 该行動裝置單元而後提示該服務控制器/通訊邏輯那 一個WWAN已經被選擇用於該信號交遞及等待一確認或一 暫停結束(最小暫停可能為零),其中其建立於該冒^1^之 15通訊而不會與該WLAN中斷。在通訊已經被建立之後,該 行動裝置脫離已經服務它的WLAN。在一變化實施例中, 該行動裝置在脫離該WLAN之前遞送出一提示。 由該WWAN至WLAN的信號交遞反向程序是類似的。 然而,如上述,在此例中,信號交遞不需要是因為來自該 20 WAN之服務品質已經下降而被啟動。其分別被敘述如下·· 該行動裝置需要週期地檢查其對於可使用wWlan* 定義的邏輯。此是由於該部份的WLAN覆蓋在該卿龍服 務範圍之内。另-方面,-熱點本身可包括有侦測區域行 動裝置傳送之裝置,以自動地引導指令發送至該行動裝置 94 1262005 玖、發明說明 單元以尋找該WLAN。 由該WWAN至該WLAN之信號交遞很少需要損失 WWAN通訊。然而,所討論的該信號交遞技術包括有該行 動裝置加入該WLAN及經由該WLAN在切斷該WWAN(該最 5 終軟信號交遞)之前與服務控制器建立通訊的情形,以及 該行動裝置遺失WWAN連接及在一些時後成功地建力與該 WLAN之通訊以及重新建立其電信工作時期的情形。 該等實施例是包括有,在WLAN與WWAN之間的信號 交遞除了該中間媒體之正常通訊協定的建立之外,必需額 10 外的支援該行動裝置單元被信號交遞的活動。此等支援性 活動可以是一 WWAN著冊或一不同的加密程序,因此被該 WWAN接受的該行動裝置可以依據認證及不能由該 WLANs通訊成續所傳送過來的加密來決定。 在無線廣域網路及網際網路之間的信號交遞 15 信號交遞的概念被擴充到一如GPRS通訊裝置單元之 搭配WWAN行動裝置有時後可以經由網際網路或其他有線 網路來存取該WWAN服務控制器及WWAN服務。 該等實施例包括有同時連接WWAN及網際網路及一連 接被完成而另一連接被脫離的例子。 20 對於上述實施例,變化實施可以使用所有先前的信號 交遞方法。 再者,安裝在該行動裝置客戶端或該服務/通訊控制 器之内的邏輯可以在當WWAN及網際網路連接同時可取得 時提供優先順序。在該較佳實施例中,該網際網路連接是 95 1262005 玖、發明說明 較佳的及該WWAN流量在此财是經由朗際網路傳送至 該服務/控制器。 適於在該二網路之間切換的信號交遞技術包括有下列: 1·在電信工作時期位準連續的強力切換網路通訊 5 #該行動裝置單元或該服務控制貞測_服務在一 較高優先順序的網路之内可取得,例如,在上述較佳實例 中的該網際網路,該行動裝置脫離該較低優先順序網路之 通Λ。而後该灯動震置試著加入其他的網路及與該服務控 制為連接。-但通訊被再建立,該服務控制器邏輯辨識其 10有對該行動裝置單元之一或多個請求電信工作時期,及該 工作時期或该等工作時期是自動地被繼續。 2·沒有行動裝置協助之硬網路控制信號交遞 在該實施例中,該行動裝置單元經由該二網路建立通 Λ而不用控制電信工作時期路徑。該服務控制器可以經由 15較低優先順序網路來控制在服務位準上的脫離,藉此強迫 行動裝置I、式及經由该較高優先順序網路來建立服務。該 服務控制器而後提示該行動裝置它的決定,及許多變化實 施可以實施如下。 由網路至另一網路來信號交遞該行動裝置的決定因 20 此只視該服務控制器而定。 a)如果孩行動裝置可以接受來自它的服務/通訊控制器 之網路選擇控制’其可以被命令信號交遞至該被選擇(接 收)網路。其可以額外地被送出通訊參數以加速信號交遞 程序。 96 1262005 玖、發明說明 b)如果該行動裝置不能接受無現網路選擇控制,則簡 單的藉由拒絕服務來脫離該服務網路;而強迫它嘗試及登 錄另一網路。 3.行動裝置協助硬網路控制信號交遞 在此實施中,該區域無線行動裝置搜尋另一服務的可 能性及決定在另一網路之内的通訊條件。其而後送出被該 服務/通訊控制器(SCC)128或140所收集的資訊。 該行動裝置單元搜尋該另一網路在當下列條件之一符 合時: a)该行動裝置單元被程式化來執行正常區間的搜尋。 該搜巡屈間可以被預先程式化或經由來自該8(:(: ι28之命 令來控制。 b) —硬體指不被提供來提示一另一服務可以取得。一 範例可以是lOOBasedT有效的一硬體指示。 15 20 c) 該行動裝置被該SCC 128命令來搜尋另一網路。此 典型地發生在當-外部服務決定由該行動裝置所提供的每 一資訊中的此可取得的可能性。 4仃動裝置單兀由其前一服務網路信號交遞至該被選 擇的網路以下列兩種方式之一: )如果心于動裝置可以接受似控制,則其被命令信 號父遞至該被選擇網路,句枯古 匕括有如果该通訊參數之可能傳 送來加速該信號交遞程序; )果乂仃動裝置不能接受該無線網路選擇控制,其 藉由中斷該服務來脫_服_路。在此财,該行動裝 97 !262〇〇5 玖、發明說明 置試著經由其他的網路連接,直到其接觸到該scc及該電 信工作時期被再建立為止。 4·行動裝置控制硬信號交遞 在行動裝置控制硬信號交遞中,該行動裝置搜尋另一 網路連接在當 (i) 其彳貞測一較高優先順序網路之可取得, (ii) 網路的品質逐漸不能滿足,或 (1 i i)當其接收一命令要信號交遞至上述所定義的另 網路。 10 15 該行動裝置單元執行該搜尋及由其決定信號交遞優先 順序來獲得另-網路取得之測量。在此測量的—範例中, 該行動裝置可以真對-被定義_及測量響應的延遲。 網路及經由該被選 ’該行動裝置在脫 ’以加速信號交遞 該行動裝置而後脫離已經服務它的 擇的另一網路來連接。在一變化實施中 離它現在的服務網路之前遞送出一提示 的程序。 當該行動裝置試著加入它已經選擇作為信號交遞之網 路時,該系統決定該行動裝置已經由其先前服務網路信號 交遞至該新的服務網路,及期望重新開始它可以辨識的既 20存的電信工作時期或多個電信工作時期。 雖然在此信號交遞方法之較佳實施例中沒有網路協助 的需要,一變化實施被包括有以網路協助來執行此信號交 遞。網路協助可由以下任一來提供: ⑴可能可取得網路參數之身份,包括有該簡她之 98 1262005 玖、發明說明 較佳存取通道及支援一較佳分散s c c基本架構的網際網路 存取之代理IP ; (ii)負載條件或不同存取網路或進入點之其他可取得 參數之資訊(例如,存取網際網路的不同電話號碼);及 5 (丨丨丨)5玄服務網路之期網負載條件上的資訊(例如,對於 一些内部網路連接者) 5.網路命令,行動裝置控制硬信號交遞 網路命令行動裝置控制硬信號交遞是在實現在當該 SCC 128及140中的任一發現通訊條件不能接受或具有需要 10對較高優先順序連接之週期性檢查時。網路控制可能會或 可能不會決定具有支援服務能力的可能另一網路。如果此 能力被決定,該SCC 128送出在可取得網路之通訊參數或 網路存取之資訊給該行動裝置單元。 該行動裝置而後搜尋可以支援其服務請求之網路。在 15本方法的較佳實施例中,該行動裝置搜尋另一網路而不會 中斷其現在的連接,因此將信號交遞的影響降到最低。一 範例是要撥許多個網際網路存取號碼來在脫離一無線 GPRS連接之前決定可使用該網際網路。當此是不可行時 ,一選擇提供該行動裝置首先脫離它的服務網路及只在隨 20後搜尋另一網路。在該二實施例中,該行動裝置可使用該 網路所先前提供的資料或進行任意搜尋。 基於此搜尋,該行動裝置決定那一網路要被進行信號 父遞及試著存取此網路。 如果該行動裝置沒有成功存取此被選擇網路,而後其 99 1262005 玫、發明說明 根據其搜尋結果試著存取下—最佳網路,以此類推。此等 開始及接著的存取f試最好η可料或減程式之計時 器來控制。 在存取已經完全成功及與該scc 128及14〇之連接已經 5被建理之後,該Scc確認該新的連接是前一電信工作時期 或先前多個電信工作時期的重新開始,最好是以先前所述 之方法之一,藉此確保該電信工作時期的連續。 6·軟信號交遞 具有硬信號交遞之上述先前五個方法中的四個方法也 1〇可以使用軟信號交遞來實施。如上述,在此使用的該用語 “軟信號交遞,,是指當由一網路存取至另一網路之轉換時, 維持通訊的無縫連續,而不會對在該區域無線行動裝置之 内的電信工作時期活動有影響,包括有依據限時連續通訊 者0 被本實施例所支援的軟信號交遞可以藉由在脫離與現 在服務網路之前經由一新的服務網路來建立與該scc 128 及140之行動通訊。另一方面,軟信號交遞可以藉由切換 網路連接快速到足以在電信工作時期通訊中沒有中斷來達 成。 許多種方法在後面被討論來實現軟信號交遞。 a)行動裝置協助軟體網路控制信號交遞 在第一軟體信號交遞實施例,該區域無線行動裝置搜 哥另一網路及決定通訊條件。而後傳送可使用資訊至咳 SCC 128,140。 100 1262005 玖、發明說明 該SCC接續著作決定那一網路及何時要執行該信號交 遞。其提供信號交遞參數給該行動裝置;及選擇性的提供 信號交遞控制給一代理IP節點或控制在該WWANi内的實 體。在如果有進一步資料建議該連接即將遺失,或由於在 5健王^況下失真的辨識或者支援該通訊之該等實體中的一 個實體即將被被去除的資訊時,該後者可能是需要的,藉 此以確保連續的通訊。因此,為了確保不中斷的通訊,該 行動裝置最好現在建立在該新的服務網路之内的通訊而不 會中斷它現在的網路通訊。一但與新的網路的通訊被建立 10通達該SCC 128及140,該行動裝置脫離已經服務它的網路 在變化實細中,该行動裝置在脫離此網路之前送出一 提示。 b)行動裝置控制軟信號交遞 15 在一第二軟信號交遞實施例中,此時被該行動裝置單 元控制,該行動裝置搜尋額外的通道在當 (1)一較高優先順序網路條件被偵測到; (ii)服務品質漸漸不能滿足;或 ⑽當其接收-指令作信號交遞至一另一網路時。 該行動裝置單元本身執行一搜尋,其執行對預先定義 或程式化優先順序的不同網路的測量及將它們分等為決定 的優先順序以選擇-較佳網路來切換。在—變化例中,該 行動裝置不需要搜尋所有可能替換網路,只需要搜尋在: 個可使㈣網路中最頂端的n個網路。在—特定實施例中 ,㈣。決定要切換的最佳網路之條件可以包括有量測到 101 1262005 玖、發明說明 的通訊特性及網路負載。 该行動單元提示該scc那一個網路已經被選擇來進行 該信號交遞及等待一確認或暫停時間的結束,其中其建立 與新的網路之通訊而沒有與現在服務的網路脫離。在通訊 5被建立之後,該行動裝置脫離已經服務它的網路。在一變 化實施中,該行動裝置在脫離它現在服務網路之前送出一 提示信號。 c)網路命令,行動裝置控制軟信號交遞 一再一實施例包括有被網路命令但緊接著行動裝置控 W制的-軟信號交遞。該信號交遞是在當該似決定該料 網路不能支援該行動裝置服務通訊條件時被加以執行。該 SCC可能會或可能不會辨識具有支援通訊服務給該行動裝 置之能的可能的替換網路。如果此等能力被辨識,則該 SCC而後送出在因此被辨朗路之通訊參數上的資訊至該 15 行動裝置單元。 、 以 一但該行動裝置擁有可能替換網路之存取資料,該程 絲續如先前實施例之行動裝置控制軟信號交遞-樣/ 信號交遞之結論 上述所有的實施祿提供目前在無線區域網路之内可取 20 的功能。 該軟信號交遞解決方案有可能提供較順暢的連續服務 L為所有的解決方暗是基於該行動震置端的分封, 連績服務可以由軟及硬信號交遞實施例來達到。 102 1262005 玖、發明說明 混合網路認證 行動通訊提供一較高層度的個人化。例如,GSM電話 提供一 SIM卡,其提供每一使用者具有與其行動電話服務 供應商之帳號有關的個人化通訊功能。CDMA型的型動裝 5 置有授予類似的個人化功能。根據本發明之實施例,一使 用者被賦予透過任何未加密或加密裝置在他的存款裏設定 一交易,該交易是透過他/她的行動電話被確認或授權。 授權可以如是透過傳送至他的行動電話之一 SMS訊息來要 求他送出一簡單的回覆。另一方面,該使用者可以由他自 10己的行動電話送出一 SMS訊息至一專屬他的號碼。該交易 而後對該行動電話帳戶予以收費。不像是信用卡或其他帳 號,對一行動電話帳戶收取費用的一個優點是該電話帳戶 是為在單一時間收取小額費用所專門設立的。該等實施例 因此提供一種在網際網路上提供低成本產品及服務之方法 15 ,先前使其困難的是因為信用卡公司收取小數目費用。 該實施例也被使用來提供在一非認證及一認證裝置之 間的結合。一但該非認證裝置已經被授權,則密秘認證資 料可以被安裝在其中。此認證資料可以進一步被用來提供 在非認證裝置及該PLMN認證裝置之間的鏈結。此方法可 20以被使用來啟動一虛擬SIM(請參考先前敘述)。 現請參考第27圖所示,其是為顯示根據本發明之一第 一較佳實施例之一認證機構的簡化方塊圖。在第27圖中, 其顯不一通訊器11〇,典型地是為一蜂巢細胞網際網路入 口,包括有一 SMS入口。選擇性地,此網際網路入口除了 103 1262005 玖、發明說明 該SMS入口之外還可以包括有一 WAP入口,或是取代SMS 入口。該通訊器可以透過一認證鏈結114,像是一 GSM或 CDMA及任何延伸型式的鏈結,與一第一個人化裝置! 12 來達成通訊。GSM等鏈結提供不只是認證也包括有加密的 5 功能,此功能最好是具備但非本發明的必要條件。一基本 的實施例只需要該傳輸的認證及非拒絕。一般而言,該通 訊是為一數位通訊,像是SMS或GPRS資料訊息,雖然, 如將在後予以解釋者,聲音也可以被使用。 該通訊最好利用使用者認證,其是GSM或CDMA之一 10特徵。額外的認證可以藉由一鏈結114及該裝置112額外的 支援加密來被提供。除此之外,其提供一關聯器丨16,其 可以執行該第一個人化裝置112之正面身份資料,及可以 串聯該認證與一個別的活動或由一伺服器丨丨8或類似裝置 經由一非認證鏈結120所接收來自一請求裝置122的活動 15的請求。在本文中,一非認證鏈結是經由使用者或請求裝 置不能正面地辨識之一鏈結,及特別地包括有一般的網際 網路鏈結。不能辨識該請求裝置可能是因為沒有很強的認 證機構像是-SIM卡,或因為該鍵結本身是未加密的,而 允許且竊聽及仿照或其他理由。 2〇 第27圖的機構因此允許藉由透過一可認證鏈結來請求 一額外的通訊來解決該未保密的問題。一般而言,行動電 蛞裝置是可被認證的個人化裝置,及藉由透過一行動電話 鍵結來請求-額外行程的通訊,一電信服務供應商可以決 定一請求是真正的。除此之外,該行動電話是與收費帳戶 104 1262005 玖、發明說明 有關,及所提供的服務是允許直接對被辨識的該客戶收費 。如將在後面解釋,該通訊的認證鏈結行程可以在該非認 證行程之前或之後,只要該二行程可以被成功地相關,及 一非詳盡表列的變化程序將在後面被加以描述。除此之外 5 ,許多非認證行程可以與一單一認證行程相關。當然,本 發明並不受限於只用在行動電話及任何透過一保密鏈結使 其不能被仿造來通訊之加密個人化裝置可以被使用。 該關聯器116最好被連接至一認證通訊器123用以指示 該伺服器118 —給定的活動請求被核准。另一方面,該認 10 證通訊器123可以傳送該認證至與該非認證裝置有關的一 外部代理伺服器或閘道器。在進一步的變化實施,該認證 通訊器可以傳送該認證至負責管理理請求目的之活動之任 何裝置或網路節點。在一又一實施例中,該認證通訊器 123可以藉由使用對在一路由器上的路徑表之改變來傳送 15 認證。 除了 GSM及CDMA之外,一非完整表列可以用來提供 加密鏈結之的其它系統包括有IS-136,PDC,EDGE, WCDMA,GPRS,Irdium,及 GlobalSta 等。該用語 CDMA 包含有該IS-95表準及其2.5及3G版本,此為熟知相應於 20 1XRTT及 3XRTT。 現請參考第28圖所示,其是為顯示像是行動電話之一 GSM裝置124。該GSM裝置124包括有一包含有一或多個積 體電路之一 SIM,該等積體電路中的至少一個包括有支援 對該保密鏈結之認證,加密及解密的該個人化資料。該 105 1262005 玫、發明說明 SIM通時辨識該行動電話及使其不會讓其他的裝置來仿造 該電話,因此提供認證及保密存取一相應於該個別行電話 使用者之一收費帳戶。 雖然在上述中,該假設是建立在該訊息傳送本身是為 5 一資料訊息傳送,但本發明並不以此為限。該保密鏈結 114也被加密用於聲音通訊及其可以提供自動聲音訊息建 立功此於ΰ玄通訊器1 1 〇中以由預錄訊息區段中建立訊息。 除此之外,其可以提供一人造聲音。無論是那種方法,一 聲音说息可以透過該保密鏈結被送到該個人化裝置。該聲 10音訊息例如可以辨識該交易及可以請求該使用按下一按鍵 ’藉此完成一肯定的回覆。 在本兔明之一特別的較佳實施例中,相應於一服務之 可月b使用者之一裝置透過該未保密鏈結來請求該服務。該 未保密鏈結可以是任何型式的網路,特別是一開放網路像 15疋该網際網路,或其他數位或類比網路,及可以凹括有一 LAN,一無線LAN(WLAN),特別地是相應於該IEEE 802.11標準之任何WLAN,包括有8〇211,8〇2 Ub, 802.11a...g等等。 在該登錄程序期間,其辨識它的保密鏈結,例如藉由 20給定一相關行動電話號碼。該身份資料可以由該儲存記憶 體中取出或由該使用者手動輸入。該關聯器116接收該身 份資料(例如,行動電話號碼)。其可能需要轉譯該被接收 的身份資料成為適於該通訊器100之不同的身份資料,及 U玄轉厚工作可以糟由該關聯器本身來執行或經由外部轉譯 106 1262005 玖、發明說明 服務來執行,壢如藉由存取一住家位置暫存器(h〇me 1〇cati〇n regiSter:HLR)。該關聯器116而後使用該通訊器 110來以適當的方式與該行動電話接觸連絡。一計時器123 被操作,其定該行動電話的使用者一固定時間來回覆及確 5認該使用者的身份。除此之外或另—方面,一錯誤計數器 124計次未成功建立認證的次數,在當一臨界次數達到時 停止該認證操作。 在-變化實施例中,該操作是同時開始於與該伺服器 18接觸之非認證裝置122,及與該通訊器㈣接觸之該個人 10化裝置112。該關聯器116在該二通訊之間建立一鏈結,及 對該非認證裝置之服務被授權。確保該使用者認證不被竊 取的一種方法是在回覆時提供一密碼給該可以認證的裝置 Π2。該密碼而後被該使用者輸入於該非認證裝置122,因 此澄清該非認證裝置122之使用者是與該認證裝置之使用 15者是相同的及此動作是特意完成的。如果此密碼實施例被 使用,該認證鏈結最號被加密,使得不會曝露該密碼。另 一方面,該密碼只被使用在有限次數,例如只有一此,在 其例中該認證鏈結不需要被加密。 如在後被加以解釋,因為被該非認證裝置使用之登錄 2〇名稱是,也就是說該行動電話號碼,其可能讓 欺騙的使用者來探知不同的MSISDN值。此探聽可能會使 該行動電話接收到服務的請求,及如果該使用者沒有警覺 到%,该使用者可能不經意地授權服務給那些欺騙的使用 者。该問題可以藉由請求該非加密裝置除了該MSISDN之 107 1262005 玖、發明說明 外再使用一密碼來加以降低。另一種解決方案是由該行動 裝置單元來開始該認證序列··該使用者送出一SMS至該通 訊器,其接著以對該電信工作時期之一暫時密碼來響應給 該工作時期。該使用者使用該PDA或其它非認證裝置透過 5 網際網路來連接至該伺服器118,及進入他的使用者名稱 (MSISDN)及該暫時的密碼。另一方面,該通訊器提供一 暫時識別號及密碼,以確保使用者匿明及該使用者進入此 暫時識別號及密語對。 由該認證裝置至該非認證裝置之識別號的傳送可以是 10手動或是經由一些區域有線或無線通訊鏈結。 5亥相關器或$亥通器確認被提供的該存取資料,像是 該暫時密碼或身份資料,在當與該MSISDN相關及服務被 授權時。 較佳地,在此一實施例中,SMS傳輸在該行動終端機 15 (個人數位助理機,膝上型電腦等)被啟動之前被完成。 在對上述者的進一步變化實施中,該SMS可以包括有 一準隨機數,其中該使用者需要複製或被傳送至他的非認 證裝置還完成該認證,藉此降低竊取認證的危險。該被請 求的活動可以是一網際網路瀏覽活動。與一收費帳號相關 20的该保岔鏈結之使用允許小數目的被收費,迄今網際網路 的一問題是傾向於回覆在信用。該被請求活動可以是 該劉覽本身,或其可以包括有與像是講買,使用付費服務 等有關的活自。因Jt,該使用者可以到網路書局或類似者 藉由輸入他的仃動電話號瑪而不是他的信用卡號碼來完成 108 1262005 玖、發明說明 講物。其而後在他的行動電話上收到一訊息及回覆該訊息 來凡成》亥筆又易。邊網際網路活動可以另外是型活動 或不^牵β倒/劉覽之活動,像是連續資料申請,電子郵件 等。 5 10 15 20 實把例中,s亥非認證裝置122可以是一信用卡 或一智慧卡,及該被請求活動可以是銷售活動點,像是使 用-ATM。在此連接中,可以參考第洲,其是為顯示具 有一記憶體單元13〇之—卡片128之簡化圖,像是—智慧卡 或信用卡。該記憶體單元13〇可以是在一智慧卡上的一積 體電路之部份,或其可以是如在傳統信用卡上的一磁條 。較佳地’該記憶體單元13G包括有該標準的交易資訊像 是一 ATM號碼,及除此之外再—組進—步號碼來允許該行 動電居5虎碼的遇證,然而此有一缺點是一錯誤的電話號碼 ^可能被輸人。在另—實施例中,該進—步號碼是該行動電 活遽碼之-編碼版本。該編碼版本是—加密版本,其中一 功能被用來解密該電話號碼。另一方面,-密碼可以被使 用其疋為在一對照表中的一簡單的帳號。後者版本特別 具有保密的效果’因為電腦駭客如果知道在該對照表上的 碼時’其只可以替代一不同的電話號碼。該使用者以一般 的方式插入它的信用卡至該ATM中。該卡片傳送該使用者 的電話號碼’或相對於電話號碼之一密碼,其被使用來產 生1話撥叫至該使用者的行動電話。該使用者藉由回覆 该行動電話或輪人該ATM—組要被用在該通訊中的特別產 生的HN號碼。在該較佳實施例中,該使用同時回覆及輸 109 1262005 玖、發明說明 入該PIN號碼。 該被請求活動可以如存取一網路,也就是說,該使者 請求存取一LAN或存取該網際網路或類似者。其因此使其 可以提供漫遊網際網路,及在當旅行或不在其自己的網際 5網路供應商的相鄰區之内使用區域資源來登錄至該網際網 路的能力。 特別地,存取可能被請求的該網路可以是透過一無線 LAN存取點或紅外線存取點或透過藍芽存取點之一網路。 無線LAN或紅外線或藍芽是要提供對所有在該等存取點鄰 1〇近的所有的裝置具有彈性網路存取,及本實施例允許可能 的使用者要被辨識及對該服務被收費。 在更進一步的實施例中,在該使用者已經傳送該準隨 機數字或該密碼至他自己的非認證裝置之後,該數字或密 浯可以被使用多次來授權一活動。因為該數字或密碼多次 15的傳送被曝露在重播的攻擊,該多次授權可以該準數字/ 後碼作為對一挑戰回應協定之一種子输匙。例如,如果一 虛擬SIM被安裝在該非認證裝置中,而後該虛擬Sim之Ki( 請參考上面對SIM的描述)可以被設定成為該準數字/密碼 (Ki是被始用在SRES之產生,及Kc來自RAND)。 20 另一具有較高保密水準之變化例是要使用上述的準數 子/密碼來認證一保密通道的建立(藉由IpSec,tls,SSL ’ SSH等)。該鑰匙Ki可以在該關聯器與該非認證資料之間 被傳送,及而後可以被使用作為該挑戰響應執行之種子。 如上所討論,該通訊器最號獲得一電話號碼,無論是 110 1262005 玖、發明說明 簡明文字,或是來自該非認證裝置之該電話號碼之編瑪或 加密版本。該號碼最好被使用來建立與該保密行動裝置之 通訊。然而,在那些實施例中,通訊是由該保密行動裝^ 所啟動,該電話號碼最好被使用在連結已經被建立的該保 5 密及非認證連結。 X ” 根據上述,該非認證裝置可以是一信用卡,一智筹卡 ,-紅外線裝置,-藍芽裝置,_PDA,_耐用電腦,一 行動電腦,-固定電腦,及電腦網路或任何可以使用紅外 線或藍芽或無線LAN或H〇meRF或有線或其他型式的通訊 10 來建立一通訊。 現請參考第30圖所示,其是為顯示根據本發明之驗證 裝置之再-實施例之一簡化方塊圖,其元件被更詳細的顯 示。像是-PDA 13〇之-非認證裝置透過一網路存取點無 線通訊至-LAN/WAN 134,其本身可以是有線或是無線的 。亥LAN可以直接(或間接)被連接至一蜂巢細胞網際網路 認證入口 136,及可以是提供該使用者存取該網際網路或 任何期他網路或服務之裝置。該入口 136最好是讓該pDA 130作為可以正常登錄之一標準網際網路認證裝置。該登 錄程序可以是手動執行或在需要時自動執行。該使用者的 2〇行動電話號碼可以被用來作為登錄使用者名稱或作為該登 錄程續的一分離部份。該入口開始執行一計時器在一預定 時間限制後去暫停該認證。選擇地,該入口也可以設定一 。十數器來限制登錄嘗試的次數以降低被駭客入侵的次數。 4入口被直接或間接連接至一短訊息服務中心SMS_c 138 111 1262005 玖、發明說明 ,其是為管理SMS訊息的網路單位。該SMS-C 138透過 MSC 140,BSC 142,及蜂巢細胞基地台144送出一 SMS訊 息至被行動電話146所保護的SIM。該使用者因此接收到一 請求告訴他要按下回覆已啟動它的網路連接。在進一步的 5 強調,該使用者可以被要求提供一密碼。該SMS本身通常 是被加密及該SIM支援認證使其清楚的只有該預期的行動 電話在回覆。該行動電話回覆至該SMS。所有的SMS訊息 具有一原始的位置,被傳送的該SMS訊息可以具有該認證 者的電話號碼,以允許一回覆可以道達該認證者。該使用 10 者而後透過該LAN被認證存取該網際網路或其他資料網路 ,及他使用的LAN而後可以對他的行動電話收費。 現請參考第31圖所示,其是為顯示根據本發明之一實 施例透過一認證通道之一非認證通道的驗證。在第3 1圖中 ,認證該鍵結包括步驟:透過具有一認證裝置之一認證鍵 15 結來通訊,驗證使用該鏈結之認證程序,其中該通訊是與 一預期的行動電話裝置,透過一非認證第二通道或鏈結來 設立一第二鏈結。一階段是接著透過一非認證裝置來結合 或關聯該驗證與一活動請求。一但該二通道或鏈結已經被 結合,而後在該第一鏈結上的認證被使用來允許在另一鏈 20 結上的請求如上述,藉此允許該非認證裝置之活動請求。 結合的步驟可以藉由使用由該認證裝置所提供的一辨識電 話號碼來被加以執行。認證的步驟最好包括有傳送一訊息 至該認證行動裝置,其中一回覆可以如上述解釋被期待。 如上所述,對於本發明而言,該二鏈結中的那一個被 112 1262005 玖、發明說明 先完成或是它們是否同時完成並不重要。每一可能性伴隨 著優點及缺點來提供本發明之一正當的實施例。 在一種情況中,通訊是由非認證裝置開始。該系統送 出一訊息至該相關認證裝置以請求核准。該裝置使用者送 5 口他的核准及该逐證是在此完成或者該系統送出一密碼至 该说證裝置。該使用者接收到該密碼及輸入或複製或傳送 该逸、碼至該非認證裝置,因此完成該認證。 在另一情況中,一通訊請求是由該認證裝置所開始。 該系統送出密碼或暫時的使用者名稱及密碼給該認證裝置 ϋ亥岔碼’或使用者及密碼’被複製或傳送至該非認證裝 置’及該非認證裝置轉達該密碼回到該系統已建立該認證 〇 上述程序只被使用在一剛開始通訊建立,或在一特別 的方也例中只使用在一啟動通訊。此後,一保密通訊通道被 建立在σ亥糸統及非遇έ登裝置之間’其使用額外的辨識碼/ 多數個辨識碼以提供下次存取該系統。在未來的存曲期間 ’該系統加入額外的辨識碼/密碼,及對該認證裝置的選 擇性提示。此一較佳實施例節省了在第一次通訊之後需要 用來與該認證裝置設定認證通道的需要。 20 在該較佳實施例中,該認證方法不需要任何特定的硬 體或軟體安裝在該PDA 130上。該PDA使用一標準劉覽器 及標準網路介面單元來工作。 在另一實施例中,軟體被安裝來支援該被定義的程序 及協助或省去手動使用者動作,像是位址的輸入及在該認 113 1262005 玖、發明說明 證及非認證資料之間的資料傳送。 該電信服務使用者不需要知道任何新的號碼及密碼, 及該行動電話號碼(MSISDN)可以被使用來作為一使用者 名稱。 5 該行動裝置終端機46是一標準的認證單元。該終端機 可以是只有聲音,只有SMS,只有WAP,只有GPRS,只 有3 G,任合其他資料通訊或一組合。 對該被請求服務之認證需要擁有該使用者特定的SIM 或USIM或類似的裝置。 10 該服務不需要提供任何特別提供的資料庫。該使用者 身份是該MSISDN或類似的識別碼(像是IMIS)。沒有新的 密碼需要由使用者提供或記憶。然而,一變化實施例需要 資料庫的提供,例如當使用一 RADIUS伺服器時。一 RADIUS伺服器是使用來認證存取一通訊系統之認證使用 15 者,其中認證是基於該RADIUS或遠端認證撥入使用者伺 服器協定。 一單一網路伺服器122可以被使用來支援許多電信服 務供應商。 要注意的是本發明的某些特徵為了清楚起見是以分別 20 的實施例說明,其也可以組合使用在一單一實施例中。相 反地,本發明的許多特徵為了簡潔起見是以單一時施例說 明,其也可以提供分離或其他合適的次組合。 本發明因此提供一種包括有使用一行動電話保密通道 來保密傳送可能會被使用來授權一些其他服務之一授權碼 114 1262005 玖、發明說明 之認證系統。 實施例之結論 在上述中’其提供一連串的實施例,其中在其之間提 供在該蜂巢細胞或PLMN環境及該無線LAN環鏡之間的一 5 無縫介面。該介面允許蜂巢細胞致能單元可以由一環境移 至另一環境而不需要該使用者注意到它,因此可以利用有 較高資料率及在當可取得時可以利用無線LAN之區域資源 。非蜂巢細胞致能單元被致能連接該無線LAN及透過該 LAN存取該蜂巢細胞環境。 1〇 為了清楚說明起見以個別的實施例說明之本發明特徵 也可以為組合成的單一實施例。相反地,為了簡潔起見, 在單一實施例之說明的本發明不同的特徵也可以為分離或 任何適當的次組合。 熟習该項技術人士應可瞭解,本發明並不受限於以上 15所顯示及描述者。然而,本發明之範圍是藉由後附的申請 專利範圍所定義及包括有上述不同特徵的組合及次組合, 以及熟習該項技術者在讀過前面之描述之後可以作變化及 修飾。 【圖式簡單說明】 20 第1圖是一 SIM之簡化表示, 第2圖是顯示一 SIM之功能操作之一簡化方塊圖, 第3圖是根據本發明之一第一實施例顯示一客戶端裝 置透過一虛擬SIM閘道器連接至一非PLMN網路及由那裏 連接至一 PLMN網路之一簡化概要圖, 115 1262005 玖、發明說明 第4a圖是更詳細地顯示第3圖之實施例之一簡化方塊 圖,包括一模擬SIM閘道器之次系統, 第4b圖是顯示另一解決方法透過一非PLMN網路提供 PLMN服務之一簡化比較圖,該服務是為習知技藝, 5 第4c圖是一示範圖式,顯示一掌上型裝置及一可插入 其中的一卡片,使其適於與藍芽及類似的非PLMM網路使 用, 第5圖是為根據本發明之一實施例之一簡化流程圖, 顯示透過一非PLMN網路連接一非SIM裝置經一虛擬SIM閘 10 道器連接至一 PLMN網路, 第6圖是顯示一典型PLMN網路基礎架構之概要圖, 第7圖是根據本發明之一實施例之一概要圖,其顯示 使用一虛擬基地台控制器作為至該PLMN網路之一介面, 第8圖是根據本發明之一較佳實施例之一概要圖,其 15 顯示在一無線LAN及一 PLMN網路之間的協定層及分封資 料認證, 第9圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一 LAN與一 PLMN網路之間的協定層及交換電路資 料4忍證’ 20 第10圖是根據本發明之一較佳實施例之一概要圖,其 顯示與在GPRS及一無線LAN之間的連接相關的協定層, 第11圖是根據本發明之一較佳實施例之一概要圖,其 顯示與透過PLMN及無線網路之交換電路支援服務的提供 有關之協定層, 116 1262005 玖、發明說明 第12圖是根據本發明之一較佳實施例之一概要圖,其 顯示一虛擬SGSN+被使用作為在一無線LAN及一PLMN之 間的一介面, 第13圖是根據本發明之一較佳實施例之一概要圖,其 5 顯示在一無線LAN及一 PLMN網路之間的協定層及分封資 料認證, 第14圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一 PLMN之間的分封支援服務的提供 之協定層, 10 第15圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一PLMN之間的交換電路支援服務的 提供之協定層, 第16圖是根據本發明之一較佳實施例之一概要圖,其 顯示在一無線LAN與一 PLMN之間的提供分封資料流量管 15 理之協動層, 第17圖是根據本發明之一較佳實施例之一概要圖,其 顯示覆概共同區域及結合連接一熱點中心點之二無線網路 ,其可以被用來協調在網路之間的交接, 第18圖是根據本發明之一較佳實施例之一概要圖,其 20 顯示一無線網路存在於一蜂巢細胞或PLMN網路之覆蓋區 域之内, 第19圖是根據本發明之一較佳實施例之一概要流程圖 ,其顯示在二網路之間作為信號交遞之整個原理, 第20圖是根據本發明之一較佳實施例之一概要流程圖 117 1262005 玖、發明說明 ,其說明由行動裝置單元的觀點之信號交遞, 第21圖疋根據本發明之一較佳實施例之一概要流程圖 ,其顯示信號交遞程序的另一實施例, 第22圖是一簡化概要圖,說明具有一共同中心點之二 5 非重疊WLANs, 第23圖是一簡化概要圖,說明二重疊WLANst的每一 個是一不同熱點的一部份及在該等熱點範圍之外有一共同 中心點, 第24圖是第23圖情節的一變化例,其中該熱點沒有重 10 疊, 第25圖說明二重疊的plmN網路, 第26圖說明二非重疊plmN網路, 第27圖是根據本發明之又一較佳實施例之一簡化方塊 ,其顯示一認證機構, 15 第28圖是顯示使用在第27圖之保密鏈結之一裝置之一 簡化插圖, 第29圖是顯示使用在第27圖之非保密鍵結之一裝置之 一簡化插圖, 第3 0圖是根據本發明之一認證機構之另一實施例之一 20簡化方塊圖’特別地允許控制存取至_有線或無線lan, 及 第圖是第27圖之該認證機夠之操作之—簡化流程圖 ’其中該設定可由任-裝置開始,保密或非保密,包括有 由一不同的裝置來設定。 118 1262005 玖、發明說明 【圖式之主要元件代表符號表】 10…訂購者身份模組(SIM) 12.. . SIM卡載體及讀取器 14…蜂巢細胞電話裝置 16…認證次系統 18…加密次系統 20.. .連接裝置 22.. .非PLMN網路 24…模擬SIM閘道器(SSG) 26…PLMN/蜂巢細胞網路 28.. .資料庫次糸統 30.. .存取次系統 32…交互工作次系統 34.. .PLMN次系統 36··.GPRS存取卡 38.. .藍芽存取卡 40…基地台系統(BSS) 42.. .行動裝置Examples of the ability of the formula, and the old waste i i , a .  The tI should once again have the ability to search for another communication mode, but only by interrupting the current communication mode. 86 1262005 发明, DESCRIPTION OF THE INVENTION The logic used in the presently preferred embodiment operates simply by prioritizing automatic correlation with the WLAN connection. This means that whenever a hotspot connection and a PLMN connection are available, the hotspot connection is more popular. In this embodiment, a mobile device unit is connected to a PLMN when it detects the presence of a 5 WLAN. When the WLAN service has priority, the mobile device unit tries to connect to the WLAN. The method by which the mobile device unit verifies that the WLAN can be used and establishes communication with its service controller via the WLAN is as described above and will not be repeated here. During a signal handover, the mobile device unit is connected to the new network 10 and again establishes communication with the service controller. In another aspect, the service controller establishes communication with the mobile device unit. The open honeycomb cells are maintained during the telecommunications work period as long as needed, and at least until the reconnected mobile device is identified or the timeout has been reached. Maintaining the working period in a cellular data service means that the cellular data protocol is used and the user data is actually transmitted via any access channel used, such as in a WLAN. This ensures that the cellular cell service will not be affected even if a non-cellular cell channel is used for access by the mobile device. If considered, the access channel that is actually used can be a channel that can actually be thought of as a type, especially the area 20 LAN can be used by the user. To further clarify this point, a telecommunications service user of a GPRS network can access its cellular service via one of the gateways discussed above. The service controller in this example can be implemented within the GPRS gateway or as a separate entity. The mobile device uses the WLAN access as long as the WLAN service 87 1262005, the invention stated that the quality is acceptable 'any condition defined within the mobile device client, the service controller or both. When the mobile device detects that the quality of service within the WLAN hotspot is unacceptable, or when its service controller indicates this, its last 5 performs a WWAN access search. If the communication is still available in the WLAN, the mobile device can prompt its service controller for signal handover and its need to search for different access paths, including WWAN access. A different embodiment has the service controller indicating that the mobile device unit should signal to the WWAN. It can be a general instruction or can be a WWAN access that is specifically intended to operate within the area in which the mobile device is located. The signal handover from the wireless area back to the wireless wide area network therefore always or almost always occurs when the mobile device's WLAN connection is severely degraded or almost lost and the mobile device detects that the WWAN can be used (eg, PLMN, GPRS). In general, it means that the mobile device unit simply removes the range of the WLAN. The various signal handoff methods discussed above can be used in general in the current WLAN to WWAN example. Five different embodiments are discussed as follows: Powerful switching with a wireless network that is quasi-continuous in telecommunications. In the first embodiment, when the hotspot controller, the service controller, or the mobile device recognizes that the communication condition is unacceptable, the opposite end abandons communication. The communication that is abandoned by the service controller will be by transmitting a signal to the mobile device or by interrupting the telecommunications period to the point at which the mobile device determines that communication must be switched. The Ms is then simply 88 1262005. The invention relinquishes communication and seeks a WWAN access to be switched, or abandons communication when it no longer knows the service from the WLAN. In either case, if the MS finds a WWAN activity in the area, it will try to log in to it. Once the communication is re-established, the service controller recognizes that one or more of the requesting telecommunications work periods and the identified telecommunications work period (or multiple telecommunications work periods) are automatically rejoined. . Another embodiment of the present invention is directed to an example in which service control logic resides within a WLAN hotspot. In this example, the service controller within the wlan is discovered by contacting the WLAN controller to discover that the mobile device 1 has been served and has no request (freeze) during the telecommunications work period. . 2. Mobile device assists in the transmission of network control signals. In this embodiment, the mobile device is detached from the search and identification of the gradual degradation of the WLAN, which is still connected and despite an unacceptable quality of service. - Acceptable WWAN operations. The mobile device then forwards the details of the identity data generated by the service controller to the service controller, or to another entity that actually controls the logic of the actual communication, and the decision is an essay Each of the defined logical conditions (roaming agreement, load condition, mobile device telecommunications service contract, etc.), the entity 20 then does not cause the mobile device to switch to the WWAN. . The mobile device is handed over to the receiving WWAN by the WLAN of the service in one of two ways: a) If the mobile device can receive wireless network selection control, it is π to the parent to the W WAN. Preferably, if possible and required, the transport package includes the WWAN communication parameters, thereby speeding up the handover procedure. b) if the mobile device is unable to accept wireless network selection control, it simply leaves the WLAN of the service by interrupting the service; at that time, the mobile device unit attempts to log in to the WWAN and access its service control logic 3. Mobile device control hard signal handover In a further example, the mobile device unit searches for WWAN coverage when (1) the quality of the service is gradually unsatisfiable; and 1 ((1) when it receives one from the service controller or similar communication control logic When the order is handed over to another preferred communication service, the mobile device then performs a search on one or more ANs for which it can be priced, and the _ is to be switched. The preferred one is usually granted by its original telecommunications service provider, 15 but the specific logic within the mobile client or the control from the muscle frequency can change this priority. The mobile device then leaves the service. Its de-frequencying, if it has not been cut off. In the variant implementation of this embodiment, the mobile device delivers a prompt before the WLAN is removed - to speed up the (4) handover procedure and to change the system and telecommunications work period After the WLAN is detached from the service, the mobile device unit attempts to join the Wan selected to perform the signal (4). The service controller preferably determines the mobile device unit p gentleman乂 疋 疋 has been signaled to the WWAN by the previously served WLAN, _ the corresponding telecommunications work period and allowed the working period 90 262 〇〇 5 玖, invention description or the work period to re-via the new connection Although there is no need for network assistance in the preferred embodiment of the signal handover method, an additional embodiment is provided to implement network-assisted signal handover. Network assistance can be provided by any of the following: 5 (1) Accept the identity of neighboring WWANs, that is, provide their communication parameters, such as avoiding attempts to log in WWANs whose known operations are within this area but are not acceptable due to other factors; (Π) Information on service conditions Or adjacent |\^ to other available parameters, for example, if their services are known or expected to have a problem 10 in the region; and (111) information that is expected to be available in the service WLAN. Network commands, mobile devices control hard signal handover. Again and again, embodiments are related to a network command signal handover. Following the command, the signal delivery itself is controlled by the mobile device unit. The method 15 is such that when the telecommunications service period control exists in the service controller or its communication control logic, the service amount cannot support the mobile service communication condition. Network control can be used to determine WWANs that may be available within the service area, but this is not necessary. If the user is determined, the network control transmits information about the parameters associated with the candidate to the mobile device unit. The mobile device unit now searches for any WWAN that can support its service request. In a preferred embodiment of the method, the mobile device unit searches for it on time and while trying to maintain communication with the WLAN. The user who provides the defect has a predetermined level of service, so the letter 91 1262005 发明, the invention description "delivery service impact is minimized. When this is not feasible, the change implementation allows the device to be disconnected from the machine. And only searching for the secret service. In two embodiments, the mobile device can use the information previously provided by the service controller network or perform an arbitrary search. Based on the search, the mobile device determines whether there is a location. The execution signal is handed over to the WWAN, and if so, it attempts to access the WWAN. If the mobile device cannot successfully access the first WWAN attempted, then it will try to access the search result in it. The next best 10 WWAN, and so on. After the access is successfully completed, the service controller _ recognizes this as the pre-telecom work period or the previous most telecommunications work period A new start is made to ensure the continuation of the telecommunications work period. 5. Soft Signal Handover 15 Three of the above four embodiments relating to hard signal handover can also be implemented to provide soft signal handover. It is explained that the term soft signal handover as used herein refers to maintaining seamless continuity of communication when converted from WLAN to |^^^ without affecting the period of telecommunications work within the wireless mobile device in the area. Activities, packages or those with continuous communication of 20 in the time limit. The difference is that they are not frozen during the telecommunications work period, and therefore there will be no degradation in the service. The soft signal delivery supported by the present invention can be deviated by Establishing communication with the mobile device unit of the WWAN before the service WLAN, or by joining the WWAN quickly, when the WLAN is detached from the WLAN, the communication is not interrupted during the telecom operation. In order to support the latter condition, the service is supported. The controller may first provide information to the mobile device. The previously provided data may be temporarily stored to maintain service during signal handover. The mobile device logic may also switch. Up to one of the less-required degraded modes to extend the time supported by the buffer to 5 is a continuous service that the user of the mobile device unit can receive. A variation of the soft signal handover embodiment takes this into account. The mobile device unit can join the WWAN and effectively perform the signal handover before leaving the WLAN. The soft signal handover can be controlled by the network control or the mobile device. 10 a) The network control soft signal is handed over to the network. In a control embodiment, the mobile device unit searches for each of its own logic, or from each of the service/communication control WWAN channels, to measure and determine their communication usability. The usability data is then used. Transferred to the service controller or similar communication control logic, where 15 may be centralized or decentralized as described above. The service controller or similar communication control logic can now select the new service WWAN based on the information provided by the mobile device unit and the operational status of the WWANs. The latter can be implemented by the wWANs providing this status information to the service controller or communication logic to support the mobile device. The service controller can provide the new service WWAN parameters to the mobile device or signal handover control/indication to the selected WWAN. To ensure uninterrupted communication, the mobile device unit preferably establishes communication within the WWAN prior to switching off its WLAN connection. b) mobile device control soft signal handover 93 1262005 发明, invention description In the mobile device control implementation, the mobile device unit searches for the active WWANs channel when (1) has indicated that the quality of the service is not satisfied; or 00 its reception An instruction is sent to signal to a WWAN. The latter 5 may occur when the service controller accepts the previous notification indication that the WLAN service is to be detached. It is best to implement a search for all available wireless networks that can now be collected and decide which network is the best to switch. The conditions for deciding which one is the best WWAN to switch to may include an overnight traffic characteristic and network load if the broadcast from the service controller is available or available to the service controller. The mobile device unit then prompts the service controller/communication logic that WWAN has been selected for the signal to be handed over and waits for an acknowledgment or a pause (the minimum pause may be zero), where it is established on the singer ^1^ The 15th communication will not be interrupted with the WLAN. After the communication has been established, the mobile device leaves the WLAN that has served it. In a variant embodiment, the mobile device delivers a prompt before leaving the WLAN. The signal handover reverse procedure from the WWAN to the WLAN is similar. However, as described above, in this example, signal handover does not need to be initiated because the quality of service from the 20 WAN has decreased. They are described as follows: The mobile device needs to periodically check its logic for the wWlan* definition. This is because the WLAN coverage of this part is within the scope of the service. Alternatively, the hotspot itself may include means for detecting the transmission of the regional mobile device to automatically direct the command to the mobile device 94 1262005, the invention description unit to find the WLAN. Signal handoff from the WWAN to the WLAN rarely requires loss of WWAN communication. However, the signal handover technique in question includes the case where the mobile device joins the WLAN and establishes communication with the service controller before the WWAN is disconnected via the WLAN (the most final soft signal handover), and the action The device lost the WWAN connection and, after some time, successfully established communication with the WLAN and re-established its telecommunications work period. The embodiments include the transfer of signals between the WLAN and the WWAN in addition to the establishment of a normal communication protocol for the intermediate medium, the activity of supporting the mobile device unit being signaled. Such supporting activities may be a WWAN registration or a different encryption procedure, so the mobile device accepted by the WWAN may be determined based on authentication and encryption that cannot be transmitted by the WLANs. Signal Handover between Wireless WAN and Internet 15 The concept of signal handoff is extended to the same as the GPRS communication unit. The WWAN mobile device can sometimes be accessed via the Internet or other wired networks. The WWAN service controller and WWAN service. These embodiments include examples of simultaneous connections to the WWAN and the Internet and the completion of one connection and the disconnection of the other. 20 For the above embodiments, the change implementation may use all previous signal handoff methods. Furthermore, the logic installed within the mobile device client or the service/communication controller can provide prioritization when both the WWAN and the internet connection are available. In the preferred embodiment, the Internet connection is 95 1262005. The invention is preferred and the WWAN traffic is transmitted to the service/controller via the Internet. The signal handover technology suitable for switching between the two networks includes the following: 1. A powerful switching network communication with a continuous level during the telecommunications work period 5 # The mobile device unit or the service control speculation _ service in one Obtained within the higher priority network, for example, in the internet in the preferred embodiment described above, the mobile device is disconnected from the lower priority network. The light is then set to try to join other networks and connect to the service. - but the communication is re-established, the service controller logic recognizes that there is one or more requests for the telecommunication work period for the mobile device unit, and that the work period or the work period is automatically continued. 2. Hard Network Control Signal Handover Without Mobile Device Assistance In this embodiment, the mobile device unit establishes communication via the two networks without controlling the telecommunications work period path. The service controller can control the detachment at the service level via the 15 lower priority network, thereby forcing the mobile device I, and establishing the service via the higher priority network. The service controller then prompts the mobile device for its decision, and many of the changes can be implemented as follows. The decision to hand over the mobile device from the network to another network depends on the service controller. a) If the child mobile device can accept network selection control from its service/communication controller, it can be handed over to the selected (received) network. It can additionally be sent out communication parameters to speed up the signal handover procedure. 96 1262005 发明, invention description b) If the mobile device cannot accept the non-current network selection control, simply deny the service to leave the service network; forcing it to try and log in to another network. 3. Mobile device assists hard network control signal handover In this implementation, the wireless mobile device in the area searches for the possibility of another service and determines the communication conditions within the other network. It then sends the information collected by the Service/Communication Controller (SCC) 128 or 140. The mobile device unit searches for the other network when one of the following conditions is met: a) The mobile device unit is programmed to perform a normal interval search. The search trajectory can be pre-programmed or via a control from the 8 (: (: ι 28 command. b) - the hardware finger is not provided to indicate that another service can be obtained. An example can be valid for lOOBasedT A hardware indication 15 20 c) The mobile device is commanded by the SCC 128 to search for another network. This typically occurs when the external service determines this achievable likelihood in each of the information provided by the mobile device. 4 The device is handed over to the selected network by its previous service network signal in one of two ways:) If the heart device can accept control, it is handed over by the command signal to the parent The selected network includes a possible transmission of the communication parameter to speed up the signal delivery procedure; the fruiting device cannot accept the wireless network selection control, which interrupts the service by _ service _ road. In this case, the action installed 97!262〇〇5 玖, invention instructions tried to connect via other networks until it touched the scc and the telecommunications work period was re-established. 4. The mobile device controls the hard signal handover. In the mobile device control hard signal handover, the mobile device searches for another network connection when (i) it detects a higher priority network, (ii) The quality of the network is gradually unsatisfied, or (1 ii) when it receives a command to signal to the other network defined above. 10 15 The mobile device unit performs the search and determines the signal handover priority order to obtain another network-acquired measurement. In the example of this measurement, the mobile device can be true-defined and delay in measuring the response. The network is connected via the selected &apos;the mobile device is off&apos; to accelerate the signal to hand over the mobile device and then to the other network that has served its choice. A prompt is sent before a current service network in a variant implementation. When the mobile device attempts to join a network that it has chosen to be handed over, the system determines that the mobile device has been handed over to its new service network by its previous service network signal, and expects to restart it to be identifiable The period of 20 years of telecommunications work or multiple periods of telecommunications work. Although there is no need for network assistance in the preferred embodiment of the signal handoff method, a change implementation is included with network assistance to perform this signal handoff. Network assistance can be provided by any of the following: (1) It is possible to obtain the identity of the network parameters, including the simple 98 1262005 发明, the invention describes the preferred access channel and supports the Internet with a better dispersed scc basic architecture. Access proxy IP; (ii) load conditions or other accessibility information for different access networks or entry points (eg, access to different Internet numbers of the Internet); and 5 (丨丨丨) 5 Information on the network load conditions of the service network (for example, for some internal network connections). The network command, the mobile device controls the hard signal handover network, and the mobile device controls the hard signal handover to be implemented when any of the SCCs 128 and 140 are found to be unacceptable or have 10 pairs of higher priority connections. During periodic inspections. Network control may or may not determine the possible other network with support capabilities. If this capability is determined, the SCC 128 sends information about the communication parameters or network access of the network to the mobile device unit. The mobile device then searches for a network that can support its service request. In a preferred embodiment of the method, the mobile device searches for another network without interrupting its current connection, thereby minimizing the impact of signal handover. An example would be to dial a number of Internet access numbers to decide to use the Internet before leaving a wireless GPRS connection. When this is not feasible, one chooses to provide the mobile device first off its service network and only after searching for another network. In the second embodiment, the mobile device can use the data previously provided by the network or perform an arbitrary search. Based on this search, the mobile device determines which network is to be signaled and tried to access the network. If the mobile device does not successfully access the selected network, then its 13620052005, invention instructions try to access the best network based on its search results, and so on. These start and subsequent access f tests are preferably controlled by a timer that can be de- or reduced. After the access has been completely successful and the connection to the scc 128 and 14 has been established, the Scc confirms that the new connection is a re-start of the previous telecommunications work period or previous multiple telecommunications work periods, preferably In one of the previously described methods, thereby ensuring continuity of the telecommunications work period. 6. Soft Signal Handover Four of the above five previous methods with hard signal handoff can also be implemented using soft signal handoff. As mentioned above, the term "soft signal handover" as used herein refers to maintaining seamless continuity of communication when switching from one network to another without wireless action in the area. The telecommunications work period activity within the device has an impact, including the presence of a time-limited continuous communicator 0. The soft signal delivery supported by this embodiment can be established via a new service network before leaving the current service network. The mobile communication with the scc 128 and 140. On the other hand, the soft signal handover can be achieved by switching the network connection quickly enough to have no interruption in the communication during the telecommunications operation period. Many methods are discussed later to implement the soft signal. Hand over. a) Mobile device assists software network control signal handover in the first software signal delivery embodiment, the wireless mobile device in the area searches for another network and determines the communication conditions. Then the information can be transmitted to the cough SCC 128 140. 100 1262005 玖, invention description The SCC continuation of the work determines which network and when to perform the signal handover. It provides signal delivery parameters to the mobile device; Optionally providing signal handoff control to a proxy IP node or controlling an entity within the WWANi. If further information suggests that the connection is about to be lost, or because of the identification of the distortion or support for the communication When one of the entities is about to be removed, the latter may be needed to ensure continuous communication. Therefore, in order to ensure uninterrupted communication, the mobile device is preferably now built on the new one. Communication within the service network without interrupting its current network communication. Once the communication with the new network is established 10 access to the SCC 128 and 140, the mobile device is disconnected from the network that has served it. In detail, the mobile device sends a prompt before leaving the network. b) mobile device control soft signal handover 15 In a second soft signal handover embodiment, the mobile device unit is now controlled by the mobile device unit. Search for additional channels when (1) a higher priority network condition is detected; (ii) the quality of service is gradually unsatisfiable; or (10) when it receives the command to signal to another When the network is in use, the mobile device unit itself performs a search that performs measurements on different networks of predefined or programmed priorities and prioritizes them to determine the preferred order to switch between the preferred and preferred networks. - In the variant, the mobile device does not need to search for all possible replacement networks, but only needs to search for: n the top n networks in the network. In a particular embodiment, (4). The optimal network conditions may include measuring the communication characteristics of the 101 1262005, the invention description, and the network load. The mobile unit indicates that the scc network has been selected for the signal to be handed over and waiting for an acknowledgment or The end of the pause time, in which it establishes communication with the new network without disconnecting from the currently served network. After the communication 5 is established, the mobile device is disconnected from the network that has served it. In a variant implementation, the mobile device sends a alert signal before it leaves the service network. c) Network commands, mobile device control soft signal handover. Again and again, embodiments include soft-signal handovers that are commanded by the network but followed by the mobile device. The signal handover is performed when it is determined that the network is unable to support the mobile device service communication condition. The SCC may or may not recognize a possible replacement network with the ability to support the communication service to the mobile device. If such capabilities are identified, the SCC then sends the information on the communication parameters thus identified to the mobile device unit. Once the mobile device has the access data that may replace the network, the process continues to control the soft signal handover-like/signal handover as in the previous embodiment. All of the above implementations are currently provided in the wireless 20 functions are available within the local area network. The soft signal delivery solution has the potential to provide smoother continuous service. L. For all solutions, the darkness is based on the split of the action, and the succession service can be achieved by soft and hard signal delivery embodiments. 102 1262005 玖, Invention Description Hybrid Network Certification Mobile Communications provides a higher level of personalization. For example, a GSM phone provides a SIM card that provides each user with a personalized communication function associated with their mobile phone service provider's account number. The CDMA type of mobile device 5 is provided with a similar personalization function. In accordance with an embodiment of the present invention, a user is given a transaction set in his deposit through any unencrypted or encrypted device that is confirmed or authorized through his/her mobile phone. The authorization can be sent to a simple reply by sending an SMS message to one of his mobile phones. On the other hand, the user can send an SMS message from his mobile phone to his exclusive number. The transaction is then charged for the mobile phone account. Unlike a credit card or other account, one advantage of charging a mobile phone account is that the phone account is specifically set up to charge a small fee at a single time. These embodiments thus provide a way to provide low cost products and services over the Internet 15 which has previously been difficult because credit card companies charge a small fee. This embodiment is also used to provide a combination between a non-authentication and an authentication device. Once the non-authenticated device has been authorized, the secret authentication information can be installed therein. This authentication material can be further used to provide a link between the non-authenticated device and the PLMN-certified device. This method can be used to initiate a virtual SIM (please refer to the previous description). Referring now to Figure 27, there is shown a simplified block diagram of a certification mechanism in accordance with one of the first preferred embodiments of the present invention. In Fig. 27, it is shown that the communicator 11 is typically a cellular internet portal, including an SMS portal. Optionally, the Internet portal may include a WAP entry in addition to the SMS entry, or may replace the SMS portal. The communicator can pass through an authentication chain 114, such as a GSM or CDMA and any extended type of link, with a first personalization device! 12 to reach a communication. Chains such as GSM provide not only authentication but also encryption 5 functions, which are preferably necessary but not required by the present invention. A basic embodiment requires only authentication and non-rejection of the transmission. In general, the communication is for digital communication, such as SMS or GPRS data messages, although, as will be explained later, the sound can be used. The communication preferably utilizes user authentication, which is a feature of GSM or CDMA. Additional authentication can be provided by a link 114 and additional support encryption for the device 112. In addition, it provides a correlator 16 that can perform the positive identity data of the first personalization device 112, and can serially connect the authentication with a different activity or via a server 丨丨 8 or similar device via The non-authentication link 120 receives a request from an activity 15 of a requesting device 122. In this context, a non-authenticated link is a front-end link that cannot be positively identified by the user or requesting device, and in particular includes a general Internet link. The inability to recognize the requesting device may be because there is no strong authentication authority like a SIM card, or because the key itself is unencrypted, allowing and eavesdropping and copying or other reasons. 2〇 The organization of Figure 27 thus allows for the resolution of this unclassified issue by requesting an additional communication through an identifiable link. In general, a mobile device is a personalised device that can be authenticated, and by requesting an extra-trip communication via a mobile phone bond, a telecommunications service provider can determine that a request is genuine. In addition, the mobile phone is related to the charging account 104 1262005 发明, the invention description, and the service provided is to allow direct charging of the identified customer. As will be explained later, the authentication link journey of the communication may be before or after the non-authentication trip as long as the two trips can be successfully correlated, and a non-exhaustive list of changes will be described later. In addition to this, many non-certified itineraries can be associated with a single certification itinerary. Of course, the invention is not limited to use with a mobile phone and any cryptographic personalization device that communicates through a secure link so that it cannot be copied. The correlator 116 is preferably coupled to an authentication communicator 123 for instructing the server 118 that a given activity request is approved. Alternatively, the authentication communicator 123 can transmit the authentication to an external proxy server or gateway associated with the non-authenticating device. In a further variation implementation, the authentication communicator can transmit the authentication to any device or network node responsible for managing the activity of the request. In still another embodiment, the authentication communicator 123 can transmit 15 authentication by using a change to a routing table on a router. In addition to GSM and CDMA, other systems that may be used to provide cryptographic links include IS-136, PDC, EDGE, WCDMA, GPRS, Irdium, and GlobalSta. The term CDMA includes the IS-95 standard and its 2. 5 and 3G versions, which are well known for 20 1XRTT and 3XRTT. Referring now to Figure 28, it is shown to display one of the GSM devices 124 like a mobile phone. The GSM device 124 includes a SIM comprising one or more integrated circuits, at least one of which includes the personalized data that supports authentication, encryption and decryption of the secure link. The printer recognizes the mobile phone and does not allow other devices to copy the phone, thus providing authentication and secure access to a charging account corresponding to one of the individual mobile phone users. Although in the above, the assumption is based on the fact that the message transmission itself is a data message transmission, the invention is not limited thereto. The secure link 114 is also encrypted for voice communication and can provide automatic voice message creation in the UI 1 1 以 to create a message from the pre-recorded message section. In addition to this, it can provide an artificial sound. Regardless of the method, a voice can be sent to the personalization device through the secret link. The voice message may, for example, identify the transaction and may request the use of a button to perform a positive response. In a particularly preferred embodiment of the present invention, a device corresponding to a service month b user requests the service through the unsecured link. The unsecured link can be any type of network, especially an open network like the Internet, or other digital or analog network, and can include a LAN, a wireless LAN (WLAN), The ground corresponds to the IEEE 802. Any WLAN of 11 standards, including 8 〇 211, 8 〇 2 Ub, 802. 11a. . . g and so on. During the login process, it identifies its secret link, for example by giving an associated mobile phone number by 20. The identity data can be retrieved from the storage memory or manually entered by the user. The correlator 116 receives the identity information (e.g., a mobile phone number). It may be necessary to translate the received identity data into different identity profiles suitable for the communicator 100, and the U-turning thick work may be performed by the correlator itself or via an external translation 106 1262005 发明, invention description service Execution, for example, by accessing a home location register (h〇me 1〇cati〇n regiSter:HLR). The correlator 116 then uses the communicator 110 to contact the mobile phone in an appropriate manner. A timer 123 is operated to allow the user of the mobile phone to repeat and confirm the identity of the user for a fixed period of time. In addition to or in addition, an error counter 124 counts the number of times the authentication is not successfully established, and the authentication operation is stopped when a critical number of times is reached. In a variant embodiment, the operation begins simultaneously with the non-authenticating device 122 in contact with the server 18 and the personalizing device 112 in contact with the communicator (four). The correlator 116 establishes a link between the two communications and the service to the non-authenticated device is authorized. One way to ensure that the user authentication is not stolen is to provide a password to the Authenticated Device 回2 upon reply. The password is then entered by the user into the non-authentication device 122, thereby clarifying that the user of the non-authentication device 122 is the same as the user of the authentication device and that the action is purposely completed. If this password embodiment is used, the authentication link is most encrypted so that the password is not exposed. On the other hand, the password is only used for a limited number of times, for example only one, in which case the authentication link does not need to be encrypted. As explained later, because the login name used by the non-authentication device is, that is, the mobile phone number, it may allow the spoofed user to detect different MSISDN values. This snooping may cause the mobile phone to receive a request for service, and if the user is not alert to %, the user may inadvertently authorize the service to the deceived user. This problem can be reduced by requesting the non-encrypted device to use a password in addition to the MSISDN. Another solution is to start the authentication sequence by the mobile device unit. The user sends an SMS to the communicator, which in turn responds to the working period with a temporary password for one of the telecommunications operating periods. The user uses the PDA or other non-authenticated device to connect to the server 118 via the 5 Internet, and enters his User Name (MSISDN) and the temporary password. On the other hand, the communicator provides a temporary identification number and password to ensure that the user is blind and the user enters the temporary identification number and the whispering pair. The transmission of the identification number from the authentication device to the non-authentication device may be 10 manual or via some regional wired or wireless communication link. The 5th correlator or the hex device confirms the provided access data, such as the temporary password or identity information, when associated with the MSISDN and the service is authorized. Preferably, in this embodiment, the SMS transmission is completed before the mobile terminal 15 (personal digital assistant, laptop, etc.) is activated. In a further variation on the above, the SMS may include a quasi-random number in which the user needs to copy or transmit to his non-authenticated device to complete the authentication, thereby reducing the risk of stolen authentication. The requested activity can be an internet browsing activity. The use of this security link associated with a billing account number 20 allows a small number of charges to be charged, and one problem with the Internet so far is the tendency to reply to credit. The requested activity may be the view itself, or it may include activities related to, for example, buying, using a paid service, and the like. Because of Jt, the user can go to the online bookstore or the like by entering his mobile phone number instead of his credit card number to complete the 108 1262005 发明, invention instructions. He then received a message on his mobile phone and replied to the message. Internet activities can be another type of activity or an activity that does not involve the end of the data, such as continuous data application, email, etc. 5 10 15 20 In the example, the non-authentication device 122 can be a credit card or a smart card, and the requested activity can be a sales activity point, such as using -ATM. In this connection, reference can be made to the continent, which is a simplified diagram of the card 128 having a memory unit 13 such as a smart card or a credit card. The memory unit 13A can be part of an integrated circuit on a smart card, or it can be a magnetic strip as on a conventional credit card. Preferably, the memory unit 13G includes the standard transaction information such as an ATM number, and in addition to the group-step number to allow the action to be charged with 5 tiger code, however, there is The downside is that a wrong phone number ^ may be lost. In another embodiment, the progressive number is the encoded version of the mobile activity weight. The encoded version is an encrypted version, one of which is used to decrypt the phone number. On the other hand, the -password can be used as a simple account number in a look-up table. The latter version is particularly confidential [because computer hackers can only replace a different phone number if they know the code on the checklist]. The user inserts his credit card into the ATM in the usual manner. The card transmits the user&apos;s phone number&apos; or a password relative to one of the phone numbers, which is used to generate a call to the user&apos;s mobile phone. The user responds to the mobile phone or the person by whom the ATM-group is to be used for the specially generated HN number in the communication. In the preferred embodiment, the use of the same reply and input 126, 2005, 发明 description of the PIN number. The requested activity can be as access to a network, that is, the messenger requests access to a LAN or access to the Internet or the like. It thus makes it possible to provide a roaming internet and the ability to use regional resources to log into the Internet when traveling or not in the vicinity of its own Internet 5 network provider. In particular, the network to which the access may be requested may be through a wireless LAN access point or an infrared access point or through one of the Bluetooth access points. Wireless LAN or Infrared or Bluetooth is required to provide resilient network access to all devices that are close to each other at the access point, and this embodiment allows potential users to be identified and the service to be toll. In still further embodiments, after the user has transmitted the quasi-random number or the password to his own non-authenticated device, the number or password can be used multiple times to authorize an activity. Since the transmission of the number or password multiple 15 is exposed to the replay attack, the multiple authorization can use the quasi-number/post code as a seed key to a challenge response agreement. For example, if a virtual SIM is installed in the non-authentication device, then the Ki of the virtual Sim (please refer to the description of the SIM above) can be set to the quasi-number/password (Ki is used in the generation of SRES, And Kc comes from RAND). Another variation with a higher level of confidentiality is the use of the above-mentioned quasi-number/password to authenticate the establishment of a secure channel (by IpSec, tls, SSL 'SSH, etc.). The key Ki can be transmitted between the correlator and the non-authenticated material, and can then be used as a seed for the challenge response execution. As discussed above, the communicator most obtains a telephone number, whether it is 110 1262005, a concise text of the invention, or a sequographed or encrypted version of the telephone number from the non-certified device. This number is preferably used to establish communication with the secure mobile device. However, in those embodiments, the communication is initiated by the secure action device, and the phone number is preferably used to link the secured and non-authenticated links that have been established. X ” According to the above, the non-authentication device can be a credit card, a smart card, an infrared device, a Bluetooth device, a PDA, a durable computer, a mobile computer, a fixed computer, and a computer network or any infrared ray. Or Bluetooth or wireless LAN or H〇meRF or wired or other type of communication 10 to establish a communication. Referring now to Figure 30, it is shown to simplify one of the embodiments of the verification device according to the present invention. The block diagram, whose components are displayed in more detail, such as - PDA 13 - non-authenticated device wirelessly communicates to -LAN/WAN 134 through a network access point, which itself can be wired or wireless. It may be directly (or indirectly) connected to a cellular cell internet authentication portal 136, and may be a device that provides the user with access to the internet or any other network or service. The portal 136 preferably The pDA 130 acts as a standard Internet authentication device that can be normally logged in. The login procedure can be performed manually or automatically when needed. The user's 2 mobile phone number can be used for The login user name or a separate part of the login process. The entry begins to execute a timer to suspend the authentication after a predetermined time limit. Alternatively, the entry can also be set to 1. The timer can be used to restrict login. The number of attempts to reduce the number of hacking attacks. 4 The portal is directly or indirectly connected to a short message service center SMS_c 138 111 1262005 玖, invention description, which is the network unit for managing SMS messages. The SMS-C 138 An SMS message is sent through MSC 140, BSC 142, and cellular base station 144 to the SIM protected by mobile phone 146. The user therefore receives a request telling him to press to reply to the network connection that has initiated it. Further 5 emphasizes that the user can be required to provide a password. The SMS itself is usually encrypted and the SIM supports authentication to make it clear that only the intended mobile phone is replying. The mobile phone replies to the SMS. The SMS message has an original location, and the transmitted SMS message can have the authenticator's phone number to allow a reply to pass the authenticator. The user who uses 10 is then authenticated to access the Internet or other data network through the LAN, and the LAN he uses can then charge his mobile phone. Please refer to Figure 31 for the display. An embodiment of the present invention passes the verification of one of the authentication channels, which is a non-authentication channel. In FIG. 3, the authentication of the key includes the step of communicating by using an authentication key 15 having an authentication device to verify the use of the chain. An authentication procedure in which the communication is associated with an intended mobile telephone device through a non-authenticated second channel or link to establish a second link. A phase is followed by a non-authentication device to associate or correlate the verification With an activity request. Once the two channels or links have been joined, then the authentication on the first link is used to allow the request on the other chain 20 as described above, thereby allowing the non-authentication device to request an activity. The step of combining can be performed by using an identification phone number provided by the authentication device. Preferably, the step of authenticating includes transmitting a message to the authentication mobile device, wherein a reply can be expected as explained above. As described above, for the present invention, it is not important that the one of the two links is completed by 112 1262005, the invention is completed first, or whether they are completed at the same time. Each possibility is accompanied by advantages and disadvantages to provide a proper embodiment of the present invention. In one case, the communication is initiated by a non-authenticated device. The system sends a message to the associated authentication device to request approval. The user of the device sends 5 copies of his approval and the certificate is completed here or the system sends a password to the claim device. The user receives the password and enters or copies or transmits the escape code to the non-authentication device, thus completing the authentication. In another case, a communication request is initiated by the authentication device. The system sends a password or a temporary username and password to the authentication device, or the user and password are copied or transmitted to the non-authenticated device, and the non-authenticated device forwards the password back to the system. Authentication 〇 The above program is only used at the beginning of a communication setup, or in a special case, only used in a startup communication. Thereafter, a secure communication channel is established between the σ 糸 及 及 及 ’ ’ ’ ’ ’ 其 其 其 其 其 其 其 其 其 其 其 其 其 其 其 ’ 其 ’ ’ ’ ’ ’ ’ ’ ’ During the future deposits, the system adds an additional ID/password and a selective prompt for the authentication device. This preferred embodiment saves the need to set an authentication channel with the authentication device after the first communication. In the preferred embodiment, the authentication method does not require any particular hardware or software to be mounted on the PDA 130. The PDA works with a standard viewer and standard network interface unit. In another embodiment, the software is installed to support the defined program and assist or omit manual user actions, such as address entry and between the identification, invention identification, and non-certification data. Data transfer. The telecommunications service user does not need to know any new numbers and passwords, and the mobile telephone number (MSISDN) can be used as a username. 5 The mobile device terminal 46 is a standard authentication unit. The terminal can be only voice, only SMS, only WAP, only GPRS, only 3 G, any other data communication or a combination. Authentication of the requested service requires possession of the user-specific SIM or USIM or similar device. 10 The service does not need to provide any specially provided databases. The user identity is the MSISDN or similar identification code (like IMIS). No new passwords need to be provided or memorized by the user. However, a variant embodiment requires the provision of a database, such as when using a RADIUS server. A RADIUS server is used to authenticate access to a communication system for authentication, wherein authentication is based on the RADIUS or remote authentication dial-in user server protocol. A single web server 122 can be used to support many telecommunications service providers. It is to be noted that some of the features of the present invention are described in the context of the respective embodiments for the sake of clarity, which may also be used in combination in a single embodiment. Conversely, many of the features of the present invention are described in a single time embodiment for the sake of brevity, which may also provide separation or other suitable sub-combinations. The present invention thus provides an authentication system that includes an authorization code that uses a mobile phone secure channel to securely transmit an authorization code that may be used to authorize some other service. Conclusions of the Examples In the above, it provides a series of embodiments in which a seamless interface between the honeycomb cell or PLMN environment and the wireless LAN ring mirror is provided therebetween. This interface allows the cellular cell enabling unit to be moved from one environment to another without the user having to notice it, thus utilizing regional resources that have a higher data rate and can utilize wireless LAN when available. A non-cellular cell-enabled unit is enabled to connect to the wireless LAN and access the cellular environment through the LAN. 1A The features of the present invention, which are illustrated in the various embodiments, for clarity of illustration, may also be a single embodiment. Conversely, various features of the invention, which are illustrated in a single embodiment, may also be separated or any suitable sub-combination. It will be appreciated by those skilled in the art that the present invention is not limited by the above shown and described. However, the scope of the present invention is defined by the scope of the appended claims and the combinations and sub-combinations of the various features described above, and those skilled in the art can make changes and modifications after reading the foregoing description. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a simplified representation of a SIM, FIG. 2 is a simplified block diagram showing the functional operation of a SIM, and FIG. 3 is a view showing a client according to a first embodiment of the present invention. A simplified schematic diagram of a device connected to a non-PLMN network via a virtual SIM gateway and connected to a PLMN network there, 115 1262005 发明, Invention Description Figure 4a is an embodiment showing Figure 3 in more detail One simplified block diagram, including a secondary system of analog SIM gateways, and Figure 4b is a simplified comparison diagram showing another solution for providing PLMN services over a non-PLMN network, the service being a prior art, 5 Figure 4c is an exemplary diagram showing a palm-type device and a card insertable therein for use with Bluetooth and similar non-PLMM networks, Figure 5 is for implementation in accordance with one embodiment of the present invention One example is a simplified flow chart showing that a non-SIM device is connected to a PLMN network via a virtual SIM gate 10 through a non-PLMN network. Figure 6 is a schematic diagram showing a typical PLMN network infrastructure. Figure 7 is a diagram in accordance with the present invention. A schematic diagram of an embodiment showing the use of a virtual base station controller as an interface to the PLMN network, and FIG. 8 is a schematic diagram of a preferred embodiment of the present invention, 15 of which is shown in a wireless Protocol layer and packetized data authentication between a LAN and a PLMN network, FIG. 9 is a schematic diagram showing a protocol layer between a LAN and a PLMN network, in accordance with a preferred embodiment of the present invention Switching Circuit Data 4 Tolerance ' 20 FIG. 10 is a schematic diagram showing a protocol layer associated with a connection between GPRS and a wireless LAN in accordance with a preferred embodiment of the present invention, and FIG. 11 is based on SUMMARY OF THE PREFERRED EMBODIMENT A schematic diagram showing a protocol layer relating to the provision of switching circuit support services through a PLMN and a wireless network, 116 1262005, and FIG. 12 is a preferred embodiment of the present invention. A schematic diagram of an embodiment showing a virtual SGSN+ being used as an interface between a wireless LAN and a PLMN, and FIG. 13 is a schematic diagram of a preferred embodiment of the present invention, a wireless LAN and a P Protocol layer and packetized data authentication between LMN networks, Figure 14 is a schematic diagram showing a provision of a packet support service between a wireless LAN and a PLMN, in accordance with a preferred embodiment of the present invention 10, FIG. 15 is a schematic diagram showing a protocol for providing a switching circuit support service between a wireless LAN and a PLMN according to a preferred embodiment of the present invention, and FIG. 16 is a view of the present invention. A schematic diagram of a preferred embodiment showing a cooperating layer providing a packetized data flow between a wireless LAN and a PLMN, and FIG. 17 is a view of one of the preferred embodiments of the present invention A schematic diagram showing a common area and a wireless network coupled to a hotspot center point, which can be used to coordinate the handover between networks, FIG. 18 is a preferred embodiment of the present invention A schematic diagram showing 20 that a wireless network exists within a coverage area of a cellular or PLMN network, and FIG. 19 is a flow chart showing an overview of a preferred embodiment of the present invention. Signal between the roads The entire principle, FIG. 20 is a schematic flow chart 117 1262005 according to a preferred embodiment of the present invention, a description of the invention, illustrating the signal transfer from the viewpoint of the mobile device unit, and FIG. 21, according to the present invention. A flow chart of a preferred embodiment showing another embodiment of a signal handover procedure, and FIG. 22 is a simplified schematic diagram showing two non-overlapping WLANs having a common center point, and FIG. 23 is a Simplifying the schematic diagram, illustrating that each of the two overlapping WLANst is a part of a different hot spot and has a common center point outside the hotspot range, and FIG. 24 is a variation of the plot of FIG. 23, wherein the hot spot is not heavy 10 stacks, Figure 25 illustrates two overlapping plmN networks, Figure 26 illustrates two non-overlapping plmN networks, and Figure 27 is a simplified block in accordance with yet another preferred embodiment of the present invention showing a certification authority, 15 Figure 28 is a simplified illustration showing one of the devices used in the secure link of Figure 27, and Figure 29 is a simplified illustration showing one of the devices used in the non-secure bond of Figure 27, Figure 30 According to this issue A simplified block diagram of one of the other embodiments of one of the certification bodies 20 specifically allows control access to the _wired or wireless lan, and the figure is the operation of the authentication machine of FIG. 27 - a simplified flowchart This setting can be initiated by any device, either confidential or non-confidential, including by a different device. 118 1262005 玖, Invention Description [The main components of the diagram represent the symbol table] 10... Subscriber Identity Module (SIM) 12. .  .  SIM card carrier and reader 14... Honeycomb cell phone device 16... Authentication subsystem 18... Encryption subsystem 20. .  . Connecting device 22. .  . Non-PLMN Network 24... Analog SIM Gateway (SSG) 26...PLMN/Honey Cell Network 28. .  . Database sub-system 30. .  . Access secondary system 32...interactive secondary system 34. .  . PLMN subsystem 36··. GPRS access card 38. .  . Bluetooth Access Card 40...Base Station System (BSS) 42. .  . Mobile device

44.. .MSC 46…服務GPRS支援節點 (SGSN) 48··.非PLMN網路 50.. .虛擬基地台控制器 (VBSC) 52.. .遠端/行動裝置 54.. .存取點 56.. .51.伺服器 60…無線LAN網路 62.. .虛擬基地台控制器 (VBSC) 64.. .Gb 介面 66…服務GPRS支援節點 (SGSN) 69.. .Gs 介面 70…協定 72.. . GPRS網路伺服器 74 ...Gn 介面 78.. .AuC/HLR 80…連接管理器 82.. .區域伺服器 84.. .VSGSN+ 90.. .PLMN伺服器 100.. .熱點中心點 110.. .區域無線網路 112…廣域網路(WAN) 114·.·存取點(AP) 116.. .WAN 中心 119 1262005 玖、發明說明 123...認證通訊器 140...MSC 128…服務/通訊控制器 142 …BSC (SCC) 144...基地台 130...個人數位助理器 146...行動電話 (PDA) 120,132...PLMN1 138…行動裝置 122,132...PLMN2 138...短訊息服務中心 134,136...存取點 (SMS-C) SU1〜SU6...電信服務使用者 140…服務/通訊控制器 口口 一 早兀 (SCC) WN1,WN2...區域無線網路 12044.. .MSC 46...Serving GPRS Support Node (SGSN) 48·. Non-PLMN Network 50.. Virtual Base Station Controller (VBSC) 52.. Remote/Mobile Device 54.. Access Point 56.. .51.Server 60...Wireless LAN Network 62.. Virtual Base Station Controller (VBSC) 64..Gb Interface 66...Serving GPRS Support Node (SGSN) 69.. .Gs Interface 70...Agreement 72.. . GPRS Network Server 74 ... Gn Interface 78.. .AuC/HLR 80...Connection Manager 82.. Area Server 84.. .VSGSN+ 90.. .PLMN Server 100.. . Hotspot Center Point 110.. Area Wireless Network 112... Wide Area Network (WAN) 114.. Access Point (AP) 116.. .WAN Center 119 1262005 玖, Invention Description 123... Authentication Communicator 140.. .MSC 128...Service/Communication Controller 142 ...BSC (SCC) 144...Base Station 130...Personal Digital Assistant 146...Mobile Phone (PDA) 120,132...PLMN1 138...Mobile Device 122,132.. .PLMN2 138... short message service center 134, 136... access point (SMS-C) SU1~SU6... telecommunication service user 140... service/communication controller port early morning (SCC) WN1, WN2...regional wireless network 120

Claims (1)

'.一. .... ................................................................ 1262005 — 拾、申請專利範圍 第91134023號申請案申請專利範圍修正本 94.07.21 L 一種用以介接於PLMN網路與非PLMN網路之間的介 面裝置, 上述PLMN網路被架構來確認蜂巢細胞基地台作 為中繼連接至該蜂巢細胞行動裝置之節點, 上述非PLMN網路的每一個包括有中繼連接至網 路相容行動裝置之多數個存取點, 上述網路相容行動裝置不需要是蜂巢細胞行動裝 置, ’ 上述介面裝置被架構來作為上述PLMN之一節點 ,上述節點能夠執行代表伍述此訄1^網路之終端裝置 鐘認,藉以使得上述此_網路作為它的—基地台, 上述介面裝置包含鑑認上述網路相容行動裝置中 之至少-個來作為該非PLMN網路之_終端的功能, ^之❹㈣擬上述網路相容行動裝置對上述此娜 網路之鐘認,及 20'.One. .... .......................................... ...................... 1262005 — Pickup, Patent Application No. 91034023 Application for Patent Scope Amendment 94.07.21 L One for Interfacing to PLMN An interface device between the network and the non-PLMN network, the PLMN network is configured to confirm that the cellular cell base station is connected as a relay to the node of the cellular mobile device, and each of the non-PLMN networks includes a relay Connected to a plurality of access points of the network compatible mobile device, the network compatible mobile device does not need to be a cellular mobile device, and the interface device is configured as one of the PLMN nodes, and the node can execute the representative The terminal device of the network is configured to make the network as its base station, and the interface device includes at least one of the network compatible mobile devices as the non-PLMN network. The function of the terminal _ terminal, ^ ❹ (4) to the above network compatible mobile device to recognize the above-mentioned network of the Na network, and 20 月匕约使非蜂巢細胞行動裝置連接至J 述非PLMN網路及用來存取上述網路之功能,藉此女 同蜂巢細胞行動裝置存取至上述缝_路—樣。 如申請專利範圍第1項所述之介面裝置,包括有用來 通話的-交換電路介面及用㈣請及控制使用之一 分封介面。 如申請專利範圍第 弟1項所述之介面裝置,其中上述 PLMN網路是為具有— A”面或一 Gb介面之一 GSM網 12} &amp;62005The sputum cell allows the non-cellular cell mobile device to be connected to the non-PLMN network and to access the network, whereby the female cellular cell mobile device accesses the slit-like path. The interface device as described in claim 1 includes a switching interface for calling and a (four) application and control interface. The interface device of claim 1, wherein the PLMN network is one of having a -A" plane or a Gb interface. GSM network 12} &amp; 62005 拾、审範圍 路’及上述交換電路介面可以操作使用上述A介面及 上述分封介面可以操作使用上述Gb介面。 4如申請專利範圍第1項所述之介面裝置,其中上述 PLMN網路是具有—IuCS介面及一 Iups介面之一 UMTS網路’及其中上述交換電路介面可以操作使用 上述IuCS介面及上述分封介面可以操作使用上述Iups 介面。The above-mentioned Gb interface can be operated by using the A interface and the above-mentioned sub-sealing interface. 4. The interface device according to claim 1, wherein the PLMN network is a UMTS network having an IuCS interface and an Iups interface, and the switching circuit interface of the above is operable to use the IuCS interface and the above-mentioned blocking interface. You can use the above Iups interface. 5·如申請專利範圍第1項所述之介面裝置,包括與上述 非PLMN網路之保密層相關之一模擬蜂巢細胞辨識閘 道為及可操作來決定一連接裝置已經被上述非pLMN 網路所認證,及可操作響應一 PLmn網路認證佇列來 指示上述認證已經成功。 6.如申請專利範圍第5項所述之介面裝置,其中上述模 擬蜂巢細胞辨識閘道器是一模擬SIM閘道器及上述 PLMN網路是一 gsm網路。5. The interface device of claim 1, comprising an analog honeycomb cell identification gateway associated with the privacy layer of the non-PLMN network, and operable to determine that a connection device has been used by the non-pLMN network The authenticated, and operationally responsive, PLLM network authentication queue indicates that the above authentication has been successful. 6. The interface device of claim 5, wherein the analog cellular cell identification gateway is an analog SIM gateway and the PLMN network is a gsm network. 7·如申請專利範圍第6項所述之介面裝置,其中上述模 擬蜂巢細胞辨識是一模擬ESN閘道器及上述PLMN網 路是為一 CDMA網路。 8.如申請專利範圍第5項所述之介面裝置,其中上述非 PLMN保密層是包括有SSL,Ipsec,TLS,SRP,及 S S Η之一群組中的一個,及其中上述群組之一的認證 需要允許上述模擬SIM閘道器來提供上述認證響應至 上述PLMN網路。 9· 如申請專利範圍第8項所述之介面裝置,其中上述保 )22 K620057. The interface device of claim 6, wherein the analog honeycomb cell identification is an analog ESN gateway and the PLMN network is a CDMA network. 8. The interface device of claim 5, wherein the non-PLMN security layer is one of a group including SSL, IPsec, TLS, SRP, and SS, and one of the groups The authentication needs to allow the above analog SIM gateway to provide the above authentication response to the above PLMN network. 9· The interface device according to item 8 of the patent application, wherein the above protection 22 K62005 密層可被架構設定一所需要的保密水準。 1〇·如申請專利範圍第!項所述之介面裝置,其更包括有 一傳聲器’其用來接收來自上述非PLMN網路之部份 傳聲信號用以傳聲使用,及接收來自上述PLMN網路 5 之被傳聲的聲音信號用以部份解碼。 11.如申請專利範圍第i項所述之介面裝置,其更包括有 一傳耸器,其用來接收來自上述非PLMN網路之部份 傳聲信號用以傳聲使用,及接收來自上述PLmn網路 之被傳聲的聲音信號用以部份解碼。 痛| ίο I2·如申請專利範圍第1項所述之介面裝置,其被架構使 得上述PLMN網路同時作為用於分封資料之一服務 GPRS支援郎點(SGSN)及作為交換電路資料之一基地 台。 _ 13.如申請專利範圍第12項所述之介面裝置,其更包括有 15 認證連接至上述非PLMN網路之一裝置的功能。 14·如申請專利範圍第13項所述之介面裝置,其更包括有 0 著冊連接至上述非PLMN網路之一裝置的功能。 15.如申請專利範圍第12項所述之介面裝置,其更包括有 更新連接至上述非PLMN網路之一裝置之位置的功能。 20 16·如申請專利範圍第12項所述之介面裝置,其更包括有 支援允§午連接上至上述非PLMN網路之一敦置產生服 務請求之功能。 17.如申請專利範圍第]項所述之介面裝置,其更包括有 提供具有為上述PLMN網路規格化的連接控制資料之 123 ¢262005 ~ ~拾t申請專利範圍 上述PLMN網路可以整合相應活動至一完整帳單之功 能。 18.如中請專利範圍第12項所述之介面裝置,其被架構來 與上述非PLMN網路之一連接管理單元一起操作,藉 5 此獲仔來自連接使用者及被交換資料的品質之非 PLMN網路細節。 19·如申請專利範圍第18項所述之介面裝置,其更包括有 規礼化所彳隻得的上述細節成為一 相容規格之功 能。 1〇 2〇·—種使用在無線LAN的存取+,包括有與其相關的一 蜂巢細胞辨識模組,用以提供PLMN保密功能,藉此 允許透過上述無線LAN存取一 PLMN網路。 21·如巾請專利範圍㈣額述之存取卡,其中上述蜂巢 細胞辨識模組是安裝在上述存取卡上。 15 22.如巾請專利範圍第2()項所述之存取卡,其中上述蜂巢 細胞辨識模組是可以反向地安裝在上述存取卡。 23. 如中請專利範圍第2Q項所述之存取卡,其中上述蜂巢 細胞辨識模組是一 SIM。 24. 如中請專利範圍第23項所述之存取卡,其同時包括有 20 一 SIM載體及一 SIM讀取器。 25. 如中請專利制第2_所述之存取卡,其中上述蜂巢 細胞辨識模組是一垂直蜂巢細胞辨識模組。 26. 如申請專利範圍第25項所述之存取卡,其中上述垂直 蜂巢細胞辨識模組是包括有s〗M功能之—垂直模組。 124The dense layer can be architected to set a required level of confidentiality. 1〇·If you apply for a patent range! The interface device further includes a microphone for receiving a part of the voice signal from the non-PLMN network for voice transmission, and receiving the sound signal from the PLMN network 5 Used for partial decoding. 11. The interface device of claim i, further comprising a relay for receiving a portion of the voice signal from the non-PLMN network for voice transmission, and receiving from the PLmn The voice signal of the network is used for partial decoding. Pain | ίο I2· The interface device described in claim 1 is structured such that the above PLMN network serves as a base for the GPRS support point (SGSN) and one of the switching circuit materials. station. 13. The interface device of claim 12, further comprising a function of authenticating a device connected to one of the non-PLMN networks. 14. The interface device of claim 13, further comprising a function of connecting to one of said non-PLMN networks. 15. The interface device of claim 12, further comprising the function of updating a location of the device connected to one of the non-PLMN networks. The interface device of claim 12, further comprising the function of supporting the connection to the non-PLMN network to generate a service request. 17. The interface device of claim 7, further comprising providing a connection control data standardized for the PLMN network. 2005262005~~Ticking the patent application scope, the PLMN network can be integrated Activities to a full billing function. 18. The interface device of claim 12, wherein the interface device is configured to operate with a connection management unit of one of the non-PLMN networks, whereby the quality of the connected user and the exchanged data is obtained. Non-PLMN network details. 19. The interface device of claim 18, which further includes the above-mentioned details obtained by the ceremonial ritual to become a compatible specification. The access + used in the wireless LAN includes a cellular cell identification module associated therewith for providing a PLMN security function, thereby allowing access to a PLMN network through the wireless LAN. 21. The access card according to the patent scope (4), wherein the honeycomb cell identification module is mounted on the access card. The access card of claim 2, wherein the honeycomb cell identification module is reversibly mountable to the access card. 23. The access card of claim 2, wherein the honeycomb cell identification module is a SIM. 24. The access card of claim 23, which includes both a SIM carrier and a SIM reader. 25. The access card of claim 2, wherein the honeycomb cell identification module is a vertical honeycomb cell identification module. 26. The access card of claim 25, wherein the vertical honeycomb cell identification module comprises a vertical module comprising an s M function. 124 1262005 拾 27. 28. 5 29. 如申請專利範圍第20項所述之存取卡,包括有與一 LAN閘道器交換認證信號之功能,藉此達到網路認證。 如申請專利範圍第27項所述之存取卡,其中上述認證 信號被規格化可以在上述閘道器及上述PLMN網路之 間傳遞,藉此來獲得PLMN認證。 一種經由使用非PLMN裝置之非PLMN網路來存取 PLMN網路的方法,包括有: 提供上述非PLMN裝置具有匹配於上述非PLMN 網路之一存取卡, 提供上述存取卡具有一蜂巢細胞辨識模組,及 提供上述非PLMN網路具有閘道器功能,以保留 蜂巢細胞辨識信號於上述非PLMN裝置與上述PLMN 網路之間。 一種經由使用非PLMN裝置之非PLMN網路來存取 PLMN網路的方法,包括有: 提供上述非PLMN網路具有用來認證上述非 PLMN裝置之一保密認證單元,及 提供上述非PLMN網路具有與上述保密認證單元 相關之閘道器功能,以操作上述認證單元及保留響影 於上述非PLMN網路之認證的蜂巢細胞辨識信號給上 述PLMN網路。 一種在一 PLMN網路與一非PLMN網路之間操作一保 密閘道器來使非PLMN裝置可以認證使用在PLMN連 接之方法,該方法包括有:1262005 Pickup 27. 28. 5 29. The access card as described in claim 20 includes the function of exchanging authentication signals with a LAN gateway to thereby achieve network authentication. The access card of claim 27, wherein the authentication signal is normalized to be passed between the gateway and the PLMN network, thereby obtaining PLMN authentication. A method for accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing the non-PLMN device with an access card matching one of the non-PLMN networks, providing the access card to have a hive The cell identification module and the non-PLMN network providing the gateway function to preserve the cellular cell identification signal between the non-PLMN device and the PLMN network. A method for accessing a PLMN network via a non-PLMN network using a non-PLMN device, comprising: providing the non-PLMN network with a secure authentication unit for authenticating one of the non-PLMN devices, and providing the non-PLMN network There is a gateway function associated with the above-described secure authentication unit to operate the authentication unit and to maintain a cellular identification signal that is authenticated to the non-PLMN network to the PLMN network. A method of operating a secure gateway between a PLMN network and a non-PLMN network to enable a non-PLMN device to authenticate the use of the PLMN connection, the method comprising: 10 30. 1510 30. 15 20 125 31. 1262005 ........... .·----· ··:'· &gt;- .... t »· - /. ·· 拾 5 32. 正學•.詞 、&gt;审画專利範圍 藉由一第一認證協定來認證上述非PLMN網路, 及 透過一蜂巢細胞認證協定來與上述PLMN網路交 換信號,其包括有透過上述第一協定來指示緊接著認 證來作裝置認證。 一種在一 PLMN網路與一非PLMN網路之間操作一保 密閘道器來使非PLMN裝置可以認證使用在PLMN連 接之方法,該方法包括有: 透過一蜂巢細胞認證協定來與上述PLMN網路交 換信號,藉此認證上述非PLMN網路來連接至上述裝 置。 一種管理行動裝置單元之信號交遞(handoff)之信號交 遞管理器,其使用在一第一行動裝置網路存取點及一 第二行動裝置網路存取點之間的一可辨識電信工作時 期來通訊,其中上述第一存取點屬於一第一網路,及 上述第二存取點屬於一第二網路,上述管理器可以共 同地存取每一網路及包括有: 一行動裝置單元匹配器,用以執行在具有未與一 網路切斷之行動裝置單元及具有連接其他網路之間的 匹配;及 一電信工作時期維持器,與上述行動裝置單元匹 配器搭配用來傳送在該等因此配對之行動裝置單元之 間的工作時期,藉此在該等網路之間進行信號交遞。 如申請專利範圍第33項所述之信號交遞管理器,包括20 125 31. 1262005 ........... ..----· ··:'· &gt;- .... t »· - /. ·· Pick 5 32. Orthodox • The word, &gt; the scope of the patent for reviewing the non-PLMN network by a first authentication protocol, and exchanging signals with the PLMN network via a cellular authentication protocol, including indicating by the first agreement The certification is followed by device authentication. A method of operating a secure gateway between a PLMN network and a non-PLMN network to enable a non-PLMN device to authenticate the use of the PLMN connection, the method comprising: communicating with the PLMN network via a cellular authentication protocol The road exchanges signals, thereby authenticating the non-PLMN network to connect to the above device. A signal handoff manager for managing a handoff of a mobile device unit, using an identifiable telecommunication between a first mobile device network access point and a second mobile device network access point The working period is to communicate, wherein the first access point belongs to a first network, and the second access point belongs to a second network, and the manager can access each network in common and includes: a mobile device unit matcher for performing a match between a mobile device unit having no network disconnection and a connection to another network; and a telecommunications work period maintainer for use with the mobile device unit matcher A period of operation between the thus paired mobile device units is transmitted to thereby perform signal handoffs between the networks. The signal handover manager as described in claim 33, including 10 33. 1510 33. 15 20 126 34. Ϊ262005 拾、申諝蓴利範圍 有在一單一區域之一單元。 35·如申請專利範圍第%項所述之信號交遞管理器,包括 有位在多數個内部網路及交互網路上的分散功能。 36·如申請專利範圍第%項所述之信號交遞管理器,其中 5 上述網路中的一個網路是為一 PLMN網路。 37.如申請專利範圍第33項所述之信號交遞管理器,其中 上述網路中的一個網路是一無線LAN網路。 38·如申請專利範圍第36項所述之信號交遞管理器,其中 上述、罔路中的一個網路是一無線LAN網路。 10 39· &amp;申請專利範圍第%項所述之信號交遞管理器,更包 括有一電信工作時期主動管理單元,在當連接品質臨 界標準不能達到時,由一現在被使用網路來決定,用 以指示上述行動裝置單元搜尋周圍的網路及決定它白勺 , 連接參數,以由上述參數中辨識出一最加網路及指示 15 上述行動裝置單元連接上述最佳網路。 4〇·如申清專利範圍第39項所述之信號交遞管理器,其中 上述電信工作時期主動管理單元與上述行動裝置單&amp; # -己叩起使用,藉此使用上述指示來協助上述的匹 酉己C 20 41.〜申請專利範圍第39項所述之信號交遞管理器,其中 上述電信工作時期主動管理單元可操作決定上述被相 不的匹配是否已經成功’及在沒有成功連接時,其可 操作指示上述行動裝置單元連接至下一最佳網路。 42.如申請專利範圍第39項所述之信號交遞管理器,其中 127 12620(35 &quot; '^申諝專利範圍 ^述電信工作時期主動管理單元可操作繼續指示上述 订動裝置單元來連接至下一最佳單元直到一成功的連 接被指示為止。 $ 43.⑹申請專利範圍第33項所述之信號交遞管理器,更包 2有一電信工作時期被動管理單元,用以在當連接品 貝^界值不能符合時,由上述行動裝置單元來決定, 、a 丁上述行動裝置單元搜尋附近網路及決定它的連 ^數以由上述芩數辨識一最佳網路及指示上述行 動裝置單元連接至上述網路。 # 1〇 44·如中請專利範圍第33項所述之信號交遞管理器,更可 曰示上述行動裝置單元來由一第一網路切斷及接 著連接至一最佳網路。 45.如申請專利範圍第33項所述之信號交遞管理器,更可 . 才曰示上術行動裝置單元連接至一最佳網路及接著 15 由現在的網路切斷。 士申叫專利範圍第33項所述之信號交遞管理器,其可 插作降低在-現在網路上的連接品質,藉此強迫上㉛ φ 订動裝置單元由其切斷並找尋另一網路。 47·如申請專利範圍第33項所述之信號交遞管理器,其緊 2〇 接選擇一最佳網路用來再連接,以降低在現在網路上 的連接品質’及傳送一指示至上述行動單元以連接至 上述被選擇的最佳網路。 48·如申請專利範圍第33項所述之信號交遞管理器,其更 操作提供給多數個可能可使用網路之上述行動裝置單 128 1262005 拾、申請專利範圍 几辨識碼。 级如申請專利範圍第33項所述之信號交遞管理器,立更 操作提供-個可能使用網路之上述行動裝置單元辯識 碼。20 126 34. Ϊ262005 Pick and claim 范围 range has one unit in a single area. 35. The signal handover manager as described in item 5% of the patent application includes distributed functions on a plurality of internal networks and interactive networks. 36. The signal handover manager according to claim 100, wherein one of the above networks is a PLMN network. 37. The signal handover manager of claim 33, wherein one of the networks is a wireless LAN network. 38. The signal handover manager of claim 36, wherein one of the above-mentioned networks is a wireless LAN network. 10 39· &amp; The signal handover manager described in item 100 of the patent application scope includes an active management unit during the telecommunications work period, which is determined by a network that is currently used when the connection quality threshold cannot be reached. The mobile device unit is instructed to search the surrounding network and determine the connection parameters to identify a maximum network and the indication 15 from the above parameters. The mobile device unit is connected to the optimal network. 4. The signal handover manager according to claim 39, wherein the active management unit of the telecommunications work period and the mobile device are used by the mobile device, thereby using the above indication to assist the above The signal handover manager described in claim 39, wherein the active management unit of the telecommunications work period is operable to determine whether the above-mentioned matching is successful 'and successfully connected It is operable to instruct the mobile device unit to connect to the next best network. 42. The signal handover manager according to claim 39, wherein the 127 12620 (35 &quot; '^申谞 patent scope describes the telecommunication working period active management unit operable to continue to indicate the above-mentioned binding device unit to connect To the next best unit until a successful connection is indicated. $43. (6) The signal handover manager described in claim 33, and the package 2 has a passive management unit during the telecommunications period for connecting When the product value cannot be met, it is determined by the mobile device unit, and the mobile device unit searches for the nearby network and determines its connection number to identify an optimal network from the above parameters and indicate the above action. The device unit is connected to the above network. #1〇44· The signal handover manager described in claim 33 of the patent scope, further indicates that the mobile device unit is disconnected and then connected by a first network. To the best network. 45. The signal handover manager described in claim 33 of the patent application is more capable of connecting the upper mobile device unit to an optimal network and then 15 from the current The road is cut off. The signal transfer manager described in Section 33 of the patent scope can be inserted to reduce the quality of the connection on the current network, thereby forcing the 31 φ locator unit to be cut off and Looking for another network. 47. If you apply for the signal handover manager described in item 33 of the patent application, you can choose the best network for reconnection to reduce the connection quality on the current network. And transmitting an indication to the mobile unit to connect to the selected optimal network. 48. The signal handover manager as described in claim 33, the operation being provided to a plurality of possible network possible The above-mentioned mobile device single 128 1262005 picks up and applies for a patent identification range. The level is as described in claim 33, and the signal processing manager provides a mobile device unit that may use the network. code. 5〇·如申請專利範圍第33項所述之信號交遞管理器,其中 上述參數包括有下列群組中之任—·一相對pLMN網路 之較佳存取通道’可以支援較佳分散SSC基本架構之 網際網路存取之代理„&gt;之身份碼,上述可能可使用網 1 $之負載條件。上述可能可取得網路之-般性可取的 1〇 #數’網際纟轉存取之網路存取號碼,及在上述可能 可取得網路之期望負載條件上的資訊。 51.如申請專利範圍第33項所述之信號交遞管理器,其中 ^述第一行動裝置網路及上述第二行動裝置網路分別 疋一單一熱點(Hotspot)的無線[ANs。 15 52. &gt;申請專利範圍第51項所述之信號交遞管理器,其中 上述第一及第二網路是重疊網路及信號交遞之一行動5. The signal handover manager according to claim 33, wherein the above parameters include any of the following groups: a preferred access channel to the pLMN network can support better distributed SSC The basic architecture of the Internet access agent „&gt;'s identity code, the above may use the load condition of the network 1 $. The above may obtain the network's general-purpose 1 〇 #数' Internet transit access The network access number and the information on the expected load conditions of the network may be obtained. 51. The signal handover manager according to claim 33, wherein the first mobile device network is described And the second mobile device network is respectively a wireless hotspot (Hotspot) wireless signal [ANs. 15 52. &gt; Patent Application No. 51, the signal handover manager, wherein the first and second networks Is an action of overlapping networks and signal delivery I置單元位在上述網路之間重疊的一點上。 53·如中請專利範圍第33項所述之信號交遞管理器,其中 上述第及上述第二網路分別使用相同的網路協定。 2〇 54·如申請專利範圍第33項所述之信號交遞管理器,其中 上述第一及上述第二網路分別使用不同網路協定。 士申明專利範圍第5丨項所述之信號交遞管理器,其中 上述第一及第二網路是非重疊的。 56.如申請專利範圍第33項所述之信號交遞管理器,其中 129 Ϊ262005 拾 57. 5 58. 59. 60. 10 61. 62. 15 63. 20 64. 65. '申I靑專利範圍 上述第一網路及上述第二網路分別是不同的熱點。 申月專利範圍苐5 6項所述之信號交遞管理器,其中 上述不同的熱點具有一區域的重疊及其中信號交遞之 行動衣置單元位在上述重疊區域。 申明專利範圍第3 3項所述之信號交遞管理器,其中 上述該等熱點使用一單一通訊協定。 如申請專利範圍第33項所述之信號交遞管理器,其中 上这ϋ亥專熱點分別使用不同的通訊協定。 如申請專利範圍第33項所述之信號交遞管理器,其中 鲁 上述第一網路及上述第二網路分別是PLMN網路。 如申請專利範圍第60項所述之信號交遞管理器,其中 上述第一 PLMN及上述第二PLMN網路使用一單_通 訊協定。 如申请專利範圍第6〇項所述之信號交遞管理器,其中 上述第一PLMN及上述第二PLMN網路分別使用不同 _ 的通訊協定。 如申請專利範圍第6〇項所述之信號交遞管理器,其中 鲁 上述第一及上述第二通訊網路具有重疊區域及其中信 號交遞之一行動裝置單元是位在上述重疊區域中。 如申請專利範圍第33項所述之信號交遞管理器,其中 上述第一網路是一無線區域網路及上述第二網路是一 PLMN網路。 如申請專利範圍第33項所述之信號交遞管理器,其中 上述無線區域網路位在於上述PLMN網路覆蓋區域之 130 Ί262〇ϋ^ 1 . . - »&gt;·«· ··&lt; ·&gt;· .·η·. ,ν .'.'*:·'· ν .··. ...»*··* , J-V—«- 、 丰口、申5靑專利範圍 内。 66.如申請專利範圍第33項所述之信號交遞管理器’包括 有用來設定無線區域網路作為較上述PLMN具有較高 優先順序之-優先順序單元,使—行動裝置單元在位 在它的範圍之内時,自動地信號交遞至上述無線區域 網路。 6入-種行動裝置單元之信號交遞方法,該行動裝置單元 在-通訊工作時期中通訊,上述信號交遞是在一第一 及-第二無線網路之間個別的存取點之間,該方法包 提供共用於上述網路二者之位置上的m 在上述控制點決定行動装置單元之身份,其中誰 的連接已職中斷及獲得它的相對電紅作時期之資 料; ' 15I set the unit bits at a point that overlaps between the above networks. 53. The signal handover manager of claim 33, wherein the first and second networks respectively use the same network protocol. The signal handover manager of claim 33, wherein the first and second networks respectively use different network protocols. The signal delivery manager of claim 5, wherein the first and second networks are non-overlapping. 56. The signal handover manager as described in claim 33, wherein 129 Ϊ 262005 picks up 57. 5 58. 59. 60. 10 61. 62. 15 63. 20 64. 65. '申I靑 patent scope The first network and the second network are different hotspots respectively. The signal handover manager described in the scope of the patent application, wherein the different hotspots have an overlap of a region and a mobile device unit in which the signal is handed over is located in the overlap region. The signal delivery manager of claim 3, wherein the hotspots use a single communication protocol. For example, the signal handover manager described in claim 33, wherein the hotspots of the Haihai use different communication protocols. The signal handover manager according to claim 33, wherein the first network and the second network are respectively PLMN networks. The signal handover manager of claim 60, wherein the first PLMN and the second PLMN network use a single-communication protocol. The signal handover manager of claim 6, wherein the first PLMN and the second PLMN network respectively use different communication protocols. The signal handover manager according to the sixth aspect of the invention, wherein the first and the second communication networks have an overlapping area and a mobile device unit in which the signal is transmitted is located in the overlapping area. The signal handover manager according to claim 33, wherein the first network is a wireless area network and the second network is a PLMN network. The signal handover manager according to claim 33, wherein the wireless local area network is located in the coverage area of the PLMN network, 130 Ί 262 〇ϋ 1 . . . - »&gt;·«···&lt;·&gt;· .·η·. ,ν .'.'*:·'· ν .··. ...»*··* , JV—«-, Fengkou, Shen 5靑 patents. 66. The signal handover manager as described in claim 33 includes a priority unit for setting a wireless area network as a higher priority than the PLMN, and the mobile device unit is in place. When the range is within, the signal is automatically handed over to the above wireless local area network. a signal transfer method for a mobile device unit that communicates during a communication period, the signal transfer being between individual access points between a first and a second wireless network The method package provides a common use of m at both locations of the network to determine the identity of the mobile device unit at the control point, wherein the connection has been interrupted and the data of its relative redemption period is obtained; '15 在上述控制點決定形成與行動裝置單元新的連接 之身份;Determining at the above control point the identity of the new connection with the mobile device unit; 在上述控制點匹配上述身份,藉此匹配與一行動 裝置單元之一存在電信工作時期,其中該行動褒置單 元已經終止在-第一存取點上的連接及已經再連接於 一第二存取點。 68· —認證裝置,包括有: 一通訊器,與—認證行動裝置單元通訊; 一驗證器,與上述認證行重 — — 曰 &quot;'仃勤I置早兀共用來驗證 該通訊是在一預備的認證裝置;及 131 Ϊ262005 拾、申請專利範圍 一關聯器,透過一非認證裝置關聯該驗證與該活 動請求,藉此認證該非認證裝置之活動請求。 69.如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一GSM裝置及上述認證鏈結是一GSM鏈結。 5 70.如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一 CDMA裝置及上述認證鏈結是一 CDMA鏈結。 71.如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一PDC裝置及上述認證鏈結是一PDC鏈結。Matching the identity at the control point, thereby matching a telecom service period with one of the mobile device units, wherein the mobile device unit has terminated the connection at the first access point and has been reconnected to a second storage Take a point. 68--authentication device, comprising: a communicator, communicating with the authentication mobile device unit; a verifier, with the above-mentioned authentication line - 曰&quot; '仃勤 I is used to verify that the communication is in one a preparatory authentication device; and 131 Ϊ 262005 picking up, applying for a patent scope-associator, associating the verification with the activity request through a non-authentication device, thereby authenticating the activity request of the non-authentication device. 69. The device of claim 68, wherein the authentication device is a GSM device and the authentication link is a GSM link. The device of claim 68, wherein the authentication device is a CDMA device and the authentication link is a CDMA link. 71. The device of claim 68, wherein the authentication device is a PDC device and the authentication link is a PDC link. 72·如申請專利範圍第68項所述之裝置,其中上述認證裝 10 置是一 EDGE裝置及上述認證鏈結是一 EDGE鏈結。 73. 如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一 WCDMA裝置及上述認證鏈結是一 WCDMA鏈 結。 74. 如申請專利範圍第68項所述之裝置,其中上述認證裝 15 置是一 GPRS裝置及上述認證鏈結是一 GPRS鏈結。72. The device of claim 68, wherein the authentication device is an EDGE device and the authentication link is an EDGE link. 73. The device of claim 68, wherein the authentication device is a WCDMA device and the authentication link is a WCDMA link. 74. The device of claim 68, wherein the authentication device is a GPRS device and the authentication link is a GPRS link. 75. 如申請專利範圍第68項所述之裝置,其中上述認證裝 置是一銥網路(Iridium)裝置及上述認證鏈結是一銥網 路鏈結。 76. 如申請專利範圍第68項所述之裝置,其中上述保密鏈 20 結牽涉到位在上述加密行動裝置之一電信服務使用者 身份模組。 77. 如申請專利範圍第68項所述之裝置,其中上述保密鏈 結牽涉到位在上述認證裝置之一電信服務使用者身份 模組。 132 如:請專利範圍第68項所述之裝置,纟中上述認證裝 置是一行動電話。 如申巧專利範圍第68項所述之裝置,纟中上述通訊包 括有一電子資料通訊。 如申請專利範圍第79項所述之裝置,纟中上述電子資 料通訊包括電子訊息傳送。 如申請專利範圍第68項所述之裝置,纟中上述電子訊 息傳送包括有SMS訊息傳送。 如申請專利範圍第8〇項所述之裝置,其中上述電子訊 息傳送包括有WAP。 如申請專利範圍第8〇項所述之裝置,其中上述電子訊 息傳送包括有電子郵件。 如申請專利範圍第80項所述之裝置,其中上述電子訊 息傳送包括有EMS。 如申請專利範圍第80項所述之裝置,其中上述電子訊 息傳送包括有MMS。 如申請專利範圍第80項所述之裝置,其中上述通訊器 包括有藉由傳送來自上述認證裝置之一啟動訊號來啟 動上述通訊之功能,及具有接收對來自上述認證裝置 之上述啟使訊息之一回覆之功能,此外授權上述活動 請求。 如申請專利範圍第80項所述之裝置,其中上述通訊器 具有接收對來自上述認證裝置及上述非認證裝置之其 一的啟始通訊之功能,及具有對上述啟始訊息傳送一 ^262005 拾、申請專利範圍 回覆之功能,此外授權上述活動請求。 •如申請專利範圍第80項所述之裝置,其中上述通訊器 包括有接收來自一外部裝置之一啟始通訊之功能,及 5 建立在上述認證裝置與上述非認證裝置之間的一鏈結 ’此為授權上述活動請求。 89.如申請專利範圍第8〇項所述之裝置,其中上述通訊器 牽涉到接收來自上述認證裝置之一訊息的功能及藉由 傳达一響應至上述保密認證裝來完成上述通訊之功能 ,藉此授權上述活動請求。 1〇 9〇·如申請專利範圍第%項所述之裝置,其中上述通訊器 包括有插入一辨識碼於上述回覆給一請求端透過上述 非涊證裝置輸入之功能,及其中上述驗證器更包括有 決定上述識別碼是否已經透過上述非認證裝被置接收 〇 15 91·如申請專利範圍第68項所述之裝置,其中上述通訊器 可以操作使用一自動聲音以與上述認證裝置通訊。 92·如申請專利範圍第68項所述之裝置,其中上述認證裝 置是與-付費帳號-起使用,上述裝置更包括有向上 述請求活動對上述付費帳號收費的功能。 20 93·如申請專利範圍第68項所述之裝置,其中上述被請求 活動是一網際網路瀏覽活動或銷售點活動。 94·如申請專利範圍第68項所述之裝置,其中上述被請求 活動是存取至一網路。 95.如申請專利範圍第68項所述之裝置,其可以透過藍芽 134 β62005: , —V一‘,… 瘡、申請專利範圍 存取點來操作連接至上述非認證裝置。 96·如申請專利範圍第68項所述之裝置,其其可以透過至 少一個WLAN存取點來操作連接至上述非認證裝置。 97·如申請專利範圍第68項所述之裝置,其可透過一 5 TCP/IP連接至上述非認證裝置。 98. 如申請專利範圍第68項所述之裝置,其中上述通訊器 可操作由上述非認證裝置獲得用來與上述認證裝置通 訊之一電話號碼。75. The device of claim 68, wherein the authentication device is an Iridium device and the authentication link is a network link. 76. The device of claim 68, wherein the security chain 20 is involved in a telecommunications service user identity module of the encrypted mobile device. 77. The device of claim 68, wherein the security link is involved in a telecommunications service user identity module of the authentication device. 132 For example, please refer to the device described in item 68 of the patent, in which the above authentication device is a mobile phone. In the device described in claim 68 of the patent scope, the above communication includes an electronic data communication. For example, in the device described in claim 79, the above electronic material communication includes electronic message transmission. For example, in the device described in claim 68, the above electronic information transmission includes SMS message transmission. The device of claim 8, wherein the electronic information transmission comprises a WAP. The device of claim 8, wherein the electronic information transmission comprises an electronic mail. The apparatus of claim 80, wherein the electronic information transmission comprises an EMS. The device of claim 80, wherein the electronic information transmission comprises an MMS. The device of claim 80, wherein the communicator comprises a function of initiating the communication by transmitting a start signal from the one of the authentication devices, and having the receiving message from the authentication device. A reply function, in addition to authorizing the above activity request. The device of claim 80, wherein the communicator has a function of receiving initiation communication from one of the authentication device and the non-authentication device, and has a transmission to the start message The function of applying for a patent scope reply, in addition to authorizing the above activity request. The device of claim 80, wherein the communicator includes a function of receiving a communication from an external device, and a link between the authentication device and the non-authentic device. 'This is to authorize the above activity request. 89. The device of claim 8, wherein the communicator involves receiving a function from a message of the authentication device and performing a communication by transmitting a response to the secure authentication device. This authorizes the above activity request. 1. The device of claim 1 , wherein the communicator includes a function of inserting an identification code into the reply to a requesting end through the non-expressing device, and wherein the verification device is further The apparatus of claim 68, wherein the communication device is operable to use an automatic sound to communicate with the authentication device. 92. The device of claim 68, wherein the authentication device is used with a pay-per-account, the device further comprising a function of charging the above-mentioned paid account by the requesting activity. The apparatus of claim 68, wherein the requested activity is an internet browsing activity or a point of sale activity. 94. The device of claim 68, wherein the requested activity is access to a network. 95. The device of claim 68, wherein the device is operatively coupled to the non-certified device via a Bluetooth 134 β62005:, V-, ..., patent-accessible access point. 96. The device of claim 68, wherein the device is operatively coupled to the non-authenticated device via at least one WLAN access point. 97. The device of claim 68, which is connectable to the non-authenticated device via a TCP/IP. 98. The device of claim 68, wherein the communicator is operable to obtain a telephone number for communication with the authentication device by the non-authentication device. 99. 如申請專利範圍第68項所述之裝置,其中上述通訊器 〕 可操作獲得來自上述非認證裝置之身份資料用以形成 上述關聯。 100·如申请專利範圍第68項所述之裝置,其中上述非認證 裝置是下列一群組中之一,包括有:一信用卡,一智 慧卡,一紅外線裝置,一藍芽裝置,一 pda,一攜帶 ; 型電腦,一固定電腦,及一電腦網路。 101·如申請專利範圍第68項所述之裝置,更包括有一計數99. The device of claim 68, wherein the communicator is operable to obtain identity data from the non-authenticated device to form the association. 100. The device of claim 68, wherein the non-authentication device is one of the following groups, including: a credit card, a smart card, an infrared device, a Bluetooth device, a pda, A portable computer, a fixed computer, and a computer network. 101. The device of claim 68, further comprising a count 态,如果上述通訊沒有在一預定次數限制之内完成, 用以計算上述連接認證失敗。 102. 如申請專利範圍第68項所述之裝置,更包括有用以登 錄该非認證裝置之一登錄功能。 103. 如申請專利範圍第68項所述之裝置,其中上述關聯器 被連接至一認證者用以指示上述活動請求被允許。 ]〇4.如申請專利範圍第】〇3項所述之裝置,其中上述認證 逋Λ益可操作通訊上述認證至一與上述非認證裝置相 135 弟y 1 l U Z 览甲靖系甲清寻刊祀圍修止, V ^ Λ) 3.3 I 弟y 1 l U Z 览甲靖系甲清寻刊祀圍修止, V ^ Λ) 3.3 IIf the above communication is not completed within a predetermined number of times, the connection authentication failure is calculated. 102. The device of claim 68, further comprising a login function for registering one of the non-authenticated devices. 103. The device of claim 68, wherein the correlator is coupled to an authenticator to indicate that the activity request is permitted. 〇4. The device described in claim 3, wherein the above-mentioned certification benefits operate the communication to the above-mentioned certification to a non-certified device 135 brother y 1 l UZ view Jiajing Jiaqing祀 修 , , , 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 3.3 I26200J、申請專利範圍 關之外部閘道器 1 〇 5.如申。月專利範圍第1 0 3項所述之裝置,其中上述認證 通汛杰可操作通訊上述認證至與上述請求活動相關的 一伺服器。 106·如申請專利範圍第68項所述之裝置,其中上述認證通 訊器藉由使用在一路由器上一路徑表上的改變來可操 作通訊上述認證。I26200J, the patent scope of the external gateway 1 〇 5. If Shen. The device of claim 10, wherein the authentication is performed by the above-mentioned authentication to a server associated with the requesting activity. 106. The apparatus of claim 68, wherein the authentication communicator is operable to communicate the authentication by using a change on a routing table on a router. 10 15 20 1〇7.—種與自動櫃員機(ATM機器)相容的個人交易卡,其 依ATM可讀取格式包含有一組ATM轉帳號碼以及與上 述個人交易卡之擁有人相關聯之一行動電話號碼; 其中該行動電話號碼提供上述ATM轉帳號碼與一 個PLMN存取裝置之相聯結,藉此令-PLMN網路認證 上述個人父易卡並允許在一 ATM機器之交易。 108·如申請專利範圍第107項所述之個人交易卡,其中上 述號碼被儲存在一磁條中。10 15 20 1〇7.- A personal transaction card compatible with an ATM (ATM machine), which contains an ATM transfer number in an ATM readable format and one of the actions associated with the owner of the personal transaction card described above. The telephone number; wherein the mobile telephone number provides the association of the ATM transfer number and a PLMN access device, thereby enabling the -PLMN network to authenticate the personal parent e-card and permitting transactions at an ATM machine. 108. The personal transaction card of claim 107, wherein the number is stored in a magnetic strip. 109·如申請專利範圍第107項所述之個人交易卡,其中上 述號碼被儲存在一内部積體電路中。 110 · —種認證方法,包括有: 透過一保密鏈結與一認證裝置通訊; 驗證該通訊是與一預期的認證裝置;及 透過-非認證裝置來關聯該驗證與一活動請求 藉此認證該非認證裝置之活動請求。 ⑴.如申請專利範項所述之方法,其中上述認證 裝置疋- GSM裝置及上述認證鏈結是一 GSM键結。 136 尥62005 10 15 20 拾、申請專利範圍 】】2·如申請專利範圍第11〇 只1 K方法,其中上述認證 裝置是一CDMA裝置及上述認證铋 且繾結是一 CDMA鏈結。 U3·如申請專利範圍第11〇項 &lt;〈万法,其中上述認證 裝置是一PDC裝置及上述認證鏈# θ 硬、、、。疋— PDC鏈結。 114·如申請專利範圍第11〇項所述 乃法’其中上述認證 裝置是-咖找置及上述認證鏈結是—edge鍵結。 U5·如申請專利範圍第11〇項所述 壯 乃,去’其中上述認證 裝置是一 WCDMA裝置及上述認t u °且鏈結是一 WCDMA 鏈結。 116·如申请專利範圍第11〇項所述之 万法,其中上述認證 衷置疋一GPRS裝置及上述認證 117 ^ ^ , 犍結疋— GPRS鏈結。 117·如申請專利範圍第11〇項所 狀要θ 万法,其中上述認證 衣置疋一銥網路裝置及上述認證 e 1 1 〇 , . ^ 硬、、、口疋一銥網路鏈結。 • α申Μ專利範圍第110項 ^^^ 又方法,其中上述認證 、,、…匕括有牽涉到位在上述認 1凌置之内的一電信服 各使用者身份模組之一保密鏈結。 η9·如申請專利範圍第lu項所 鏈^方法,其中上述保密 鏈、、、。包括有牽涉到位在上述認 務佶闲水, 展置之内的一電信服 私使用者身份模組。 12〇·如申請專利範圍第11〇項所 ^ w e , 方法,其中上述認證 衣置疋一行動電話。 121.如申請專利範圍第11〇項所述之方 包括有電子資料通訊。 ’、中上述通訊 ]22.如申請專利範圍第⑵項所述之方法,其中109. The personal transaction card of claim 107, wherein the number is stored in an internal integrated circuit. 110. An authentication method, comprising: communicating with an authentication device through a secure link; verifying that the communication is associated with an intended authentication device; and communicating with the non-authenticating device to authenticate the non-authentication device with an activity request An activity request for the authentication device. (1) The method of claim 1, wherein the authentication device 疋-GSM device and the authentication link are a GSM bond. 136 尥62005 10 15 20 Picking up the scope of patent application 】] 2· As for the patent application scope 11 〇 only 1 K method, wherein the above authentication device is a CDMA device and the above authentication 缱 and the 缱 is a CDMA link. U3. For example, in the scope of the patent application, the above-mentioned authentication device is a PDC device and the above-mentioned authentication chain #θ 硬, , , .疋 - PDC link. 114. If the patent application scope is described in item 11 of the law, wherein the above authentication device is - the coffee collection and the above certification chain is - edge bonding. U5. As described in claim 11 of the patent application, the above authentication device is a WCDMA device and the above-mentioned authentication and the link is a WCDMA link. 116. As described in the application of patent scope 11th, the above-mentioned certification is based on a GPRS device and the above-mentioned certification 117 ^ ^, 犍 疋 疋 GPRS link. 117. If the scope of the application for the scope of patent application is θ, the above-mentioned certification is set up in a network device and the above-mentioned certification e 1 1 〇, . ^ hard, 、, 疋 铱 铱 铱 铱 铱. • Μ Μ Μ Μ 第 第 110 110 110 ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ α α α α α α α α α α α α α α α α α α α α α α α α α α α α α . Η9· For example, the method of applying for the scope of the patent, the chain method, wherein the above-mentioned confidential chain, ,,. It includes a telecom service private user identity module that is involved in the above-mentioned services, free water, and exhibition. 12〇·If you apply for the scope of patent application, the method of the above-mentioned certification, the above-mentioned certification is a mobile phone. 121. The electronic data communication is included as described in Section 11 of the patent application. ', the above communication] 22. The method described in the scope of claim (2), wherein 137137 ί. - ,.,,勹s 1262005 拾、申請專利範圍 資料通訊包括有電子訊息傳送或SMS訊息傳送。 123.如申請專利範圍第122項所述之方法,包括有藉由傳 送一啟動訊息至上述認證裝置來啟動上述通訊及接收 對來自上述認證裝置之上述啟動訊息之回覆的功能, 5 此外授權上述活動請求。 124·如中請專利範圍第123項所述之方法,其中上述通訊 牽涉到接收來自上述認證裝置之一訊息及藉由傳送一,. - ,.,,勹s 1262005 Pick up, apply for patent coverage Data communication includes electronic message transmission or SMS message transmission. 123. The method of claim 122, comprising the function of initiating the communication and receiving a reply to the activation message from the authentication device by transmitting a start message to the authentication device, 5 Activity request. 124. The method of claim 123, wherein the communication involves receiving a message from the authentication device and transmitting 回覆至上述認證裝置來完成上述通訊,藉此授權上述 活動請求。 10 125·如中請專利範圍第124項所述之方法,包括有插入一 密碼至上述回覆給一請求端透過上述非認證裝置來輸 入,及決定上述密碼是否已經透過上述非認證裝置被 接收。 15 20 126.如申請專利範圍第nG項所述之方法,包括有使用 自動聲音與上述認證通訊。 如中請專利範圍第㈣項所述之方法,其中上述認The above authentication device is replied to complete the above communication, thereby authorizing the above activity request. The method of claim 124, comprising inserting a password into the reply to a requesting end through the non-authenticating device, and determining whether the password has been received through the non-authenticating device. 15 20 126. The method of claim nG, including the use of automatic voice communication with the above authentication. For example, the method described in item (4) of the patent scope, wherein the above recognition 裝置是與—付f帳號1使用,上述方法更包括有 上述请求活動向該付費帳號收費。 128.如申請專利範圍第11〇項所 、 去,其中上述請 活動是一群組或動之—包括 、, 匕^有—網際網路瀏覽活動 銷售點活動及存取一網路。 ]29.如申請專利範圍第11〇項 之方法,包括有使用 、,工外線或藍芽之其一。 1 30.如申請專利範圍第U〇項 貝所4之方法,其中上述非 138 1262005 拾 131 132 5 133. 10 134. 135. 15 136. 137. 138. 20 、申5 H專利範圍 證中置是一TCP/IP鏈結。 •如甲‘專利範圍第Π 〇項所述 方法,包括有由上、水 非認證裝置獲得與上述認證裝 ^ 通訊之一電話號碼。 •如申巧專利範圍第1 1〇項所述 ^ ^ ^ θ 方法,其中上述非認 吕豆衣置疋下列一群組中的一個, 包括有:~信用卡, 一智慧卡,一紅外線裝置,—誌 牙裝置,一PDA,一 攜帶型電腦,一固定電腦,及 久電腦網路。 如申凊專利範圍第1 1 〇項所述 &lt;方法,更包括有一計 數器’如果上述通訊沒有在—預定次數限制之内完成 ,用以計算上述連接認證失敗。 如申請專·圍第11G項所述之方法,更包括有用以 登錄该非認證裝置之一登錄功能。 如申請專利範圍第11G項所述之方法,包括有輸出上 述活動请求已經被允許的指示。 如申請專利範圍第135項所述之方法,其中上述指示 疋輸出至與相上§忍證冑置相關之—外部閉道器。 如申請專利範圍第135項所述之方法,其中上述指示 疋輸出至與上述被請求活動相關之一伺服器。 如申請專利範圍第135項所述之方法,其中上述指示 藉由力入在路由态上一路徑表的改變來被輸出。The device is used with the pay-of-account 1. The above method further includes charging the paid account with the above-mentioned request activity. 128. If you apply for the scope of patent application, go to the above, please refer to the above activities as a group or move--including, 匕^有-Internet browsing activities, sales point activities and access to a network. 29. The method of claim 11, wherein there is one of the use, the outside line or the blue bud. 1 30. The method of claim 4, wherein the above-mentioned non-138 1262005 picks up 131 132 5 133. 10 134. 135. 15 136. 137. 138. 20, Shen 5 H patent scope certificate Is a TCP/IP link. • A method as described in the 'Patent Scope Π 〇 , , , , , , , , 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 • The ^^^ θ method as described in claim 1 of the patent scope, wherein the non-recognised peas are placed in one of the following groups, including: a credit card, a smart card, an infrared device, - Zhiji device, a PDA, a portable computer, a fixed computer, and a long computer network. The &lt;method of claim 1 of the claim patent scope further includes a counter ‘if the communication is not completed within a predetermined number of times to calculate the connection authentication failure. For example, the method described in the application of the 11G item includes a login function for logging in to the non-authentication device. The method of claim 11G includes the indication that the above request for activity has been permitted. The method of claim 135, wherein the indication is output to an external closed loop associated with the § forcible device. The method of claim 135, wherein the indication is output to one of the servers associated with the requested activity. The method of claim 135, wherein the indication is output by force in a change in a routing table on the routing state. 139139
TW091134023A 2001-05-16 2002-11-21 Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks TWI262005B (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US29095901P 2001-05-16 2001-05-16
US29096101P 2001-05-16 2001-05-16
US29096001P 2001-05-16 2001-05-16
US29096301P 2001-05-16 2001-05-16
US29556101P 2001-06-05 2001-06-05
PCT/IL2002/000382 WO2002093811A2 (en) 2001-05-16 2002-05-16 Access to plmn networks for non-plmn devices

Publications (2)

Publication Number Publication Date
TW200307428A TW200307428A (en) 2003-12-01
TWI262005B true TWI262005B (en) 2006-09-11

Family

ID=37987072

Family Applications (1)

Application Number Title Priority Date Filing Date
TW091134023A TWI262005B (en) 2001-05-16 2002-11-21 Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks

Country Status (1)

Country Link
TW (1) TWI262005B (en)

Also Published As

Publication number Publication date
TW200307428A (en) 2003-12-01

Similar Documents

Publication Publication Date Title
US8086855B2 (en) Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
US8769647B2 (en) Method and system for accessing 3rd generation network
TWI356614B (en) Improved subscriber authentication for unlicensed
Koien et al. Security aspects of 3G-WLAN interworking
EP1273197B1 (en) Billing in a packet data network
TWI343733B (en) Method and apparatus for simultaneous communication utilizing multiple wireless communication systems
KR101140497B1 (en) Heterogeneous wireless ad hoc network
CN100593923C (en) Authentication system, authentication method, and hand-over system
TWI264917B (en) Method and system for authenticating user of data transfer device
JP6668407B2 (en) Terminal authentication method and apparatus used in mobile communication system
EP1693995B1 (en) A method for implementing access authentication of wlan user
TWI262683B (en) A method, a wireless server, a mobile device, and a system for handing over, from a wireless server to another wireless server, in a connection between a mobile device in a foreign intranet network, and an intranet network
CN105934926A (en) Session and service control for wireless devices using common subscriber information
WO2009065347A1 (en) Security communication method, system and apparatus for home base-station
CN103597779A (en) Method and apparatus for providing network access to a user entity
JP2003530012A (en) Authentication method in packet data network
KR20120085648A (en) System and method providing interoperability between cellular and other wireless systems
Shi et al. IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
JPWO2006098116A1 (en) AUTHENTICATION METHOD IN RADIO COMMUNICATION SYSTEM, RADIO TERMINAL DEVICE AND RADIO BASE STATION HAVING THE SAME, RADIO COMMUNICATION SYSTEM AND PROGRAM USING THEM
JP2007538470A (en) Method for managing access to a virtual private network of a portable device without a VPN client
CN107113301A (en) Voice and text data service for mobile subscriber
WO2009006071A2 (en) Method and apparatus for dynamic and spontaneous roaming agreement of heterogenous networks
TWI262005B (en) Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
KR100668660B1 (en) User authentication method for roaming service between portable internet and 3g network, and router of performing the same
Wang et al. Security mechanisms and security analysis: hotspot WLANs and inter-operator roaming

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees