Disguising UE communications in a cellular network

ABSTRACT

A mobile device can select an identifier from a set of identifiers stored by the mobile device. The mobile device can communicate a request for a communication link with a communication system, and the request for the communication link can include the identifier. The communication link can be established based on the identifier. The mobile device can select a second identifier from the set of identifiers. The mobile device can communicate a second request for a second communication link with the communication system, and the second request can include the second identifier. The second communication link can be established based on the second identifier.

INCORPORATION BY REFERENCE TO ANY PRIORITY APPLICATIONS

Any and all applications for which a foreign or domestic priority claimis identified in the Application Data Sheet as filed with the presentapplication are incorporated by reference under 37 CFR 1.57 and made apart of this specification.

BACKGROUND

A base station can broadcast signals or messages and one or more userequipment (UE) in a corresponding coverage area can receive andinterpret the signals.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram illustrative of an embodiment of an environment thatshows a user device located within a cell or coverage area of a basestation, as well as the coverage areas of other base stations.

FIG. 2 is a block diagram of an embodiment of a communication system.

FIG. 3 illustrates a sequence diagram for example communications betweena UE and a base station.

FIG. 4 is a flow diagram illustrative of an embodiment of a routineimplemented by a UE for requesting multiple communication links with abase station.

FIG. 5 is a flow diagram illustrative of an embodiment of a routineimplemented by a base station for establishing multiple communicationlinks with a UE.

FIG. 6 is a flow diagram illustrative of an embodiment of a routineimplemented by a UE to communicate multiple diversion messages to acommunication system.

DETAILED DESCRIPTION

In conventional mobile communication systems, a user equipment (UE)often includes a subscriber identity module (SIM) card that stores anidentifier (non-limiting example: an international mobile subscriberidentity or IMSI) to which the UE is linked. In general, the identifiercan be used to uniquely identify the UE, authenticate the UE for anetwork, verify that the UE is subscribed to a network, etc. Forexample, during certain communications with a base station, the UE couldprovide the identifier to gain access to a network. Traditionally, theidentifier is hard-coded into the SIM card and, as a consequence,changing the identifier generally requires physically replacing the SIMcard.

It can be desirable for a UE to prevent others (for example,eavesdropping devices) from intercepting the identifier during the UE'scommunications. For example, if captured, the identifier can be usedmaliciously, such as to track, discover, or imitate the UE. This can beespecially detrimental in those environments where anonymity isimportant to safety, such as in military conflict zones.

Some efforts to prevent eavesdroppers from intercepting the identifierrest on the idea of communicating the identifier as rarely as possible.For example, in some cases, after the UE communicates the identifier toa base station (for example, in an attach request), a temporaryidentifier (non-limiting examples: Temporary Mobile Subscriber Identityor TMSI, Globally Unique Temporary Identifier or GUTI, etc.) isgenerated and assigned to the UE. The temporary identifier can often beused in place of the identifier, and, as a result, use of the temporaryidentifier can reduce the exposure of the identifier, making theidentifier less likely to be intercepted during communications. However,in general, to be assigned a temporary identifier, the UE must firstcommunicate the identifier, which leaves the identifier vulnerable tointerception.

In some cases, to reduce some negative consequences of the identifierbeing intercepted, the UE can be allocated or assigned multipleidentifiers, any one of which can be included in an attach request bythe UE and/or used to authenticate the UE. In this way, the UE can“hide” by changing or cycling through identifiers. For example, the UEcan utilize a different identifier for each new attach request. In thisway, even if an identifier is intercepted, it is likely that the UE hasdiscontinued use (or will soon discontinue use) of that identifier infavor of another identifier. As a result, it is unlikely that theintercepted identifier could be used to track further communications bythe UE, at least because the UE is utilizing a different identifier.Furthermore, in some cases, it may be advantageous for the UE toactively detach from a network and then subsequently re-attach to thesame network using a different identifier. For example, this can be doneperiodically, such as based at least in part on a time- orcommunication-based schedule.

To reduce the likelihood that an eavesdropping device can intercept theidentifier and/or recognize the identifier if intercepted, in somecases, the UE can communicate one or more diversion communications. Forexample, in some cases, a UE can be utilized as a diversion or tacticaldevice that is configured to communicate multiple diversion messages(e.g., RACH requests, attach requests, etc.) to a communication system.In this way, the UE may appear, from the perspective of an eavesdroppingdevice, as multiple UE. Thus, the UE can give the impression of many UE(rather than the single UE that it is) and may confuse or overwhelm aneavesdropper. In some cases, the diversion messages can be communicatedin succession (e.g., one after another) and/or in parallel (e.g., two ormore at concurrent times).

Communications Overview

Base stations can routinely broadcast information in the form ofbroadcast signals or messages (non-limiting example: synchronizationsignals, master information blocks or MIBs, system information blocks orSIBs, etc.) over one or more frequency bands within a coverage area. Theinformation can be broadcast multiple times a second (non-limitingexample: every 40 ms) and can include bandwidth information for the basestation at a particular frequency band, signal decoding information,such as a Physical HARQ Indicator Channel (PHICH), that can be used todecode future signals and symbols, and system frame timing, etc.

Additional signals broadcast by the base station can provide the UE withrelevant information regarding the base station and the cell, orcoverage area, where the UE is located. For example, the additionalsignals can provide synchronization information (for example, a PrimarySynchronization Signal (PSS), a Secondary Synchronization Signal (SSS),etc.), access credentials, a schedule for other following signals,mobile network code (MNC), mobile country code (MCC), multi-band carriercode (MBC), type allocation code (TAC) for the cell, radio resourcecontrol (RRC), uplink power control, preamble power ramping, uplinkcyclic prefix length, sub frame hopping, uplink Evolved Absolute RadioFrequency Channel Number (EARFCN) center frequency, cell re-selectioninformation, exclusivity parameter, cell barred timer, access classbarred, cell ID, intra-frequency neighbors, basic handover information;etc. In some embodiments, the additional signals can be signalinformation blocks (SIBs).

The UE in the coverage area, or cell, of the base station receive thesignals or messages broadcast by the base station. For example, UE canbe configured to scan one or more frequency bands for signals broadcastfrom any base station. Using the various signals, the UE can determinethe strength and quality of the base station signal where the UE islocated. The UE in the coverage area can use the signal quality andstrength, as well as other information (non-limiting examples: servicetype, PLMN acceptability, etc.), to determine whether the UE shouldattempt to establish a communication link with the base station.Furthermore, using the various signals, the UE can acquire time,frequency, and/or phase synchronization with the base station.

In some cases, based at least in part on the broadcast signals, the UEcan request a secondary communication link with the base stationbroadcasting the signals. In some cases, the secondary communicationlink enables the UE to establish bi-directional communication with thebase station, but does not enable the UE to communicate with other UEaccessible via a network associated with the base station. For example,in some cases, the secondary communication link corresponds to alow-level radio frequency (RF) connection. In some cases, the secondarycommunication link is established based at least in part on a RandomAccess Procedure performed by the UE and/or the base station. Forexample, in some cases, the request for the secondary communication linkincludes a Random Access Preamble (PRACH). As another example, in somecases, the request for the secondary communication link includes a RadioResource Control (RRC) request. For instance, the secondarycommunication link can correspond to a Radio Resource Control (RRC)connection.

In some cases, based at least in part on the broadcast signals, the UEcan request a primary communication link with the base station. In somecases, the primary communication link enables the UE to connect to thenetwork associated with the base station and communicate with otherdevices that are accessible via the network, such as other UE, servers,etc. For example, in some cases, the primary communication linkcorresponds to a cellular connection. In some cases, the request for theprimary communication link with the base station can correspond to bereferred to as an attach request. The request for the primarycommunication link can include an identifier (for example, anInternational Mobile Subscriber Identity or IMSI) that can be used toauthenticate the UE for the network (for example, verify that the UE issubscribed to the network.

In some cases, the UE can communicate the request to establish a primarycommunication link only after the secondary communication link isestablished with the base station. However, in some cases, the UE cancommunicate the request to establish a primary communication linkwithout a secondary communication link having been established. In somecases, as part of establishing the primary communication link, thenetwork core (for example, a home subscriber server or HSS, a mobilitymanagement entity or MME, etc.) can authenticate and/or authorize the UEfor the network.

In some cases, after a communication link (for example, one or both of asecond communication link or a primary communication link) isestablished between the UE and a base station, the communication linkcan be intentionally terminated. For example, in some cases, the UE canterminate the communication link or cause it to be terminated based atleast in part on a connection policy. For example, according to theconnection policy, the UE can terminate a communication link in order toestablish a new communication link using a different identifier.Similarly, in some cases, the base station can intentionally terminatethe communicate link or cause it to be terminated based at least in parton the connection policy. In some cases, a communication link isunintentionally terminated, for example due to loss of a radio orcellular signal.

Environment Overview

FIG. 1 is a block diagram illustrative of an embodiment of anenvironment 100 that shows a user device 110 located within a cell orcoverage area 120 of a base station 130, as well as the coverage areas121, 122 of other base stations 131, 132, respectively. Although onlyone UE 110 is shown in FIG. 1, it will be understood that multiple UE110 can be located within the coverage areas 120, 121, 122.

The base stations 130, 131, 132 can include an antenna to communicatewirelessly with the user device 110, one or more data stores, and one ormore processors to process the signals received by and sent to the UE110. In some embodiments, the base stations 130, 131, 132 areimplemented as eNodeBs that are in wired communication with one or morecomponents of a network core. The components of the network core may beremotely located from the base stations 130, 131, 132, or co-located toform a communication system, such as those described in greater detailin U.S. Pub. No. 2014/0323137 (the '137 Application), entitled “MobileCellular Network Backhaul,” filed Apr. 29, 2014, which is herebyincorporated herein by reference in its entirety.

In certain embodiments, the base stations 130, 131, 132 are implementedas mobile cellular network (MCN) communication systems, which aredescribed in greater detail in the '137 Application and/or acommunication system, such as communication system 200, describedherein. One example of a commercially available MCN communication systemis the Xiphos® available from Oceus Networks. In such embodiments, thebase station 130 can independently provide communication links betweendevices located within the coverage area 120, or communicate with thebase stations 131, 132 to provide communication links between devices indifferent coverage areas 120, 121, 122. For example, each base station130, 131, 132 can independently provide communication links between twoUE 110 located within a respective coverage area 120, 121, 122. Asanother example, the base station 131 can independently provide acommunication link between a UE in coverage area 121 and a server orservice that is co-located with the base station 131, or may provide acommunication link to another service or servicer that is not co-locatedwith the base station 131. In some embodiments, a server or service canbe co-located with a base station 130, 131, 132, such as physicallycoupled to the base station 130, 131, 132, located in the same room,tent, or building with the base stations 130, 131, 132. In certainembodiments, the server or service is remotely located from the basestations 130, 131, 132. Furthermore, the MCN communication systems canbe mobile during operation, thereby providing a cellular network that ismobile or can be moved. Accordingly, although reference is made in thevarious drawings to communicating with initiating a connection to, orconnecting to a base station, it will be understood that the UEs cancommunicate with, request a connection to, or connect to one or morecommunications systems that provide a cellular network that is mobileduring operation.

In certain embodiments, the UE 110 can include a processor, one or moredata stores, and a communication interface, such as a transceiver thatincludes an antenna, for wireless communication with the base stations130, 131, 132, etc. In some embodiments, the UE 110 can include, but isnot limited to a cellular phone, tablet, laptop, or other device that isconfigured to establish wireless communications with the base stations130, 131, 132. Additional description and examples of the UE 110 can befound in the '137 Application, incorporated herein by reference.

Communication System Overview

A cellular network typically includes multiple stationary antennas, basestations, or the like, in different locations that communicate with amobile telephone switching office (MTSO) and/or one or more core networkcomponents (generally referred to as the core or core network) that areremotely located from the different base stations. The MTSO or mobilecore determines how calls are routed between the base stations andenables the base stations to communicate with each other for handoverpurposes. If a base station cannot communicate (non-limiting example:via a backhaul) with the MTSO or mobile core, or the rest of thenetwork, all communications at that base station are lost and UE incorresponding network areas cannot communicate with other UE, even ifthe UE trying to communicate with each other are in the same networkarea. In addition, the base stations are built to be stationary so thatUE within a particular geographic area always have network access.

When a user moves from one network to another network, the mobile coresof the two networks communicate with each other to handle the handoverand other configuration details (non-limiting example: a core networkcomponent of the first cellular network communicates with a core networkcomponent of the second cellular network). In addition to communicatingfor handover purposes, core network components from different cellularnetworks may also communicate in order to route data (non-limitingexamples: voice data, video data, application data, control data, etc.)from a user in a first cellular network to another user in a secondcellular network.

FIG. 2 is a block diagram of an embodiment of a communication system 200that can independently provide a cellular network that is mobile. Incertain embodiments, the communication system 200 can also be referredto as an MCN communication system. In the illustrated embodiment, thecommunication system 200 includes a radio access component 250, whichcan be used to send/receive wireless communication to/from thecommunication system 200, a control and data component 252, and a datastore 254. The communication system 200 can include fewer, more, ordifferent components as desired and as described in greater detail inU.S. Pub. No. 2014/0057636 (the '636 Application), entitled MobileCellular Networks, and the '137 Application, each of which isincorporated by reference herein in its entirety. For example, thecommunication system 200 can include and/or can communicate with anantenna, satellite dish, and the like, to receive data from UE or otherendpoints, other communication systems, satellites, and the like. Incertain embodiments, the communication system 200 can communicate withmultiple eNodeBs, base stations, or the like, to increase its coveragearea. In addition, in an IP network architecture, thereceived/transmitted data can all be in the form of IP data packets.

One or more communication systems 200 can be deployed in areas wherecellular networks are not available and each communication system canindependently provide a self-contained cellular network that is portableduring operation for devices in respective coverage areas. In somecases, multiple communication systems can be networked together tocreate a network of communication systems, also referred to herein as aNOM, as described in greater detail in the '636 Application and the '137Application, each of which is incorporated herein by reference. Thedifferent communication systems within the NOM or between NOMs, cancommunicate with each other via a backhaul using a variety ofcommunication technologies, including satellite communication, microwaveor radio wave communication, OFDM, WiMAX, LTE, etc., as described ingreater detail in the '636 Application and the '137 Application, each ofwhich is incorporated herein by reference, and, in some cases, NOMs cancommunicate with each other. As further described in the '636Application and the '137 Application, each of which is incorporatedherein by reference, when networked together, some communication systems200 can be configured as master devices or hosts and other communicationsystems 200 can be configured as secondary devices, clients and/orrelays.

In some embodiments, each of the components of the communication system200 can include an identifier, such as an IP address, MAC address, etc.Furthermore, in certain embodiments, the network (in some embodiments aMCN) provided by the communication system 200 can include one or morenetwork identifiers, such as access point names, etc. In someembodiments, different types of data can be associated with differentaccess point names. For example, voice-over-IP (VOIP) data can beassociated with one access point of the communication system, Internetdata can be associated with a different access point of thecommunication system, etc. Similarly, video data, video data, audiodata, file transfer data, text or short message service (SMS) data,multimedia or multimedia message service (MMS) data, etc., can each beassigned to a different APN, or grouped together in any combination onthe same APN, as desired. In some cases, the use of different APNs canbe based at least in part on network policy, such as, but not limitedto, treatment of different types of packets or data, treatment ofdifferent users. In certain cases, the use of different APNs can bebased at least in part on billing systems (e.g., the ability to chargefor different types of data), carrier grade redundancy (e.g., makingdata paths for some type of data more resilient than others, such as tomake voice data more reliable than Internet data). Furthermore, in somecases, some types of data can be blocked, such as during authentication,depending on the network deployment. Signals sent over the network canuse the network identifiers of the communication system 200 to identifythe communication system 200 that is to process the packet and/or thatcan access a particular destination, etc.

In some embodiments, the communication system 200 can function in anindependent mode where communication with other communication systems ora backhaul communication is limited or non-existent. In suchembodiments, upon receiving a packet of data, the first communicationsystem 200 can refer to a look-up table stored in a data storage deviceto determine whether a destination identifier of the packet is withinits coverage area. If the destination is within the coverage area(non-limiting examples: an endpoint within the coverage area, acomponent of the communication system 200, etc.), the communicationsystem 200 can transmit the data to the destination. The data caninclude any one or more types of communications, including, but notlimited to, user plane data (non-limiting examples: voice data, videodata, e-mail, SMS data, picture data, files, requests for information,etc.) or control plane data. If the first communication system 200determines that the destination is not within its coverage area, thefirst communication system 200 can transmit a message to the source thatcommunication with the destination is not available, etc.

The communication system 200 can also function in a networked mode suchthat communication with a destination is available even if thedestination is not located within the communication system's coveragearea. In some instances, the destination may be accessible via theInternet (non-limiting examples: via satellite or wired communication),microwave communication, LTE backhaul, or other form of backhaultechnology, etc.

In some embodiments, multiple communication systems 200 can be relatedtogether. In addition, in certain embodiments, when in the networkedmode multiple communication systems 200 can be associated togetherand/or networked together as described in greater detail in the '636Application and the '137 Application, incorporated herein by reference.

Furthermore, when related together, the communication systems 200 canhave different functionality depending on their relationship with theother communication systems 200. For example, as described in greaterdetail in the '636 Application and the '137 Application, incorporatedherein by reference, when related together, one of the communicationsystems 200 can be designated as a host communication system or MasterDevice, while the remaining communication systems can be designated asclient communication systems, relay communication systems, and/orSecondary Devices.

Furthermore, when multiple communication systems 200 are networkedtogether, a UE can move from the coverage area of a first communicationsystem 200 to the coverage area of a second communication system 200without disrupting the service of the UE. As the UE moves from thecoverage area of the first communication system 200 to the coverage areaof the second communication system 200, the first and secondcommunication systems 200 can effectuate a handover that updates whichcommunication system 200 provides the UE with network access. Forexample, as part of the handover routine the UE can establish a firstcellular communication link with the first communication system 200 andterminate a second cellular communication link with the secondcommunication system 200. Any communication systems 200 to which the UEis registered (non-limiting example: a registered communication system)can similarly update its routing table and any session identifiers inorder to continue providing a communication pathway or link for the UE.

With continued reference to FIG. 2, the control and data component 252can be implemented using one or more computer processors, FPGAs,microcontrollers, etc., and can perform the various operations of thecommunication system 200. In an IP network architecture, such as 4G LTE,the control and data component 252 can include a packet data networkgateway (PGW), serving gateway (SGW), mobility management entity (MME),and policy and charging rules function (PCRF).

The PGW can provide the IP traffic interface between the UE and externalIP networks. Together with the SGW, the PGW can route all IP packetsbetween the UE and the external IP network. The PGW can perform policyenforcement, packet filtering for each UE, charging support, packetscreening, quality of service, EPS network support, static policy, IPv4packet data network (PDN), and network address support. The PGW can alsoprovide support for mobility between 3GPP and non-3GPP technologies suchas WiMAX and 3GPP2, etc.

The SGW can route and forward user data packets, and work with the PGWto handle user data between the radio access component and external IPnetworks. The SGW can route the user data from the UE to the PGW or fromthe PGW to the UE, and provide support during inter-communication systemhandovers. For idle state UE, the SGW can terminate the downlink datapath and trigger paging when downlink data arrives for the UE. The SGWcan also manage and store UE contexts, e.g. parameters of the IP bearerservice, network internal routing information.

The MME can be responsible for attaching and detaching a UE from thecommunication system 200 and authenticating the user (by interactingwith the home subscriber server (HSS), described in greater detailbelow). Furthermore, the MME can be responsible for choosing the SGW andPGW for a UE, and can manage PDN connections. In addition, the MME canbe responsible for UE tracking and paging procedures includingretransmissions.

The PCRF can provide network control regarding the service data flowdetection, gating, quality of service, and flow based charging towards aPolicy and Charging Enforcement Function (PCEF) contained in the PGW.The PCRF can contain a database holding dynamic policy and chargingrules information for the communication system 200.

Similarly, the control and data component 252 can perform the attachmentand detachment of UE, authentication procedures, gateway selection,managing PDN connections, UE tracking and paging, etc. The control anddata component 252 can also handle the user data between the radioaccess component and an external IP network, packet routing andforwarding, handover functions between communication systems 200, packetbuffering initiation of network triggered service request procedures,quality of service policy enforcement, static policy, subscriberlocation management, subscriber data, and the like. In addition, thecontrol and data component 252 can perform additional procedures asdescribed in greater detail in the '636 Application and the '137Application, incorporated herein by reference.

The data store 254 can include data regarding the UE in communicationwith the communication system 200 and within the coverage areacorresponding to the communication system 200, such as UE location,authentication keys, etc. In some embodiments, such as in an IP networkarchitecture such as a 4G LTE network, the data store 254 can include ahome subscriber server (HSS). In addition, the data store 254 caninclude information regarding other communication systems 200 that areregistered with the communication system 200.

The HSS can include subscription information for all UE (includingclient communications systems that are registered as UE) associated withthe communication system 200, such as all the UE located within thecoverage area of a communication system 200 and/or the UE located withinthe coverage area of related or associated communication systems 200.The HSS can store, for example, authentication parameters, securitykeys, and subscription information for UE within the communicationsystem 200 or associated with the communication system 200. Furthermore,the HSS can include subscriber location information and be involved withsubscriber data handling, authentication procedures, etc.

Similarly, the data store 254 can further include data identifying otherrelated communication systems 200. In some cases, the data identifyingthe other related communication systems 200 can be used to communicatewith the other communication systems 200.

Example Communications Between a UE and a Communication System

FIG. 3 illustrates a sequence diagram for example communications betweena UE 110 and a communication system 200. Although only one UE 110 andcommunication system 200 are shown in FIG. 3, it will be understood thatthe environment 200 can include fewer or more components as desiredand/or be configured differently. For example, as described herein, insome cases, the communication system 200 can include or be incommunication with one or more base stations 130, 131, 132, an MME, anSGW, an HSS, a PGW, or the like. In some such cases, one or more of thecommunications or steps of FIG. 3 can occur between or be performed byany of the base stations 130, 131, 132, MME, SGW, HSS, or PGW.Furthermore, the sequence in FIG. 3 can occur between the communicationsystem 200 and multiple UE 110 and/or between a UE 110 and multiplecommunication systems 200. Furthermore, additional, fewer, or differentcommunications can occur between UE 110 and the communication system200, and/or additional components can be used to communicate the databetween UE 110 and the communication system 200.

At (1), the communication system 200 broadcasts information in the formof broadcast signals over one or more frequency bands within a coveragearea of a network associated with the communication system 200. In somecases, the communication system 200 can broadcast the signals tomultiple UE 110 located within a coverage area. In certain embodiments,all UE within a coverage area receive the broadcast signals from thecommunication system 200. In some embodiments, the broadcast signals arenot directed to any particular UE 110, but are for any UE 110 thatreceives them.

The broadcast signals can be broadcast multiple times a second, such asevery 40 ms. The broadcast signals can include various informationincluding, but not limited to, synchronization data with thecommunication system 200 that a UE can use to synchronize with thecommunication system 200, bandwidth information for the communicationsystem 200 at a particular frequency band, signal decoding informationto decode future signals and symbols, system frame timing, etc. Inaddition or alternatively, the information can include, but is notlimited to, information regarding the communication system 200 or thecoverage area of the communication system 200. For example, thebroadcast signals can provide access credentials, a schedule for otherfollowing signals, MNC, MCC, MBC, TAC, RRC, uplink power control,preamble power ramping, uplink cyclic prefix length, sub frame hopping,uplink EARFCN center frequency, cell re-selection information,exclusivity parameters, cell barred timer, access class barred, cell ID,intra-frequency neighbors, basic handover information, or the like.

At (2), the UE 110 scans one or more frequency bands for broadcastsignals. For example, the UE 110 can scan or monitor one or morefrequency bands to “listen” for broadcast signals. In some cases, the UE110 determines to scan the one or more frequency bands based at least inpart on a connection policy. Furthermore, in some cases, as described inmore detail below, the UE 110 may terminate a communication link (forexample, a primary communication link and/or a secondary communicationlink) prior to (or concurrently with) scanning the frequency band(s).For example, in some cases, the UE 110 is attached to a network and willdetach from that network (or terminate a communication link associatedwith that network) prior to (or concurrently with) scanning thefrequency band(s). In some cases, the UE 110 may terminate acommunication link based at least in part on the connection policy. Inthis way, in some cases, the connection policy can trigger the UE 110 toterminate a communication link and/or scan the frequency band(s).

In some cases, the connection policy can indicate a time-based schedule.In some such cases, the connection policy can indicate to terminate anexisting communication link and/or scan the frequency band(s) every Xnumber of seconds, or every X minute(s), and so forth. For example, theUE 110 can terminate an existing communication link based at least inpart on a determination that a scan has not occurred in X number ofseconds, X number of minutes, etc. As another example, the UE 110 canscan one or more frequency bands based at least in part on adetermination that a scan has not occurred in X number of seconds, Xnumber of minutes, etc. Similarly, in some cases, the connection policycan indicate to terminate an existing communication link and/or scan thefrequency band(s) based at least in part on a determination that acommunication link has been established for a predetermined period oftime.

In some cases, the connection policy can indicate a communication-basedschedule. In some such cases, the connection policy can indicate toterminate an existing communication link and/or scan the frequencyband(s) every X number of communications (e.g., messages, packets,signals, phone calls, emails, etc.) sent by the UE 110, received by theUE 110, and/or communication between the UE 110 and a communicationsystem 200. For example, the UE 110 can terminate an existingcommunication link and/or scan the frequency band(s) based at least inpart on a determination that a number of communications have occurredover the communication link. In certain cases, the connection policy canindicate to terminate an existing communication link and/or scan thefrequency band(s) based at least in part on a determination that amessage has been sent, or a UE, server or service is no longer beingcommunicated with, etc. For example, the connection policy may indicatethat an existing communication link is to be terminated after a phonecall is completed, after a SMS message or email message is sent, orafter an application executing on the UE that accesses a remote serviceis closed, etc.

In certain embodiments, the connection policy can indicate that the UE110 is to terminate an existing communication link and/or scan thefrequency band(s) based at least in part on a connectivity threshold. Insome such cases, the connection policy can indicate that the UE 110 isto terminate an existing communication link and/or scan the frequencyband(s) based at least in part on a determination that a communicationlink with a communication system (such as, but not limited to,communication system 200) does not satisfy the connectivity threshold.For example, based at least in part on the quality of the communicationlink, signal strength, the number of communication errors, etc., thecommunication link may not satisfy the connectivity threshold.

In some cases, the UE 110 may be attempting to attach to a network ofthe communication system 200 for the first time, such that nocommunication link between the UE 110 and the communication system 200has yet been established. In some cases, a previous communication linkwith the communication system 200 may have been broken or terminated.For example, the communication system 200 may have detached the UE 110from the network (for example, because of poor communication linkquality, maintenance purposes, re-authorization failure, lack ofresources, etc.) As another example, the UE 110 may have detached itselffrom the network (for example, by turning off an antenna, removing a SIMcard, etc.)

In some cases, the connection policy can indicate that the connectivitythreshold is not satisfied if a communication link with thecommunication system 200 is limited or weak. For instance, the UE 110can monitor various connectivity parameters related to the communicationlink, such as, but not limited to, bandwidth, the number of droppedpackets or error rates, bit rate, throughput, transmission delay, speed,latency, jitter, quality of service, availability, etc. In some cases,the UE 110 can determine that the communication link does not satisfythe connectivity threshold if any one or any combination of thebandwidth does not satisfy a bandwidth threshold, the speed of thecommunication link does not satisfy a speed threshold, error rate of thecommunication link does not satisfy an error rate threshold, the numberof packets dropped does not satisfy a packets dropped threshold, bitrate of the communication link does not satisfy a bit rate threshold,throughput of the communication link does not satisfy a throughputthreshold, transmission delay of the communication link does not satisfya transmission delay threshold, quality of service of the communicationlink does not satisfy a quality of service threshold, availability ofthe communication link does not satisfy an availability threshold,latency of the communication link does not satisfy a latency threshold,jitter in the communication link does not satisfy a jitter threshold,the quality of the communication link does not satisfy a quality of linkthreshold, etc.

In certain embodiments, the connection policy can indicatelocation-based rules. For example, the connection policy can indicate toterminate an existing communication link and/or scan the frequencyband(s) based at least in part on a location of the UE 110 (for example,global positioning system (GPS) location, location relative to acommunication system or coverage area, etc.) or a communication system200. For example, in some cases, the connection policy can indicatelocation-based rules. For example, the connection policy can indicate toterminate an existing communication link and/or scan the frequencyband(s) based at least in part on a determination that the location ofthe UE 110 does not satisfy a location threshold associated with acoverage area of the network (for example, the UE 110 is not within thecoverage area).

In certain embodiments, the connection policy can indicate to terminatean existing communication link and/or scan the frequency band(s) basedat least in part on a power status of the UE 110 satisfying, or notsatisfying, a power status threshold. For example, the power status mayfail to satisfy the power status threshold when the UE 110 is poweredoff, powered on, is in idle mode, etc.

In certain embodiments, the connection policy can indicate to terminatean existing communication link and/or scan the frequency band(s) basedat least in part on a number of communications over a communicationlink. In some cases, the connection policy can indicate to terminate anexisting communication link and/or scan the frequency band(s) based atleast in part on a determination that a number of communications overthe first primary communication link satisfies a communicationsthreshold. For example, connection policy can indicate to terminate anexisting communication link and/or scan the frequency band(s) based atleast in part on a determination that five phone calls have been madeand/or 50 email messages have been sent/received, etc. Thus any one typeor different types of communications can be used to determine whetherthe communications threshold has been satisfied or to determine that anexisting communication link is to be terminated.

In some cases, the connection policy may indicate that the UE 110 is toterminate an existing communication link and/or scan the frequencyband(s) based at least in part on a combination of any of theaforementioned connection policies. For example, the connection policymay indicate a time-based schedule in combination with a connectivitythreshold. For example, the UE 110 can determine to terminate anexisting communication link and/or scan the frequency band(s) based atleast in part on a determination that a communication link between theUE 110 and a communication system does not satisfy the connectivitythreshold or a determination that UE 110 has not scanned one or morefrequency bands in X number of seconds, X number of minutes, etc. Asanother example, the connection policy may indicate that the UE 110 isto scan the one or more frequency bands based at least in part on adetermination that UE 110 has not scanned one or more frequency bands inX number of seconds, X number of minutes, etc. since a determinationthat a communication link between the UE 110 and a communication systemdoes not satisfy the connectivity threshold.

In some cases, the connection policy may indicate that the UE 110 is toscan the one or more frequency bands based at least in part on adetermination that the UE 110 is detached from a base station, inresponse to the UE 110 detaching from a base station, or a determinationthat the UE 110 has been detached from a base station for X number ofseconds, X number of minutes, etc. For example, in some cases, theconnection policy indicates that the UE 110 is to detach from a basestation and further indicates that the UE 110 is to scan one or morefrequency bands after detaching.

Any one or any combination of the aforementioned functions can be usedas part of a connection policy. In some cases, different UE 110 can usedifferent connection policies, or a single UE 110 can use differentconnection policies. For example, a UE 110 can use a first connectionpolicy for a first network or communication system 200 and can use asecond connection policy for a second network or communication system200. Accordingly, it will be understood that UEs can concurrentlyuse/apply different connection policies to terminate an existingcommunication link and/or scan the frequency band(s).

At (3), the UE 110 receives one or more broadcast signals and processesthe received signals. In certain embodiments, the UE 110 processesbroadcast signals from multiple base stations 130, 131, 132. In somecases, as part of the processing, the UE 110 can synchronize with acommunication system 200. For example, using at least some of thereceived signals, the UE 110 can acquire time, frequency, and/or phasesynchronization with the communication system 200. In some cases, aspart of the processing, the UE 110 can determine a strength and/orquality of a signal received from the communication system 200,determine an identity of the communication system 200, or decode asignal received from the communication system 200. For example, in somecases, processing the received signals includes decoding at least one ofa primary synchronization signal (PSS), a secondary synchronizationsignal (SSS), a Master Information Blocks (MIB), or a System InformationBlock (SIB). In some cases, processing the received signals enablesdownlink access from the communication system 200 to the UE 110. In somecases, processing the received signals enables uplink access from the UE110 to the communication system 200. In some cases, processing thereceived signals enables both downlink access and uplink access.

At (4), the UE 110 communicates a request for a secondary communicationlink with the communication system 200. In some cases, the UE 110communicates the request for a secondary communication based at least inpart on one or more of the broadcast signals. For example, in somecases, the UE 110 communicates the request for the secondarycommunication link based at least in part on a determination that thebroadcast signals from the communication system 200 satisfy a signal andpower quality threshold. For example, when processing signals frommultiple base stations 130, 131, 132, the UE 110 can ignore or filterout base stations 130, 131, 132 and/or broadcast signals that do notsatisfy at least one of the signal and/or power quality threshold. Insome cases, the UE 110 can prioritize the identified base stations 130,131, 132 based at least in part on the power and quality of the signalsand request communication with the identified base stations 130, 131,132 based at least in part on the prioritization.

In some cases, the request for a secondary communication link is basedat least in part on one or more of the broadcast signals. For example,in some cases, the UE 110 can use the broadcast signals to request for asecondary communication link with the communication system 200. In somecases, the request for a secondary communication link is part of aRandom Access (RACH) procedure. For example, in some cases, the requestfor a secondary communication link can correspond to a random accesspreamble sequence. As another example, in some cases, the request for asecondary communication link can correspond to a Radio Resource Control(RRC) connection request. As another example, in some cases, the requestfor a secondary communication link can correspond to an RRC ConnectionCompete message.

At (5), the communication system 200 receives and/or processes therequest for the secondary communication link. In some cases, processingthe request for the secondary communication can include communicating orassigning one or more of a temporary identifier, timing information,uplink information, to the UE 110. For example, the communication system200 can communicate a Random Access Response to the UE 110.

At (6), the communication system 200 responds to the request for thesecondary communication link. In some cases, the response can establishthe secondary communication link between the UE 110 and thecommunication system 200, provide the UE 110 with sufficient informationto establish the secondary communication link with the communicationsystem 200, and/or reject the UE 110. In some cases, the response to therequest for the secondary communication link can include anacknowledgement. For example, the communication system 200 canacknowledge the UE's request for a RRC connection with an RRC ConnectionComplete message. In some cases, events (4), (5), and/or (6) correspondto Random Access (RACH) Procedure (RACH) Procedure. In some cases,events (4), (5), and/or (6) establish a Radio Resource Control (RRC)connection between the UE 110 and the communication system 200.

At (7), the UE 110 selects an identifier of a plurality of identifiersstored by the UE 110. As described herein the plurality of identifierscan be allocated to the UE 110 and stored by the UE 110, such an inmemory of the UE 110. In some cases, each of the plurality ofidentifiers globally identify the same UE 110/mobile subscriber. Forexample, the same UE 110 can be associated with each of the plurality ofidentifiers such that any one of the plurality of identifiers can beutilized to authenticate an identity of the UE 110. Furthermore, each ofthe plurality of identifiers are registered with the network(s) to whichthe UE 110 is subscribed. For example, the communication system 200(such as the HSS of the communication system 200) can also store thesame plurality of identifiers so that the communication system 200 canauthenticate the UE 110 after receiving (for example, in an attachrequest) any of the plurality of identifiers from the UE 110.

In some embodiments, the identifier includes at least one of an IMSI, aMobile Country Code or MCC, a Mobile Network Code or MNC, a MobileStation Identification Number or MSIN, a Mobile Station InternationalSubscriber Directory Number or MSISDN, an International Mobile stationEquipment Identity or IMEI, or a Globally Unique Temporary UE Identityor GUTI. However, it will be understood that a variety of identifierscan be included in the identifier.

In some embodiments, the UE 110 is equipped with a removableidentification module, such as a SIM card. In some such cases, theplurality of identifiers can be programmed on the SIM card. In somecases, the UE 110 can select or identify the identifier stored on theremovable identification module. In some cases, the UE 110 can select oridentify an identifier that is not stored on the removableidentification module. In this way, the UE 110 actively avoids selectingthe identifier stored on removable identification module and insteadselects an identifier that is stored in a location other than theremovable identification module.

In some embodiments, the UE 110 selects an identifier from the pluralityof identifiers stored by the UE based at least in part on a selectionpolicy. In some cases, the selection policy can indicate that theidentifier is to be selected from the plurality of identifiers randomly,based at least in part on an order (e.g., sequentially, chronologically,or alphabetically select an identifier as identifiers are used), basedat least in part on repeatable (e.g., non-random) patterns, based atleast in part on availability, based at least in part on previousselections, based at least in part on a time-based schedule, etc. Forexample, the selection policy can indicate to select an identifier thathas not been used in an attach request by the UE 110 for X number ofseconds, X number of minute(s), and so forth. As another example, theconnection policy can indicate to select the identifier of the pluralityof allocated identifiers that has been un-used for the longest period oftime. For example, in instances in which the UE 110 cycles throughand/or re-uses identifiers, the selection policy can indicate that theUE 110 select the identifier whose last use was the longest time ago.

At (8), the UE 110 can request a primary communication link. In somecases, prior to requesting the primary communication link, the UE 110can determine whether to request the primary communication link based atleast in part on the information described above, such as signal powerand quality or broadcast signals. As part of the request, in some cases,the UE 110 can include sufficient information to enable thecommunication system 200 to authenticate the UE 110 and/or authorize theUE for the network. For example, as described herein, the request forthe primary communication link can include the identifier selected at(7). In some cases, the information in the request can include networkcredentials, access identifiers, etc.

At (9), the communication system 200 or communication network associatedwith the communication system 200, can process the request and determinewhether to establish the primary communication link with the UE 110. Insome cases to determine whether to establish the primary communicationlink with the UE 110, the communication system 200, or associatedcommunication network components, can consult one or more databases,such as an HSS, to authenticate the UE 110. For example, thecommunication system 200 or other communication network component candetermine whether the UE 110 is registered with the network, such as, bydetermining whether the identifier is located in the one or moredatabases and identified as a registered user, etc. of the communicationnetwork. In certain embodiments, even if a UE 110 can be authenticatedwith the network, the communication system 200 can still deny access ifthe UE 110 does not have the proper access or permissions level.

At (10), based at least in part on the processing the base station canrespond to the UE 110 request. In some cases, the response can establishthe primary communication link between the UE 110 and the communicationsystem 200, provide the UE 110 with sufficient information to establishthe primary communication link with the communication system 200, and/orreject the UE 110. As mentioned previously, in some cases, the UE 110can be rejected based at least in part on the identifier and/orauthentication, etc. Once the primary communication link is established,the UE 110 can communicate with other devices within the network, suchas other UE, servers, etc., via the communication system 200.

Depending on the embodiment, certain acts, events, blocks,communications or functions identified above can be performed in adifferent sequence, can be merged, or left out altogether (non-limitingexample: not all described operations or events are necessary). Forexample, in some cases, any one or any combination of events (1), (2),(3), (4), (5), (6), (7), (8), (9), or (10) can be omitted. Further, insome embodiments, the UE 110 may not send a request for secondarycommunication link to the communication system 200. For example, the UE110 can process signals received from the base station and request aprimary communication link. Moreover, in certain embodiments, operationsor events can be performed concurrently, e.g., the UE 110 canconcurrently request a secondary and a primary communication link. Insome embodiments, the communication system 200 can establish the primarycommunication link at the same time that it responds to the UE's 110request for secondary communication link.

Furthermore, any one or any combination of the activities describedabove can occur automatically and/or without user input. For example,the UE 110 can receive the broadcast signals, process the signals,request the secondary communication link, request the primarycommunication link, and/or establish the secondary or primarycommunication link without user input.

Furthermore, it will be understood that, depending on the embodiment,certain acts, events, blocks, communications or functions identifiedabove can be added. For example, in some cases, to reduce undesiredcommunications, UE and communication systems can be implemented asUE-communication system pairs, such as a UE-base station pair describedin greater detail in U.S. Pub. No. 2018/0288687 (the '687 Application),hereby incorporated herein by reference in its entirety. For example,the UE 110 of a UE-communication system pair can store an identifier(for example, an identifier associated with communication system 200),and the communication system 200 can be configured to that provide amatching or predetermined identifier to the UE 110. For example, theidentifier can be communicated to the UE 110 in one or more of thesignals broadcast by the communication system 200, such as in a SIB(e.g., in traditionally un-used bits, in one or more of the octets,etc.) and/or a MIB (e.g., in traditionally un-used bits, in one or moreof the octets (such as the 3rd octet), etc.). In some cases, the UE 110can identify the identifier from the broadcast signals and useidentifier to identify whether the communication system 200 is part ofthe UE-communication system pair. In some cases, communication systemsthat do not provide the particular identifier can be rejected or ignoredby the UE 110. For example, the UE 110 can be configured not to attemptto communicate (e.g., not attempt to establish a secondary communicationlink, primary communication link, etc.) with a communication systembased at least in part on a determination that the broadcast signals donot include an identifier or do not include an anticipated identifier(e.g., an identifier matching an identifier stored by the UE 110). As acorollary, the UE 110 can be configured to attempt to communicate with acommunication system based at least in part on a determination that thebroadcast signals does include an identifier or does include ananticipated identifier.

Changing Identifiers

In some cases, the UE can “hide” by changing or cycling through a set ofidentifiers. For example, the UE can utilize a different identifier foreach new attach request. In this way, it can reduce the likelihood orease of using the intercepted identifier to track further communicationsby the UE.

FIG. 4 is a flow diagram illustrative of an embodiment of a routine 400implemented by a UE 110 for establishing a communication link with acommunication system 200. Additional, fewer, or different communicationscan occur between UE 110 and communication system 200, and/or additionalcomponents can be used to communicate the data between UE 110 andcommunication system 200.

At block 402, the UE 110 selects a first identifier from a plurality ofidentifiers stored by the UE. As described herein, the plurality ofidentifiers can be allocated and/or registered to the UE 110 such thatany one of the plurality of identifiers stored by the UE can be utilizedto authenticate the identity of the UE 110. In some cases, at least someof the plurality of identifiers are stored in the UE 110, such as inmemory of the UE 110. In some cases, at least some of the plurality ofidentifiers provisioned to the UE 110, for example by a provisioningdevice not part of the communication system 200. The some cases, each ofthe plurality of identifiers are generated by the UE 110, for examplerather than by the communication system 200. As described herein, the UE110 can select the first identifier from the plurality of identifiersbased at least in part on a selection policy.

At block 404, the UE 110 communicates a request for a first primarycommunication link with the communication system 200. As describedherein, the request for the first primary communication link can includethe first identifier selected at block 402. In some cases, prior tocommunicating the request for the first primary communication link, theUE 110 synchronizes with the communication system 200, communicates arequest for a secondary communication link with the communication system200, and/or a secondary communication link is established with thecommunication system 200.

As described herein, the communication system 200 can receive andprocess the request for the first primary communication link.Furthermore, the first primary communication link can be establishedbased at least in part on the request for a first primary communicationlink. In some cases, the first primary communication link enablescommunications between the UE 110 and other UE accessible via a networkassociated with the communication system 200.

At block 406, the first primary communication link is terminated. Asdescribed herein, the first primary communication link can be terminatedby the UE 110, the communication system 200, individually or in concert.As described herein, the first primary communication link can beterminated based at least in part on a connection policy.

At block 408, similar to block 402, the UE 110 selects a secondidentifier from the plurality of identifiers stored by the UE. Thesecond identifier is different from the first identifier. As describedherein, the second identifier can be selected based at least in part ona selection policy.

At block 410, similar to block 404, the UE 110 communicates a requestfor a second primary communication link with the communication system200. As described herein, the request for the second primarycommunication link can include the second identifier selected at block408. In some cases, prior to communicating the request for the secondprimary communication link, the UE 110 synchronizes with thecommunication system 200, communicates a request for a secondarycommunication link with the communication system 200, and/or a secondarycommunication link is established with the communication system 200.

In some cases, for example based at least in part on the establishmentof the first primary communication link or the first secondarycommunication link, the UE 110 is already synchronized with thecommunication system 200 and/or already has synchronization dataassociated with the communication system 200. In some such cases, the UE110 does not need to re-synchronize. In some such cases, the UE 110 mustre-synchronize after the termination of the first primary communicationlink. In some cases, for example based at least in part on theestablishment of the first primary communication link or the firstsecondary communication link, a second secondary communication link isnot required to establish the second primary communication link.

As described herein, the communication system 200 can receive andprocess the request for the second primary communication link.Furthermore, the second primary communication link can be establishedbased at least in part on the request for the second primarycommunication link. In some cases, the second primary communication linkenables communications between the UE 110 and other UE accessible via anetwork associated with the communication system 200. Continuing withthe example described above, in some cases, the communication system 200includes a first base station and a second base station. In some suchcases, the second primary communication link is a primary communicationlink between the UE 110 and the first base station. In some such cases,the second primary communication link is a primary communication linkbetween the UE 110 and the second base station.

Depending on the embodiment, certain acts, events, blocks, or functionsof any of the routine 400 can be performed in a different sequence or inparallel, can be added, merged, or left out altogether (non-limitingexample: not all described operations or events are necessary for thepractice of the routine 400). For example, in some cases, any one or anycombination of blocks 402, 404, 406, 408, or 410 can be omitted. Asanother example, in some cases, the UE 110 can request a preliminarycommunication link prior to a primary communication link beingestablished. Moreover, in certain embodiments, operations or events canbe performed concurrently, e.g., the UE 110 can concurrently select anidentifier and send a request for a preliminary communication link.

In some cases, the first primary communication link and the secondprimary communication link are established between the UE 110 and thesame communication system. For example, the second primary communicationlink can be established between the UE 110 and the communication system200 after the first primary communication link has been established andsubsequently terminated. In some cases, the first primary communicationlink and the second primary communication link with differentcommunication system. For example, the first primary communication linkcan be established between the UE 110 and a first communication system(e.g., the communication system associated with base station 130) andthe second primary communication link can be established between the UE110 and a second communication system (e.g., the communication systemassociated with base station 131).

FIG. 5 is a flow diagram illustrative of an embodiment of a routine 500implemented by a communication system 200 for establishing multiplecommunication links with a UE 110. Additional, fewer, or differentcommunications can occur between one or more UE and communication system200, and/or additional components can be used to communicate the databetween the one or more UE and communication system 200.

At block 502, the communication system 200 receives a request for afirst primary communication link from the UE 110. As described herein,the request for the first primary communication link can include a firstidentifier from a plurality of identifiers stored by the UE 110. In somecases, prior to receiving the request for the first primarycommunication link, the UE 110 synchronizes with the communicationsystem 200 and/or a secondary communication link is established betweenthe communication system 200 and the UE 110.

At block 504, the UE 110 is authenticated for a network based at leastin part on the first identifier included in the request for the firstprimary communication link. In some cases, the communication system 200authenticates the UE 110 based at least in part on the first identifier.For example, as part of authenticating the UE 110, the communicationsystem 200 can compare the first identifier with one or more identifiersstored in a data store, such as data store 254. In some cases, thecommunication system 200 can communicate or forward the request for thefirst primary communication link and/or the first identifier to a datastore. For example, the communication system 200 can correspond to abase station, such as base station 130, and the communication system 200can communicate or forward the request for the first primarycommunication link and/or the first identifier to a data store, such asdata store 254, and the data store can compare the first identifier withone or more identifiers stored in the data store.

As described herein, the data store 254 can include subscriptioninformation for all UE (including client communications systems that areregistered as UE) associated with the communication system 200, such asall the UE located within the coverage area of a communication system200 and/or the UE located within the coverage area of related orassociated communication systems 200. Further, the data store caninclude an indication of each of the plurality of identifiers stored bythe UE 110. In some cases, if the first identifier matches an identifierin the data store, the UE 110 is authenticated for the network. In somecases, additional steps may occur before the UE 110 is authenticated forthe network. For example, the communication system 200 can provide theUE 110 with one or more keys, authentication parameters, etc. andrequest a response to the UE. In some such cases, the communicationsystem 200 can compare a response from the UE 110 to an expectedresponse and can authenticate the UE 110 if the UE's response matchesthe expected response.

The first primary communication link can be established based at leastin part on the request for the first primary communication link and/orthe authentication of the UE 110 for the network associated with thecommunication system 200. In some cases, the first primary communicationlink enables communications between the UE 110 and other UE accessiblevia the network.

At block 506, similar to block 406 of FIG. 4, the first primarycommunication link is terminated. As described herein, the first primarycommunication link can be terminated by the UE 110, the communicationsystem 200, individually or in concert. As described herein, the firstprimary communication link can be terminated based at least in part on aconnection policy.

At block 508, similar to block 404 of FIG. 4, the communication system200 receives a request for a second primary communication link from theUE 110. As described herein, the request for the first primarycommunication link can include a second identifier from a plurality ofidentifiers stored by the UE 110. The second identifier is differentfrom the first identifier. In some cases, prior to receiving the requestfor the second primary communication link, the UE 110 synchronizes withthe communication system 200 and/or a secondary communication link isestablished between the communication system 200 and the UE 110.

At block 510, similar to block 504, the UE 110 is authenticated for thenetwork based at least in part on the second identifier included in therequest for the second primary communication link. Furthermore, thesecond primary communication link is established based at least in parton the second identifier and/or the authentication of the UE 110 for thenetwork.

Depending on the embodiment, certain acts, events, blocks, or functionsof any of the routine 500 can be performed in a different sequence or inparallel, can be added, merged, or left out altogether (non-limitingexample: not all described operations or events are necessary for thepractice of the routine 500). For example, in some cases, any one or anycombination of blocks 4502, 504, 506, 508, or 510 can be omitted.Moreover, in certain embodiments, operations or events can be performedconcurrently, e.g., the communication system can concurrently receive arequest and authenticate the UE. Furthermore, it will be understood thatthe routine 500 can include fewer or more blocks as desired. Forexample, in some embodiments, the communication system 200 can broadcastadditional signals from which a UE can determine the strength andquality of a base station signal where the UE is located. In certainembodiments, the signals and additional signals can be combined into asingle information block or a single set of information blocks. In somecases, rather than establish the first and/or second primarycommunication links with the UE, the communication system 200 can allowthe UE to establish the communication links.

Diversion Communications

In some cases, a UE 110 can be utilized as a diversion or tacticaldevice that is configured to communicate multiple diversion messages toa communication system 200. In some cases, the messages can appear, fromthe perspective of an eavesdropping device, as if they are coming frommultiple UE, when in fact they are coming from a single UE (or few UEs).In this way, one or few UEs can give the impression of many UEs, whichmay confuse or overwhelm an eavesdropping device and/or a communicationsystem 200.

FIG. 6 is a flow diagram illustrative of an embodiment of a routine 600implemented by a UE 110 to communicate multiple diversion messages to acommunication system 200. Additional, fewer, or different communicationscan occur between UE 110 and communication system 200, and/or additionalcomponents can be used to communicate the messages between UE 110 andcommunication system 200.

At block 602, similar to (3) of FIG. 3, the UE 110 receives one or morebroadcast signals and processes the received signals. For example,similar to (2) of FIG. 3, the UE 110 can scan one or more frequencybands for the broadcast signals. As described herein, in some cases, theUE 110 determines to scan the one or more frequency bands based at leastin part on a connection policy. Furthermore, in some cases, as describedherein, the UE 110 may initiate detach from the communication system 200(or another communication system) prior to scanning the frequency bands,receiving the broadcast signals, and/or processing the received signals.

At block 604, similar to (4) of FIG. 3, the UE 110 communicates arequest for a secondary communication link with the communication system200. As described herein, in some cases, the request for a secondarycommunication link is part of, or can initiate, a Random Access (RACH)procedure, which can result in a secondary communication link beingestablished between the UE 110 and the communication system 200. In somecases, prior to communicating the request for the secondarycommunication link, the UE 110 synchronizes with the communicationsystem 200.

At block 606, similar to blocks 402 and/or 408 of FIG. 4, the UE 110identifies or selects an identifier from a plurality of identifiersstored by the UE 110 (or elsewhere). As described herein, the pluralityof identifiers can be allocated and/or registered with the network towhich the UE 110 desires to attach such that any one of the plurality ofidentifiers stored by the UE can be utilized to authenticate theidentity of the UE 110. As described herein, the UE 110 can select thefirst identifier from the plurality of identifiers based at least inpart on a selection policy. In some cases, each of the plurality ofidentifiers are used only once. In some cases, one or more of theplurality of identifiers can be used more than once. For example, theselection policy can indicate that two or more of the plurality ofidentifiers are cycled through.

At block 608, similar to block 404 of FIG. 4, the UE 110 communicates anattach request to the communication system 200. As described herein, insome cases, the attach request can be referred to as a request for aprimary communication link. As described herein, the attach request caninclude the identifier identified at block 606. In some cases, similarto block 510 of FIG. 5, the communication system 200 authenticate the UE110 based at least in part on the identifier in the attach request andestablishes a primary communication link.

In some cases, the request for a secondary communication link and/or theattach request are diversion communications. For example, in some cases,the diversion communications are not intended to establish a primarycommunication link, but rather merely appear (e.g., from the perspectiveof an eavesdropping device) as though one or more UE 110 is attemptingto establish communication links with the communication system. In thisway, if an eavesdropping device is intercepting messages, it will appearfrom the perspective of the eavesdropping device, that multiple UE arein the area.

In some cases, the identifier in the attach request need not be valid.For example, in some cases, the identified identifier is fake,erroneous, or invalid with respect to the network associated with thecommunication system 200 such that the identifier cannot be used tosuccessfully identify the UE 110, successfully authenticate the UE 110,successfully authorize the UE 110, or the like. For example, theidentifier can include a random or sequential sequence of numbers and/orcharacters. Thus, in some cases, the communication system 200 determinesthat the UE 110 is not authenticated for the network based at least inpart on the identifier in the attach request. In this way, in somecases, the UE 110 can communicate with the network but the communicationsystem 200 does not establish a primary communication link. For example,although in communication with the communication system, applicationlevel data may not be sent.

In some cases, the identifier in the attach request is a valididentifier (e.g., an identifier registered with the network associatedwith the communication system 200). For example, in some cases, it mayappear suspicious (e.g., from the perspective of the communicationsystem 200, from the perspective of an eavesdropping device, etc.) ifthe network receives a threshold number of failed access attempts. Forexample, the failed access attempts could be mistaken as unauthorizedattempts by a malicious party. In some such embodiments, the UE canestablish a primary communication link using the valid identifier andsend application level data or other data.

At block 610, the UE 110 initiates a detach from the communicationsystem 200. In some cases, initiating the detach is similar to block 406of FIG. 4 and/or block 506 of FIG. 5, in which a primary communicationlink is terminated by the UE 110, the communication system 200,individually or in concert. In some cases, the UE 110 initiates a detachbased at least in part on a connection policy, as described herein.

In some cases, initiating a detach and/or detaching from thecommunication system 200 releases resources relating to the UE 110,allowing the UE 110 to re-perform routine 600. For example, in somecases, the UE 110 performs routine 600 over and over again, each timeidentifying a different identifier at block 606. In some cases, thediversion messages (e.g., the requests at block 604 and/or 608) can becommunicated in succession (e.g., one after another) and/or in parallel(e.g., two or more at concurrent times). For example, in some cases, theUE 110 can be configured to concurrently communicate multiple attachrequests, with each attach request including a different identifier, toone or more communication systems. In some such embodiments, the UE 110may include multiple processors, modems, antennas, etc. in order toconcurrently communicate the attach requests, etc. As another example,in some cases, the UE 110 can be configured to successively performroutine 600 such that the UE 100 successfully attaches and subsequentlydetaches from a network before the UE 110 attempts to re-attach to thesame network.

Depending on the embodiment, certain acts, events, blocks, or functionsof any of the routine 600 can be performed in a different sequence or inparallel, can be added, merged, or left out altogether (non-limitingexample: not all described operations or events are necessary for thepractice of the routine 600). For example, in some cases, any one or anycombination of blocks 602, 604, 606, 608, or 610 can be omitted.Further, in some embodiments, the UE 110 may not send a request forsecondary communication link to the communication system 200. Forexample, the UE 110 can process signals received from the base stationand send an attach request. Moreover, in certain embodiments, operationsor events can be performed concurrently, e.g., the UE 110 canconcurrently request a secondary and send an attach request. As anotherexample, in some cases, the UE 110 can concurrently identify theidentifier and communicate an attach request that include theidentifier.

Example Embodiments

Various example embodiments of the disclosure can be described in viewof the following Clauses:

Clause 1. A method for establishing communication links with acommunication system, the method comprising:

scanning one or more frequency bands for broadcast signals;

receiving at a user equipment (UE), a first broadcast signal from acommunication system;

communicating a request for a first secondary communication link withthe communication system based at least in part on the first broadcastsignal;

based at least in part on the first secondary communication link beingestablished, communicating a request for a first primary communicationlink with the communication system, wherein the request for the firstprimary communication link includes a first identifier from a pluralityof identifiers stored by the UE, and wherein to establish the firstprimary communication link, the communication system uses the firstidentifier to authenticate the UE for a network associated with thecommunication system;

based at least in part on a connection policy, terminating the firstprimary communication link;

scanning the one or more frequency bands for broadcast signals;

receiving at the UE a second broadcast signal from the communicationsystem;

communicating a request for a second secondary communication link withthe communication system based at least in part on the second broadcastsignal;

identifying a second identifier from the plurality of identifiers storedby the UE, wherein the second identifier is different from the firstidentifier; and

based at least in part on the second secondary communication link beingestablished, communicating a request for a second primary communicationlink with the communication system, wherein the request for the secondprimary communication link includes the second identifier, and whereinto establish the second primary communication link, the communicationsystem uses the second identifier to authenticate the UE for the networkassociated with the communication system.

Clause 2. The method of Clause 1, wherein each identifier of theplurality of identifiers correspond to a different International MobileSubscriber Identity (IMSI).

Clause 3. The method of any of the previous clauses, wherein theplurality of identifiers are stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE.

Clause 4. The method of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a determination that the first primarycommunication link does not satisfy a connectivity threshold.

Clause 5. The method of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a determination that the first primarycommunication link has been established for a predetermined period oftime.

Clause 6. The method of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a number of communications over the firstprimary communication link.

Clause 7. The method of Clause 6, wherein the connection policyindicates to terminate the first primary communication link based atleast in part on a determination that a number of communications overthe first primary communication link satisfies a communicationsthreshold.

Clause 8. The method of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a location of the UE.

Clause 9. The method of Clause 8, wherein the connection policyindicates to terminate the first primary communication link based atleast in part on a determination that the location of the UE does notsatisfy a location threshold associated with a coverage area of thenetwork.

Clause 10. The method of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a power status of the UE.

Clause 11. The method of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a power status of the UE.

Clause 12. The method of any of the previous clauses, wherein the UE isconfigured to include an insertable subscriber identity module (SIM)card, wherein the connection policy indicates to terminate the firstprimary communication link based at least in part on a determinationthat the UE does not include the SIM card.

Clause 13. The method of any of the previous clauses, wherein saidterminating the first preliminary communication link comprises reducingpower applied to an antenna of the UE.

Clause 14. The method of any of the previous clauses, wherein saidterminating the first preliminary communication link comprises movingthe UE outside of a coverage area of the network.

Clause 15. The method of any of the previous clauses, wherein saidterminating the first preliminary communication link comprisesdetermining that the first preliminary communication link does notsatisfy a connectivity threshold.

Clause 16. The method of any of the previous clauses, wherein saidterminating the first preliminary communication link comprisescommunicating a detach request to the communication system.

Clause 17. The method of any of the previous clauses, wherein saidterminating the first preliminary communication link comprises receivinga detach request from the communication system.

Clause 18. The method of any of the previous clauses, wherein the firstbroadcast signal includes at least one of a master information block(MIB) or a system information block (SIB).

Clause 19. The method of any of the previous clauses, wherein thenetwork is a mobile cellular network, and wherein the communicationsystem comprises a mobile cellular network communication system thatindependently provides the mobile cellular network to a coverage area inwhich the UE is located.

Clause 20. The method of any of the previous clauses, wherein thecommunication system independently provides the network within a coveredarea without communication to another communication system.

Clause 21. The method of any of the previous clauses, wherein thecommunication system comprises a mobile cellular network (MCN)communication system, wherein the first primary communication linkcommunicatively couples the UE to the MCN communication system, andwherein the second primary communication link communicatively couplesthe UE to the MCN communication system.

Clause 22. The method of any of the previous clauses, wherein thecommunication system comprises a first mobile cellular network (MCN)communication system and a second MCN communication system, wherein thefirst primary communication link communicatively couples the UE to thefirst MCN communication system, and wherein the second primarycommunication link communicatively couples the UE to the second MCNcommunication system.

Clause 23. The method of any of the previous clauses, wherein thecommunication system is a base station.

Clause 24. The method of any of the previous clauses, wherein theplurality of identifiers are not generated by the communication system.

Clause 25. The method of any of the previous clauses, wherein theplurality of identifiers are generated by the communication system.

Clause 26. The method of any of the previous clauses, furthercomprising:

prior to said terminating the first primary communication link,communicating over the first primary communication link using atemporary identifier generated by the communication system.

Clause 27. The method of any of the previous clauses, wherein the firstand second secondary communication links are established based at leastin part on a Random Access (RACH) procedure.

Clause 28. The method of any of the previous clauses, wherein the firstand second secondary communication links enable communications betweenthe UE and the communication system.

Clause 29. The method of any of the previous clauses, wherein the firstand second secondary communication links do not enable communicationsbetween the UE and other UE accessible via the network.

Clause 30. The method of any of the previous clauses, wherein the firstand second primary communication links enable communications between theUE and other UE accessible via the network.

Clause 31. The method of any of the previous clauses, further comprisingreceiving the plurality of identifiers from a system other than thecommunication system.

Clause 32. The method of any of the previous clauses, further comprisingreceiving the plurality of identifiers from the communication system.

Clause 33. The method of any of the previous clauses, wherein the methodis performed by the UE while a location of the UE satisfies a locationthreshold associated with a coverage area of the network.

Example Embodiments

Various example embodiments of the disclosure can be described in viewof the following Clauses:

Clause 1. A system comprising:

a user equipment (UE) storing a plurality of identifiers and configuredto:

scan one or more frequency bands for broadcast signals;

receive a first broadcast signal from a communication system;

communicate a request for a first secondary communication link with thecommunication system based at least in part on the first broadcastsignal;

based at least in part on the first secondary communication link beingestablished, communicate a request for a first primary communicationlink with the communication system, wherein the request for the firstprimary communication link includes a first identifier from theplurality of identifiers, and wherein to establish the first primarycommunication link, the communication system uses the first identifierto authenticate the UE for a network associated with the communicationsystem;

based at least in part on a connection policy, terminate the firstprimary communication link;

scan the one or more frequency bands for broadcast signals;

receive a second broadcast signal from the communication system;

communicate a request for a second secondary communication link with thecommunication system based at least in part on the second broadcastsignal;

identify a second identifier from the plurality of identifiers, whereinthe second identifier is different from the first identifier; and

based at least in part on the second secondary communication link beingestablished, communicate a request for a second primary communicationlink with the communication system, wherein the request for the secondprimary communication link includes the second identifier, and whereinto establish the second primary communication link, the communicationsystem uses the second identifier to authenticate the UE for the networkassociated with the communication system.

Clause 2. The system of Clause 1, wherein each identifier of theplurality of identifiers correspond to a different International MobileSubscriber Identity (IMSI).

Clause 3. The system of any of the previous clauses, wherein theplurality of identifiers are stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE.

Clause 4. The method of Clause 1, wherein the connection policyindicates to terminate the first primary communication link based atleast in part on a determination that the first primary communicationlink does not satisfy a connectivity threshold.

Clause 5. The system of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a determination that the first primarycommunication link has been established for a predetermined period oftime.

Clause 6. The system of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a number of communications over the firstprimary communication link.

Clause 7. The system of Clause 6, wherein the connection policyindicates to terminate the first primary communication link based atleast in part on a determination that a number of communications overthe first primary communication link satisfies a communicationsthreshold.

Clause 8. The system of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a location of the UE.

Clause 9. The system of Clause 8, wherein the connection policyindicates to terminate the first primary communication link based atleast in part on a determination that the location of the UE does notsatisfy a location threshold associated with a coverage area of thenetwork.

Clause 10. The system of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a power status of the UE.

Clause 11. The system of any of the previous clauses, wherein theconnection policy indicates to terminate the first primary communicationlink based at least in part on a power status of the UE.

Clause 12. The system of any of the previous clauses, wherein the UE isfurther configured to include an insertable subscriber identity module(SIM) card, wherein the connection policy indicates to terminate thefirst primary communication link based at least in part on adetermination that the UE does not include the SIM card.

Clause 13. The system of any of the previous clauses, wherein toterminate the first preliminary communication link, the UE is configuredto reduce power applied to an antenna of the UE.

Clause 14. The system of any of the previous clauses, wherein toterminate the first preliminary communication link, the UE is configuredto move outside of a coverage area of the network.

Clause 15. The system of any of the previous clauses, wherein toterminate the first preliminary communication link, the UE is configuredto determine that the first preliminary communication link does notsatisfy a connectivity threshold.

Clause 16. The system of any of the previous clauses, wherein toterminate the first preliminary communication link, the UE is configuredto communicate a detach request to the communication system.

Clause 17. The system of any of the previous clauses, wherein toterminate the first preliminary communication link, the UE is configuredto receive a detach request from the communication system.

Clause 18. The system of any of the previous clauses, wherein the firstbroadcast signal includes at least one of a master information block(MIB) or a system information block (SIB).

Clause 19. The system of any of the previous clauses, wherein thenetwork is a mobile cellular network, and wherein the communicationsystem comprises a mobile cellular network communication system thatindependently provides the mobile cellular network to a coverage area inwhich the UE is located.

Clause 20. The system of any of the previous clauses, wherein thecommunication system independently provides the network within a coveredarea without communication to another communication system.

Clause 21. The system of any of the previous clauses, wherein thecommunication system comprises a mobile cellular network (MCN)communication system, wherein the first primary communication linkcommunicatively couples the UE to the MCN communication system, andwherein the second primary communication link communicatively couplesthe UE to the MCN communication system.

Clause 22. The system of any of the previous clauses, wherein thecommunication system comprises a first mobile cellular network (MCN)communication system and a second MCN communication system, wherein thefirst primary communication link communicatively couples the UE to thefirst MCN communication system, and wherein the second primarycommunication link communicatively couples the UE to the second MCNcommunication system.

Clause 23. The system of any of the previous clauses, wherein thecommunication system is a base station.

Clause 24. The system of any of the previous clauses, wherein theplurality of identifiers are not generated by the communication system.

Clause 25. The system of any of the previous clauses, wherein theplurality of identifiers are generated by the communication system.

Clause 26. The system of any of the previous clauses, wherein the UE isfurther configured to, prior to terminating the first primarycommunication link, communicate over the first primary communicationlink using a temporary identifier generated by the communication system.

Clause 27. The system of any of the previous clauses, wherein the firstand second secondary communication links are established based at leastin part on a Random Access (RACH) procedure.

Clause 28. The system of any of the previous clauses, wherein the firstand second secondary communication links enable communications betweenthe UE and the communication system.

Clause 29. The system of any of the previous clauses, wherein the firstand second secondary communication links do not enable communicationsbetween the UE and other UE accessible via the network.

Clause 30. The system of any of the previous clauses, wherein the firstand second primary communication links enable communications between theUE and other UE accessible via the network.

Clause 31. The system of any of the previous clauses, wherein the UE isfurther configured to receive the plurality of identifiers from a systemother than the communication system.

Clause 32. The system of any of the previous clauses, wherein the UE isfurther configured to receive the plurality of identifiers from thecommunication system.

Example Embodiments

Various example embodiments of the disclosure can be described in viewof the following Clauses:

Clause 1. A method for establishing a communication link with acommunication system, the method comprising:

based at least in part on a connection policy, scanning one or morefrequency bands for broadcast signals;

selecting, from a plurality of identifiers stored by the UE, a secondidentifier; and

communicating a request for a second primary communication link with acommunication system, wherein the request for the second primarycommunication link includes the second identifier, and wherein toestablish the second primary communication link, the communicationsystem uses the second identifier to authenticate the UE for a networkassociated with the communication system,

wherein a first primary communication link is established based at leastin part on the communication system receiving, from the UE, a requestfor the first primary communication link that includes a firstidentifier of the plurality of identifiers stored by the UE andauthenticating the UE for the network associated with the communicationsystem using the first identifier.

Clause 2. The method of Clause 1, wherein the method further comprises,terminating the first primary communication link with the communicationsystem.

Clause 3. The method of Clause 2, wherein said terminating is based atleast in part on the connection policy.

Clause 4. The method of any of the previous clauses, further comprisingreceiving at the UE, a first broadcast signal from the communicationsystem.

Clause 5. The method of Clause 4, wherein said selecting is based atleast in part on said receiving the first broadcast signal.

Clause 6. The method of any of Clauses 4 or 5, further comprisingcommunicating a request for a first secondary communication link withthe communication system based at least in part on the first broadcastsignal.

Clause 7. The method of any of Clauses 4-6, wherein said communicating arequest for a second primary communication link with a communicationsystem is based at least in part on the first secondary communicationlink being established.

Clause 8. The method of Clause 4, wherein the first broadcast signalincludes at least one of a master information block (MIB) or a systeminformation block (SIB).

Clause 9. The method of any of the previous clauses, wherein eachidentifier of the plurality of identifiers corresponds to a differentInternational Mobile Subscriber Identity (IMSI).

Clause 10. The method of any of the previous clauses, wherein theplurality of identifiers are stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE.

Clause 11. The method of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a determination that the first primary communication link does notsatisfy a connectivity threshold.

Clause 12. The method of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a determination that the first primary communication link has beenestablished for a predetermined period of time.

Clause 13. The method of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a number of communications over the first primary communication link.

Clause 14. The method of any of the previous clauses 3, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a determination that a number of communications over the firstprimary communication link satisfies a communications threshold.

Clause 15. The method of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a location of the UE.

Clause 16. The method of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a determination that the location of the UE does not satisfy alocation threshold associated with a coverage area of the network.

Clause 17. The method of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a power status of the UE.

Clause 18. The method of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a power status of the UE.

Clause 19. The method of any of the previous clauses, wherein the UE isconfigured to include an insertable subscriber identity module (SIM)card, wherein the connection policy indicates to terminate a firstprimary communication link and/or scan the one or more frequency bandsbased at least in part on a determination that the UE does not includethe SIM card.

Clause 20. The method of any of the previous clauses, further comprisingterminating a first preliminary communication link, wherein saidterminating the first preliminary communication link comprises reducingpower applied to an antenna of the UE.

Clause 21. The method of any of the previous clauses, further comprisingterminating a first preliminary communication link, wherein saidterminating the first preliminary communication link comprises movingthe UE outside of a coverage area of the network.

Clause 22. The method of any of the previous clauses, further comprisingterminating a first preliminary communication link, wherein saidterminating the first preliminary communication link comprisesdetermining that the first preliminary communication link does notsatisfy a connectivity threshold.

Clause 23. The method of any of the previous clauses, further comprisingterminating a first preliminary communication link, wherein saidterminating the first preliminary communication link comprisescommunicating a detach request to the communication system.

Clause 24. The method of any of the previous clauses, further comprisingterminating a first preliminary communication link, wherein saidterminating the first preliminary communication link comprises receivinga detach request from the communication system.

Clause 25. The method of any of the previous clauses, wherein thenetwork is a mobile cellular network, and wherein the communicationsystem comprises a mobile cellular network communication system thatindependently provides the mobile cellular network to a coverage area inwhich the UE is located.

Clause 26. The method of any of the previous clauses, wherein thecommunication system independently provides the network within a coveredarea without communication to another communication system.

Clause 27. The method of any of the previous clauses, wherein thecommunication system comprises a mobile cellular network (MCN)communication system, wherein the first primary communication linkcommunicatively couples the UE to the MCN communication system, andwherein the second primary communication link communicatively couplesthe UE to the MCN communication system.

Clause 28. The method of any of the previous clauses, wherein thecommunication system comprises a first mobile cellular network (MCN)communication system and a second MCN communication system, wherein thefirst primary communication link communicatively couples the UE to thefirst MCN communication system, and wherein the second primarycommunication link communicatively couples the UE to the second MCNcommunication system.

Clause 29. The method of any of the previous clauses, wherein thecommunication system is a base station.

Clause 30. The method of any of the previous clauses, wherein theplurality of identifiers are not generated by the communication system.

Clause 31. The method of any of the previous clauses, wherein theplurality of identifiers are generated by the communication system.

Clause 32. The method of any of the previous clauses, further comprisingprior to terminating a first primary communication link, communicatingover the first primary communication link using a temporary identifiergenerated by the communication system.

Clause 33. The method of any of the previous clauses, wherein first andsecond secondary communication links are established based at least inpart on a Random Access (RACH) procedure.

Clause 34. The method of Clause 33, wherein first and second secondarycommunication links enable communications between the UE and thecommunication system.

Clause 35. The method of any of Clauses 33 or 34, wherein the first andsecond secondary communication links do not enable communicationsbetween the UE and other UE accessible via the network.

Clause 36. The method of any of the previous clauses, wherein the firstand second primary communication links enable communications between theUE and other UE accessible via the network.

Clause 37. The method of any of the previous clauses, further comprisingreceiving the plurality of identifiers from a system other than thecommunication system.

Clause 38. The method of any of the previous clauses, further comprisingreceiving the plurality of identifiers from the communication system.

Clause 39. The method of any of the previous clauses, wherein the methodis performed by the UE while a location of the UE satisfies a locationthreshold associated with a coverage area of the network.

Example Embodiments

Various example embodiments of the disclosure can be described in viewof the following Clauses:

Clause 1. A system comprising:

a user equipment (UE) storing a plurality of identifiers and configuredto:

-   -   based at least in part on a connection policy, scan one or more        frequency bands for broadcast signals;    -   select, from a plurality of identifiers stored by the UE, a        second identifier; and    -   communicate a request for a second primary communication link        with a communication system, wherein the request for the second        primary communication link includes the second identifier, and        wherein to establish the second primary communication link, the        communication system uses the second identifier to authenticate        the UE for a network associated with the communication system,    -   wherein a first primary communication link is established based        at least in part on the communication system receiving, from the        UE, a request for the first primary communication link that        includes a first identifier of the plurality of identifiers        stored by the UE and authenticating the UE for the network        associated with the communication system using the first        identifier.

Clause 2. The system of Clause 1, wherein the UE is further configuredto terminate the first primary communication link with the communicationsystem.

Clause 3. The system of Clause 2, wherein to terminate the first primarycommunication link, the UE is configured terminate the first primarycommunication link based at least in part on the connection policy.

Clause 4. The system of any of the previous clauses, wherein the UE isfurther configured to receive at the UE, a first broadcast signal fromthe communication system.

Clause 5. The system of Clause 4, wherein to select the secondidentifier, the UE is configured to select the second identifier basedat least in part on the first broadcast signal.

Clause 6. The system of any of Clauses 4 or 5, wherein the UE is furtherconfigured to communicate a request for a first secondary communicationlink with the communication system based at least in part on the firstbroadcast signal.

Clause 7. The system of any of Clauses 4-6, wherein to communicate therequest for the second primary communication link, the UE is furtherconfigured to communicate the request for the second primarycommunication link based at least in part on the first secondarycommunication link being established.

Clause 8. The system of Clause 4, wherein the first broadcast signalincludes at least one of a master information block (MIB) or a systeminformation block (SIB).

Clause 9. The system of any of the previous clauses, wherein eachidentifier of the plurality of identifiers corresponds to a differentInternational Mobile Subscriber Identity (IMSI).

Clause 10. The system of any of the previous clauses, wherein theplurality of identifiers are stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE.

Clause 11. The system of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a determination that the first primary communication link does notsatisfy a connectivity threshold.

Clause 12. The system of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a determination that the first primary communication link has beenestablished for a predetermined period of time.

Clause 13. The system of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a number of communications over the first primary communication link.

Clause 14. The system of any of the previous clauses 3, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a determination that a number of communications over the firstprimary communication link satisfies a communications threshold.

Clause 15. The system of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a location of the UE.

Clause 16. The system of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a determination that the location of the UE does not satisfy alocation threshold associated with a coverage area of the network.

Clause 17. The system of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a power status of the UE.

Clause 18. The system of any of the previous clauses, wherein theconnection policy indicates to terminate a first primary communicationlink and/or scan the one or more frequency bands based at least in parton a power status of the UE.

Clause 19. The system of any of the previous clauses, wherein the UE isfurther configured to include an insertable subscriber identity module(SIM) card, wherein the connection policy indicates to terminate a firstprimary communication link and/or scan the one or more frequency bandsbased at least in part on a determination that the UE does not includethe SIM card.

Clause 20. The system of any of the previous clauses, wherein the UE isfurther configured to terminate a first preliminary communication linkby reducing power applied to an antenna of the UE.

Clause 21. The system of any of the previous clauses, wherein the UE isfurther configured to terminate a first preliminary communication linkby moving the UE outside of a coverage area of the network.

Clause 22. The system of any of the previous clauses, wherein the UE isfurther configured to terminate a first preliminary communication linkbased at least in part on a determination that the first preliminarycommunication link does not satisfy a connectivity threshold.

Clause 23. The system of any of the previous clauses, wherein the UE isfurther configured to terminate a first preliminary communication linkby communicating a detach request to the communication system.

Clause 24. The system of any of the previous clauses, wherein the UE isfurther configured to terminate a first preliminary communication linkbased at least in part on a detach request received from thecommunication system.

Clause 25. The system of any of the previous clauses, wherein thenetwork is a mobile cellular network, and wherein the communicationsystem comprises a mobile cellular network communication system thatindependently provides the mobile cellular network to a coverage area inwhich the UE is located.

Clause 26. The system of any of the previous clauses, wherein thecommunication system independently provides the network within a coveredarea without communication to another communication system.

Clause 27. The system of any of the previous clauses, wherein thecommunication system comprises a mobile cellular network (MCN)communication system, wherein the first primary communication linkcommunicatively couples the UE to the MCN communication system, andwherein the second primary communication link communicatively couplesthe UE to the MCN communication system.

Clause 28. The system of any of the previous clauses, wherein thecommunication system comprises a first mobile cellular network (MCN)communication system and a second MCN communication system, wherein thefirst primary communication link communicatively couples the UE to thefirst MCN communication system, and wherein the second primarycommunication link communicatively couples the UE to the second MCNcommunication system.

Clause 29. The system of any of the previous clauses, wherein thecommunication system is a base station.

Clause 30. The system of any of the previous clauses, wherein theplurality of identifiers are not generated by the communication system.

Clause 31. The system of any of the previous clauses, wherein theplurality of identifiers are generated by the communication system.

Clause 32. The system of any of the previous clauses, prior toterminating a first primary communication link, wherein the UE isfurther configured to communicate over the first primary communicationlink using a temporary identifier generated by the communication system.

Clause 33. The system of any of the previous clauses, wherein first andsecond secondary communication links are established based at least inpart on a Random Access (RACH) procedure.

Clause 34. The system of Clause 33, wherein first and second secondarycommunication links enable communications between the UE and thecommunication system.

Clause 35. The system of any of Clauses 33 or 34, wherein the first andsecond secondary communication links do not enable communicationsbetween the UE and other UE accessible via the network.

Clause 36. The system of any of the previous clauses, wherein the firstand second primary communication links enable communications between theUE and other UE accessible via the network.

Clause 37. The system of any of the previous clauses, wherein the UE isfurther configured to receive the plurality of identifiers from a systemother than the communication system.

Clause 38. The system of any of the previous clauses, wherein the UE isfurther configured to receive the plurality of identifiers from thecommunication system.

Example Embodiments

Various example embodiments of the disclosure can be described in viewof the following Clauses:

Clause 1. A method for establishing communication links with a userequipment (UE), the method comprising:

receiving, at a communication system and from the user equipment (UE), arequest for a first primary communication link, wherein the request forthe first primary communication link includes a first identifier from aplurality of identifiers stored by the UE;

authenticating the UE for a network based at least in part on the firstidentifier, wherein the first primary communication link is establishedbased at least in part on said authenticating the UE for the networkbased at least in part on the first identifier;

terminating the first primary communication link;

receiving, from the user equipment (UE) a request for a second primarycommunication link, wherein the request for the second primarycommunication link includes a second identifier from the plurality ofidentifiers stored by the UE; and

authenticating the UE for the network based at least in part on thesecond identifier, wherein the second primary communication link isestablished based at least in part on said authenticating the UE for thenetwork based at least in part on the second identifier.

Clause 2. The method of Clause 1, wherein said terminating is based atleast in part on a connection policy.

Clause 3. The method of any of the previous clauses, further comprisingcommunicating a first broadcast signal.

Clause 4. The method of Clause 3, wherein the first broadcast signalincludes at least one of a master information block (MIB) or a systeminformation block (SIB).

Clause 5. The method of any of the previous clauses, wherein eachidentifier of the plurality of identifiers corresponds to a differentInternational Mobile Subscriber Identity (IMSI).

Clause 6. The method of any of the previous clauses, wherein theplurality of identifiers are stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE.

Clause 7. The method of any of the previous clauses, wherein the networkis a mobile cellular network, and wherein the communication systemcomprises a mobile cellular network communication system thatindependently provides the mobile cellular network to a coverage area inwhich the UE is located.

Clause 8. The method of any of the previous clauses, wherein thecommunication system independently provides the network within a coveredarea without communication to another communication system.

Clause 9. The method of any of the previous clauses, wherein thecommunication system comprises a mobile cellular network (MCN)communication system, wherein the first primary communication linkcommunicatively couples the UE to the MCN communication system, andwherein the second primary communication link communicatively couplesthe UE to the MCN communication system.

Clause 10. The method of any of the previous clauses, wherein thecommunication system comprises a first mobile cellular network (MCN)communication system and a second MCN communication system, wherein thefirst primary communication link communicatively couples the UE to thefirst MCN communication system, and wherein the second primarycommunication link communicatively couples the UE to the second MCNcommunication system.

Clause 11. The method of any of the previous clauses, wherein thecommunication system is a base station.

Clause 12. The method of any of the previous clauses, wherein theplurality of identifiers are not generated by the communication system.

Clause 13. The method of any of the previous clauses, further comprisinggenerating the plurality of identifiers and communicating the pluralityof identifiers to the UE.

Clause 14. The method of any of the previous clauses, wherein first andsecond secondary communication links are established based at least inpart on a Random Access (RACH) procedure.

Clause 15. The method of Clause 15, wherein first and second secondarycommunication links enable communications between the UE and thecommunication system.

Clause 16. The method of any of Clauses 15 or 16, wherein the first andsecond secondary communication links do not enable communicationsbetween the UE and other UE accessible via the network.

Clause 17. The method of any of the previous clauses, wherein the firstand second primary communication links enable communications between theUE and other UE accessible via the network.

Example Embodiments

Various example embodiments of the disclosure can be described in viewof the following Clauses:

Clause 1. A system comprising:

a communication system configured to:

-   -   receive from a user equipment (UE) a request for a first primary        communication link, wherein the request for the first primary        communication link includes a first identifier from a plurality        of identifiers stored by the UE;    -   authenticate the UE for a network based at least in part on the        first identifier, wherein the first primary communication link        is established based at least in part on said authenticating the        UE for the network based at least in part on the first        identifier;    -   terminate the first primary communication link;    -   receive, from the user equipment (UE) a request for a second        primary communication link, wherein the request for the second        primary communication link includes a second identifier from the        plurality of identifiers stored by the UE; and    -   authenticate the UE for the network based at least in part on        the second identifier, wherein the second primary communication        link is established based at least in part on said        authenticating the UE for the network based at least in part on        the second identifier.

Clause 2. The system of Clause 1, wherein the communication system isconfigured to terminate the first primary communication link based atleast in part on a connection policy.

Clause 3. The system of any of the previous clauses, wherein thecommunication system is further configured to communicate a firstbroadcast signal.

Clause 4. The system of Clause 3, wherein the first broadcast signalincludes at least one of a master information block (MIB) or a systeminformation block (SIB).

Clause 5. The system of any of the previous clauses, wherein eachidentifier of the plurality of identifiers corresponds to a differentInternational Mobile Subscriber Identity (IMSI).

Clause 6. The system of any of the previous clauses, wherein theplurality of identifiers are stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE.

Clause 7. The system of any of the previous clauses, wherein the networkis a mobile cellular network, and wherein the communication systemcomprises a mobile cellular network communication system thatindependently provides the mobile cellular network to a coverage area inwhich the UE is located.

Clause 8. The system of any of the previous clauses, wherein thecommunication system independently provides the network within a coveredarea without communication to another communication system.

Clause 9. The system of any of the previous clauses, wherein thecommunication system comprises a mobile cellular network (MCN)communication system, wherein the first primary communication linkcommunicatively couples the UE to the MCN communication system, andwherein the second primary communication link communicatively couplesthe UE to the MCN communication system.

Clause 10. The system of any of the previous clauses, wherein thecommunication system comprises a first mobile cellular network (MCN)communication system and a second MCN communication system, wherein thefirst primary communication link communicatively couples the UE to thefirst MCN communication system, and wherein the second primarycommunication link communicatively couples the UE to the second MCNcommunication system.

Clause 11. The system of any of the previous clauses, wherein thecommunication system is a base station.

Clause 12. The system of any of the previous clauses, wherein theplurality of identifiers are not generated by the communication system.

Clause 13. The system of any of the previous clauses, wherein thecommunication system is configured to generate the plurality ofidentifiers and communicate the plurality of identifiers to the UE.

Clause 14. The system of any of the previous clauses, wherein first andsecond secondary communication links are established based at least inpart on a Random Access (RACH) procedure.

Clause 15. The system of Clause 14, wherein first and second secondarycommunication links enable communications between the UE and thecommunication system.

Clause 16. The system of any of Clauses 14 or 15, wherein the first andsecond secondary communication links do not enable communicationsbetween the UE and other UE accessible via the network.

Clause 17. The system of any of the previous clauses, wherein the firstand second primary communication links enable communications between theUE and other UE accessible via the network.

Example Embodiments

Various example embodiments of the disclosure can be described in viewof the following Clauses:

Clause 1. A method for communicating attach requests, the systemcomprising:

for a configurable period of time, successively initiating attachrequests, wherein initiating an attach request comprises:

receiving, at a user equipment (UE), one or more broadcast signalsbroadcast from a communication system;

communicating a request for a secondary communication link with thecommunication system;

identifying an identifier from a plurality of identifiers stored by theUE, wherein a different identifier is identified for each attachrequest; and

communicating an attach request to the communication system, wherein theattach request includes the identified identifier; and

initiating a detach from the communication system, wherein the detachterminates at least one of a secondary communication link with thecommunication system or a primary communication link with thecommunication system.

Clause 2. The method of Clause 1, wherein identifying the identifiercomprises generating the identifier.

Clause 3. The method of any of the previous clauses, wherein theconfigurable period of time corresponds to a threshold number ofinitiated attach requests.

Clause 4. The method of any of the previous clauses, wherein saidcommunicating the attach request is based at least in part on thesecondary communication link being established.

Clause 5. The method of any of the previous clauses, wherein the one ormore broadcast signals include at least one of a master informationblock (MIB) or a system information block (SIB).

Clause 6. The method of any of the previous clauses, wherein eachidentifier of the plurality of identifiers corresponds to a differentInternational Mobile Subscriber Identity (IMSI).

Clause 7. The method of any of the previous clauses, wherein theplurality of identifiers are stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE.

Clause 8. The method of any of the previous clauses, wherein saidinitiating the detach is based at least in part on a connection policy.

Clause 9. The method of Clause 8, wherein the connection policyindicates to terminate the primary communication link based at least inpart on a determination that the first primary communication link doesnot satisfy a connectivity threshold.

Clause 10. The method of any of Clauses 8 or 9, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a determination that the primary communication link hasbeen established for a predetermined period of time.

Clause 11. The method of any of Clauses 8-10, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a number of communications over the primarycommunication link.

Clause 12. The method of any of Clauses 8-11, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a determination that a number of communications overthe primary communication link satisfies a communications threshold.

Clause 13. The method of any of Clauses 8-12 wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a location of the UE.

Clause 14. The method of any of Clauses 8-13, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a determination that the location of the UE does notsatisfy a location threshold associated with a coverage area of thenetwork.

Clause 15. The method of any of Clauses 8-14, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a power status of the UE.

Clause 16. The method of any of Clauses 8-15, wherein the UE isconfigured to include an insertable subscriber identity module (SIM)card, wherein the connection policy indicates to terminate the primarycommunication link based at least in part on a determination that the UEdoes not include the SIM card.

Clause 17. The method of any of the previous clauses, wherein saidinitiating the detach comprising reducing power applied to an antenna ofthe UE.

Clause 18. The method of any of the previous clauses, wherein saidinitiating the detach comprising moving the UE outside of a coveragearea of the network.

Clause 19. The method of any of the previous clauses, wherein saidinitiating the detach comprising determining that the first preliminarycommunication link does not satisfy a connectivity threshold.

Clause 20. The method of any of the previous clauses, wherein saidinitiating the detach comprising communicating a detach request to thecommunication system.

Clause 21. The method of any of the previous clauses, wherein saidinitiating the detach comprising receiving a detach request from thecommunication system.

Clause 22. The method of any of the previous clauses, wherein thenetwork is a mobile cellular network, and wherein the communicationsystem comprises a mobile cellular network communication system thatindependently provides the mobile cellular network to a coverage area inwhich the UE is located.

Clause 23. The method of any of the previous clauses, wherein thecommunication system independently provides the network within a coveredarea without communication to another communication system.

Clause 24. The method of any of the previous clauses, wherein thecommunication system is a base station.

Clause 25. The method of any of the previous clauses, wherein theplurality of identifiers are not generated by the communication system.

Clause 26. The method of any of the previous clauses, wherein theplurality of identifiers are generated by the communication system.

Clause 27. The method of any of the previous clauses, further comprisingprior to terminating a primary communication link, communicating overthe primary communication link using a temporary identifier generated bythe communication system.

Clause 28. The method of any of the previous clauses, wherein secondarycommunication links are established based at least in part on a RandomAccess (RACH) procedure.

Clause 29. The method of Clause 28, wherein secondary communicationlinks enable communications between the UE and the communication system.

Clause 30. The method of any of Clauses 28 or 29, wherein secondarycommunication links do not enable communications between the UE andother UE accessible via the network.

Clause 31. The method of any of the previous clauses, wherein primarycommunication links enable communications between the UE and other UEaccessible via the network.

Clause 32. The method of any of the previous clauses, further comprisingreceiving the plurality of identifiers from a system other than thecommunication system.

Clause 33. The method of any of the previous clauses, further comprisingreceiving the plurality of identifiers from the communication system.

Clause 34. The method of any of the previous clauses, wherein the methodis performed by the UE while a location of the UE satisfies a locationthreshold associated with a coverage area of the network.

Example Embodiments

Various example embodiments of the disclosure can be described in viewof the following Clauses:

Clause 1. A system comprising:

a user equipment (UE) configured to:

-   -   for a configurable period of time, successively initiate attach        requests, wherein to initiate an attach request, the UE is        configured to:        -   receive one or more broadcast signals broadcast from a            communication system;        -   communicate a request for a secondary communication link            with the communication system;        -   identify an identifier from a plurality of identifiers            stored by the UE, wherein a different identifier is            identified for each attach request; and        -   communicating an attach request to the communication system,            wherein the attach request includes the identified            identifier; and        -   initiate a detach from the communication system, wherein the            detach terminates at least one of a secondary communication            link with the communication system or a primary            communication link with the communication system.

Clause 2. The system of Clause 1, wherein to identify the identifier,the UE is configured to generate the identifier.

Clause 3. The system of any of the previous clauses, wherein theconfigurable period of time corresponds to a threshold number ofinitiated attach requests.

Clause 4. The system of any of the previous clauses, wherein tocommunicate the attach request, the UE is configured to communicate theattach request based at least in part on the secondary communicationlink being established.

Clause 5. The system of any of the previous clauses, wherein the one ormore broadcast signals include at least one of a master informationblock (MIB) or a system information block (SIB).

Clause 6. The system of any of the previous clauses, wherein eachidentifier of the plurality of identifiers corresponds to a differentInternational Mobile Subscriber Identity (IMSI).

Clause 7. The system of any of the previous clauses, wherein theplurality of identifiers are stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE.

Clause 8. The system of any of the previous clauses, wherein to initiatethe detach, the UE is configured to initiate the detach based at leastin part on a connection policy.

Clause 9. The system of Clause 8, wherein the connection policyindicates to terminate the primary communication link based at least inpart on a determination that the first primary communication link doesnot satisfy a connectivity threshold.

Clause 10. The system of any of Clauses 8 or 9, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a determination that the primary communication link hasbeen established for a predetermined period of time.

Clause 11. The system of any of Clauses 8-10, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a number of communications over the primarycommunication link.

Clause 12. The system of any of Clauses 8-11, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a determination that a number of communications overthe primary communication link satisfies a communications threshold.

Clause 13. The system of any of Clauses 8-12 wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a location of the UE.

Clause 14. The system of any of Clauses 8-13, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a determination that the location of the UE does notsatisfy a location threshold associated with a coverage area of thenetwork.

Clause 15. The system of any of Clauses 8-14, wherein the connectionpolicy indicates to terminate the primary communication link based atleast in part on a power status of the UE.

Clause 16. The system of any of Clauses 8-15, wherein the UE is furtherconfigured to include an insertable subscriber identity module (SIM)card, wherein the connection policy indicates to terminate the primarycommunication link based at least in part on a determination that the UEdoes not include the SIM card.

Clause 17. The system of any of the previous clauses, wherein toinitiate the detach, the UE is configured to reduce power applied to anantenna of the UE.

Clause 18. The system of any of the previous clauses, wherein toinitiate the detach, the UE is configured to move the UE outside of acoverage area of the network.

Clause 19. The system of any of the previous clauses, wherein toinitiate the detach, the UE is configured to determine that the firstpreliminary communication link does not satisfy a connectivitythreshold.

Clause 20. The system of any of the previous clauses, wherein toinitiate the detach, the UE is configured to communicate a detachrequest to the communication system.

Clause 21. The system of any of the previous clauses, wherein toinitiate the detach, the UE is configured to receive a detach requestfrom the communication system.

Clause 22. The system of any of the previous clauses, wherein thenetwork is a mobile cellular network, and wherein the communicationsystem comprises a mobile cellular network communication system thatindependently provides the mobile cellular network to a coverage area inwhich the UE is located.

Clause 23. The system of any of the previous clauses, wherein thecommunication system independently provides the network within a coveredarea without communication to another communication system.

Clause 24. The system of any of the previous clauses, wherein thecommunication system is a base station.

Clause 25. The system of any of the previous clauses, wherein theplurality of identifiers are not generated by the communication system.

Clause 26. The system of any of the previous clauses, wherein theplurality of identifiers are generated by the communication system.

Clause 27. The system of any of the previous clauses, wherein the UE isfurther configured to, prior to terminating a primary communicationlink, communicate over the primary communication link using a temporaryidentifier generated by the communication system.

Clause 28. The system of any of the previous clauses, wherein secondarycommunication links are established based at least in part on a RandomAccess (RACH) procedure.

Clause 29. The system of Clause 28, wherein secondary communicationlinks enable communications between the UE and the communication system.

Clause 30. The system of any of Clauses 28 or 29, wherein secondarycommunication links do not enable communications between the UE andother UE accessible via the network.

Clause 31. The system of any of the previous clauses, wherein primarycommunication links enable communications between the UE and other UEaccessible via the network.

Clause 32. The system of any of the previous clauses, wherein the UE isfurther configured to receive the plurality of identifiers from a systemother than the communication system.

Clause 33. The system of any of the previous clauses, wherein the UE isfurther configured to receive the plurality of identifiers from thecommunication system.

Terminology

Conditional language, such as, among others, “can,” “could,” “might,” or“may,” unless specifically stated otherwise, or otherwise understoodwithin the context as used, is generally intended to convey that certainembodiments include, while other embodiments do not include, certainfeatures, elements, and/or steps. Thus, such conditional language is notgenerally intended to imply that features, elements and/or steps are inany way required for one or more embodiments or that one or moreembodiments necessarily include logic for deciding, with or without userinput or prompting, whether these features, elements and/or steps areincluded or are to be performed in any particular embodiment.

The terms “comprising,” “including,” “having,” and the like aresynonymous and are used inclusively, in an open-ended fashion, and donot exclude additional elements, features, acts, operations, and soforth. Also, the term “or” is used in its inclusive sense (and not inits exclusive sense) so that when used, for example, to connect a listof elements, the term “or” means one, some, or all of the elements inthe list. Likewise the term “and/or” in reference to a list of two ormore items, covers all of the following interpretations of the word: anyone of the items in the list, all of the items in the list, and anycombination of the items in the list. Further, the term “each,” as usedherein, in addition to having its ordinary meaning, can mean any subsetof a set of elements to which the term “each” is applied. Additionally,the words “herein,” “above,” “below,” and words of similar import, whenused in this application, refer to this application as a whole and notto any particular portions of this application.

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense, as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” As used herein, the terms “connected,”“coupled,” or any variant thereof means any connection or coupling,either direct or indirect, between two or more elements; the coupling orconnection between the elements can be physical, logical, or acombination thereof. Additionally, the words “herein,” “above,” “below,”and words of similar import, when used in this application, refer tothis application as a whole and not to any particular portions of thisapplication. Where the context permits, words in the above DetailedDescription using the singular or plural number may also include theplural or singular number respectively. The word “or” in reference to alist of two or more items, covers all of the following interpretationsof the word: any one of the items in the list, all of the items in thelist, and any combination of the items in the list. Likewise the term“and/or” in reference to a list of two or more items, covers all of thefollowing interpretations of the word: any one of the items in the list,all of the items in the list, and any combination of the items in thelist.

Depending on the embodiment, certain operations, acts, events, orfunctions of any of the algorithms described herein can be performed ina different sequence, can be added, merged, or left out altogether(non-limiting example: not all are necessary for the practice of thealgorithms). Moreover, in certain embodiments, operations, acts,functions, or events can be performed concurrently, e.g., throughmulti-threaded processing, interrupt processing, or multiple processorsor processor cores or on other parallel architectures, rather thansequentially.

The various illustrative logical blocks, modules, routines, andalgorithm steps described in connection with the embodiments disclosedherein can be implemented as electronic hardware, or as a combination ofelectronic hardware and executable software. To clearly illustrate thisinterchangeability, various illustrative components, blocks, modules,and steps have been described above generally in terms of theirfunctionality. Whether such functionality is implemented as hardware, oras software that runs on hardware, depends upon the particularapplication and design constraints imposed on the overall system. Thedescribed functionality can be implemented in varying ways for eachparticular application, but such implementation decisions should not beinterpreted as causing a departure from the scope of the disclosure.

Moreover, the various illustrative logical blocks and modules describedin connection with the embodiments disclosed herein can be implementedor performed by a machine, such as a processor device, a digital signalprocessor (DSP), an application specific integrated circuit (ASIC), afield programmable gate array (FPGA) or other programmable logic device,discrete gate or transistor logic, discrete hardware components, or anycombination thereof designed to perform the functions described herein.A processor device can be a microprocessor, but in the alternative, theprocessor device can be a controller, microcontroller, or combinationsof the same, or the like. A processor device can include electricalcircuitry configured to process computer-executable instructions. Inanother embodiment, a processor device includes an FPGA or otherprogrammable device that performs logic operations without processingcomputer-executable instructions. A processor device can also beimplemented as a combination of computing devices, e.g., a combinationof a DSP and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DSP core, or any other suchconfiguration. Although described herein primarily with respect todigital technology, a processor device may also include primarily analogcomponents. For example, some or all of the signal processing algorithmsdescribed herein may be implemented in analog circuitry or mixed analogand digital circuitry. A computing environment can include any type ofcomputer system, including, but not limited to, a computer system basedat least in part on a microprocessor, a mainframe computer, a digitalsignal processor, a portable computing device, a device controller, or acomputational engine within an appliance, to name a few.

The elements of a method, process, routine, or algorithm described inconnection with the embodiments disclosed herein can be embodieddirectly in hardware, in a software module executed by a processordevice, or in a combination of the two. A software module can reside inRAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory,registers, hard disk, a removable disk, a CD-ROM, or any other form of anon-transitory computer-readable storage medium. An exemplary storagemedium can be coupled to the processor device such that the processordevice can read information from, and write information to, the storagemedium. In the alternative, the storage medium can be integral to theprocessor device. The processor device and the storage medium can residein an ASIC. The ASIC can reside in a user terminal. In the alternative,the processor device and the storage medium can reside as discretecomponents in a user terminal.

Further, the processing of the various components of the illustratedsystems can be distributed across multiple machines, networks, and othercomputing resources. In addition, two or more components of a system canbe combined into fewer components. Various components of the illustratedsystems can be implemented in one or more virtual machines, rather thanin dedicated computer hardware systems and/or computing devices.

Any patents and applications and other references noted above, includingany that may be listed in accompanying filing papers, are incorporatedherein by reference. Aspects of the invention can be modified, ifnecessary, to employ the systems, functions, and concepts of the variousreferences described above to provide yet further implementations of theinvention.

These and other changes can be made to the invention in light of theabove Detailed Description. While the above description describescertain examples of the invention, and describes the best modecontemplated, no matter how detailed the above appears in text, theinvention can be practiced in many ways. Details of the system may varyconsiderably in its specific implementation, while still beingencompassed by the invention disclosed herein. As noted above,particular terminology used when describing certain features or aspectsof the invention should not be taken to imply that the terminology isbeing redefined herein to be restricted to any specific characteristics,features, or aspects of the invention with which that terminology isassociated. In general, the terms used in the following claims shouldnot be construed to limit the invention to the specific examplesdisclosed in the specification, unless the above Detailed Descriptionsection explicitly defines such terms. Accordingly, the actual scope ofthe invention encompasses not only the disclosed examples, but also allequivalent ways of practicing or implementing the invention under theclaims.

To reduce the number of claims, certain aspects of the invention arepresented below in certain claim forms, but the applicant contemplatesthe various aspects of the invention in any number of claim forms. Forexample, while only one aspect of the invention may be recited as ameans-plus-function claim under 35 U.S.C. sec. 112(f) (AIA), otheraspects may likewise be embodied as a means-plus-function claim, or inother forms, such as being embodied in a computer-readable medium. Anyclaims intended to be treated under 35 U.S.C. § 112(f) will begin withthe words “means for”, but use of the term “for” in any other context isnot intended to invoke treatment under 35 U.S.C. § 112(f). Accordingly,the applicant reserves the right to pursue additional claims afterfiling this application, in either this application or in a continuingapplication.

Disjunctive language such as the phrase “at least one of X, Y, or Z,”unless specifically stated otherwise, is otherwise understood with thecontext as used in general to present that an item, term, etc., may beeither X, Y, or Z, or any combination thereof (non-limiting examples: X,Y, and/or Z). Thus, such disjunctive language is not generally intendedto, and should not, imply that certain embodiments require at least oneof X, at least one of Y, or at least one of Z to each be present.

Unless otherwise explicitly stated, articles such as “a” or “an” shouldgenerally be interpreted to include one or more described items.Accordingly, phrases such as “a device configured to” are intended toinclude one or more recited devices. Such one or more recited devicescan also be collectively configured to carry out the stated recitations.For example, “a processor configured to carry out recitations A, B andC” can include a first processor configured to carry out recitation Aworking in conjunction with a second processor configured to carry outrecitations B and C.

While the above detailed description has shown, described, and pointedout novel features as applied to various embodiments, it can beunderstood that various omissions, substitutions, and changes in theform and details of the devices or algorithms illustrated can be madewithout departing from the spirit of the disclosure. As can berecognized, certain embodiments described herein can be embodied withina form that does not provide all of the features and benefits set forthherein, as some features can be used or practiced separately fromothers. The scope of certain embodiments disclosed herein is indicatedby the appended claims rather than by the foregoing description. Allchanges which come within the meaning and range of equivalency of theclaims are to be embraced within their scope.

What is claimed is:
 1. A method for establishing communication linkswith a communication system, the method comprising: scanning one or morefrequency bands for broadcast signals; receiving at a user equipment(UE), a first broadcast signal from a communication system;communicating a request to establish a first secondary communicationlink with the communication system based at least in part on the firstbroadcast signal; based at least in part on the first secondarycommunication link being established, communicating a request toestablish a first primary communication link with the communicationsystem, wherein the request to establish the first primary communicationlink includes a first identifier from a plurality of identifiers storedby the UE, and wherein to establish the first primary communicationlink, the communication system is configured to use the first identifierto authenticate the UE for a network associated with the communicationsystem; after the first primary communication link is established andbased at least in part on a connection policy, actively terminating thefirst primary communication link, wherein the connection policyindicates to actively terminate the first primary communication linkbased at least in part on at least one of a time-based schedule, acommunication-based schedule or a connectivity threshold; scanning theone or more frequency bands for broadcast signals; receiving at the UE asecond broadcast signal from the communication system; communicating arequest to establish a second secondary communication link with thecommunication system based at least in part on the second broadcastsignal; based at least in part on the connection policy, identifying asecond identifier from the plurality of identifiers stored by the UE,wherein the second identifier is different from the first identifier;and based at least in part on the second secondary communication linkbeing established, communicating a request to establish a second primarycommunication link with the communication system, wherein the request toestablish the second primary communication link includes the secondidentifier, and wherein to establish the second primary communicationlink, the communication system is configured to use the secondidentifier without using the first identifier to authenticate the UE forthe network associated with the communication system, wherein thecommunication system uses the first identifier during a first timeperiod to establish the first primary communication link and uses thesecond identifier during a second time period to establish the secondprimary communication link, wherein the second time period is after thefirst time period.
 2. A method for establishing a communication linkwith a communication system, the method comprising: after a firstprimary communication link is established with a communication systemand based at least in part on a connection policy, actively terminatingthe first primary communication link and scanning one or more frequencybands for broadcast signals, wherein the connection policy indicates toactively terminate the first primary communication link based at leastin part on at least one of a time-based schedule, a communication-basedschedule or a connectivity threshold; based at least in part on theconnection policy, selecting, from a plurality of identifiers stored bya user equipment (UE), a second identifier; and based at least in parton a second secondary communication link being established,communicating a request for a second primary communication link with thecommunication system, wherein the request for the second primarycommunication link includes the second identifier, and wherein toestablish the second primary communication link, the communicationsystem uses the second identifier without using a first identifier ofthe plurality of identifiers to authenticate the UE for a networkassociated with the communication system, wherein prior to establishingthe second primary communication link, the communication systemestablishes the first primary communication link based at least in parton a first secondary communication link being established and thecommunication system receiving, from the UE, a request for the firstprimary communication link that includes the first identifier andauthenticating the UE for the network associated with the communicationsystem using the first identifier.
 3. The method of claim 2, whereineach identifier of the plurality of identifiers corresponds to adifferent International Mobile Subscriber Identity (IMSI).
 4. The methodof claim 2, wherein each identifier of the plurality of identifiers isgenerated by the UE.
 5. The method of claim 2, wherein said activelyterminating the first primary communication link occurs prior to saidcommunicating the request for the second primary communication link. 6.The method of claim 2, wherein the first and second primarycommunication links enable communications between the UE and other UEaccessible via the network.
 7. The method of claim 2, wherein theplurality of identifiers is stored in a location other than in aninsertable subscriber identity module (SIM) card embedded in the UE. 8.The method of claim 2, wherein the connection policy indicates to scanthe one or more frequency bands based at least in part on adetermination that the first primary communication link does not satisfythe connectivity threshold.
 9. The method of claim 2, wherein thenetwork associated with the communication system is a mobile cellularnetwork, and wherein the communication system comprises a mobilecellular network communication system that independently provides themobile cellular network to a coverage area in which the UE is located.10. The method of claim 2, wherein the communication systemindependently provides the network within a coverage area withoutcommunication to another communication system.
 11. The method of claim2, wherein the communication system comprises a mobile cellular network(MCN) communication system, wherein the first primary communication linkcommunicatively couples the UE to the MCN communication system, andwherein the second primary communication link communicatively couplesthe UE to the MCN communication system.
 12. The method of claim 2,wherein the communication system comprises a first mobile cellularnetwork (MCN) communication system and a second MCN communicationsystem, wherein the first primary communication link communicativelycouples the UE to the first MCN communication system, and wherein thesecond primary communication link communicatively couples the UE to thesecond MCN communication system.
 13. The method of claim 2, furthercomprising communicating a request for the second secondarycommunication link with the communication system based at least in parton a broadcast signal received from the communication system.
 14. Themethod of claim 2, wherein the second secondary communication link isestablished based at least in part on a Random Access (RACH) procedure.15. The method of claim 2, wherein the second secondary communicationlink enables communications between the UE and the communication system.16. The method of claim 2, wherein the second secondary communicationlink does not enable communications between the UE and other UEaccessible via the network.
 17. A mobile communication device comprisingone or more processors configured to: after a first primarycommunication link is established with a communication system and basedat least in part on a connection policy, actively terminate the firstprimary communication link and scan one or more frequency bands forbroadcast signals, wherein the connection policy indicates to activelyterminate the first primary communication link based at least in part onat least one of a time-based schedule, a communication-based schedule ora connectivity threshold; based at least in part on the connectionpolicy, select, from a plurality of identifiers stored by a userequipment (UE), a second identifier; and based at least in part on asecond secondary communication link being established, communicate arequest for a second primary communication link with the communicationsystem, wherein the request for the second primary communication linkincludes the second identifier, and wherein to establish the secondprimary communication link, the communication system uses the secondidentifier without using a first identifier of the plurality ofidentifiers to authenticate the UE for a network associated with thecommunication system, wherein prior to establishing the second primarycommunication link, the communication system establishes the firstprimary communication link based at least in part on a first secondarycommunication link being established and the communication systemreceiving, from the UE, a request for the first primary communicationlink that includes the first identifier and authenticating the UE forthe network associated with the communication system using the firstidentifier.
 18. The mobile communication device of claim 17, whereineach identifier of the plurality of identifiers corresponds to adifferent International Mobile Subscriber Identity (IMSI).
 19. Themobile communication device of claim 17, wherein the one or moreprocessors are further configured to generate each of the plurality ofidentifiers.