Automatic wireless service activation in a private local wireless service

ABSTRACT

A secondary Ethernet-like wireless communication system overlapped by a dominant Ethernet-like wireless communication system, and including radio access and communication for activation, association, and authentication of a wireless device in the secondary Ethernet-like wireless communication system. An automated private service activation (APSA) port is used for accepting access and communication requests of a wireless device seeking activation, association and authentication in the secondary Ethernet-like wireless communication system. The APSA port provides an access and communication channel for radiating signals at a level exceeding a signal level of the access and communication channel only within limited spatial constraints. In addition the APSA port provides space for receiving the wireless device for activation and communication in the secondary Ethernet-like wireless communication system.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.11/504,932, filed Aug. 16, 2006 now U.S. Pat. No. 7,869,791, entitled,“AUTOMATIC WIRELESS SERVICE ACTIVATION IN A PRIVATE LOCAL WIRELESSSERVICE” which is currently allowed and is a continuation of U.S. patentapplication Ser. No. 10/657,542 filed on Sep. 8, 2003 (now U.S. Pat. No.7,103,347), entitled, “AUTOMATIC WIRELESS SERVICE ACTIVATION IN APRIVATE LOCAL WIRELESS SERVICE”, which is a continuation of U.S. patentapplication Ser. No. 09/612,802 filed on Jul. 10, 2000 (now U.S. Pat.No. 6,643,504), entitled “AUTOMATIC WIRELESS SERVICE ACTIVATION IN APRIVATE LOCAL WIRELESS SYSTEM” Each of the above applications is hereinincorporated by reference in its entirety.

FIELD

The present embodiments relate generally to the problem of activatingservice for a wireless telephone or other device in an Ethernet-likewireless communication system other than the Ethernet-like wirelesscommunication system for which the wireless device is in normalsubscription with that can coexist with the dominant Ethernet-likewireless communication system. In a particular aspect it concernsactivation of a wireless telephone or other device to operate in a localor secondary Ethernet-like wireless system, overlapped by a dominant orprimary Ethernet-like wireless communication system. Activation in aprivate or secondary wireless system for a permanent or a limited-timeduration is considered. The original embodiments specifically relates toa first time activation of digital wireless/mobile telephones, whereinthe wireless system may be cellular, PCN, PCS, or a similar mobile radiosystem. The embodiment in herein extended to Ethernet and IP-based radiosystem.

BACKGROUND

A wireless Ethernet associated device typically needs to be activatedbefore it can operate in particular Ethernet-like wireless communicationsystem. Normally this process is required only since subsequent uses ofthe wireless device in that system is already authorized. Access indifferent systems is generally only based on agreements betweendifferent systems and access to databases to verify the legitimacy ofthe wireless device operating out of its home territory.

There are a large number of localized and/or private Ethernet-likewireless communication systems which are not part of contractualarrangements and may indeed operate within a territory already coveredor overlaid by other carriers including the home carrier of a wirelessdevice seeking use of a localized and/or private wireless system. Suchlocalized and/or private wireless systems operate at low signal levelscompared to outdoor macro cell systems. These localized and/or privatesystems are frequently found within buildings and on campus sites.

Service is granted by means of a Private System Identification (PSID)code entered into each wireless device requesting service from theprivate/local Ethernet-like wireless communication system. This PSIDcode is entered into the handset, which is requesting service. Thisprocess is cumbersome and time consuming.

There is a need for an automatic setup procedure, in part, is theability of the wireless device to connect to a secondary Ethernet-likecommunication system.

At present there is no way of automatically provisioning a wirelessdevice to a secondary wireless communication system in an area radiatedby a more powerful dominant wireless communication system.

The present embodiments meet these needs.

SUMMARY

The present embodiments relate to a secondary Ethernet-like wirelesscommunication system overlapped by a dominant Ethernet-like wirelesscommunication system, and including radio access and communication foractivation, association, and authentication of a wireless device in thesecondary Ethernet-like wireless communication system. The secondaryEthernet-like wireless communication system includes an automatedprivate service activation (APSA) port for accepting access andcommunication requests of a wireless device seeking activation,association and authentication in the secondary Ethernet-like wirelesscommunication system. The APSA port provides an access and communicationchannel for radiating signals at a level exceeding a signal level of theaccess and communication channel only within limited spatialconstraints; and providing space for receiving the wireless device foractivation and communication in the secondary Ethernet-like wirelesscommunication system.

The present embodiments additionally relate to a method of communicationfor achieving association, authentication and access, from a secondaryEthernet-like wireless communication system in a region overlapped by adominant Ethernet-like wireless communication system. The embodimentcreates access, association, and authentication in a signal space inwhich radiated access and communication signal levels of the secondaryEthernet-like wireless communication system within the signal spaceexceed access and communication signal levels of the dominantEthernet-like wireless communication system. The embodimentsadditionally position a wireless device seeking access, association, andauthentication and communication within the access and communicationsignal space and powering up the wireless device. The embodiment cansearch by the wireless device for the strongest channel. The embodimentcan additionally select the channel of the secondary Ethernet-likewireless communication system by reason of positioning of the wirelessdevice within the access and communication space. The embodiment finallyauthorizes, authenticates, and associates the wireless device foroperation within the secondary Ethernet-like wireless communicationsystem.

Yet another embodiment relates to activating and authenticating awireless device of a new user in a secondary Ethernet-like wirelesscommunication system in a region overlapped by a dominant Ethernet-likewireless communication system. The wireless device enables theactivating and authenticating within a limited sub-region of the regionoverlapped by a dominant Ethernet-like wireless communication system andwithin that sub-region including the steps of: providing accesscredentials from an Automatic Private Service Activation (APSA) unit ofthe secondary Ethernet-like system; and interact with a databasecontaining user credentials, user requested features, to provide arecord and enable service to the new user.

An embodiment of a secondary Ethernet-like wireless communication systemoverlapped by a dominant Ethernet-like wireless communication system,and including radio access and communication for activation,association, and authentication of a wireless device in the secondaryEthernet-like wireless communication system. The secondary Ethernet-likewireless communication system can include an internet/intranet-connecteddatabase including user lists and user features and characteristics andaccess and communications to individuals requesting service in thesecondary Ethernet-like wireless communication system. The system canallow the individuals to insert information concerning user credentialsand access and communication information in advance of implementingaccess, association, and communication requests. The system additionallycan include an automated private service activation (APSA) port foraccepting the access, association, and communication requests of awireless device seeking activation in the secondary Ethernet-likewireless communication system.

In another embodiment the activating, associating, and authenticating ofa wireless device in a secondary Ethernet-like wireless communicationsystem can be co-located with a primary Ethernet-like wirelesscommunication system. The method of co-locating can include masking thesignal strength associated with the primary Ethernet-like wirelesscommunication system; and coupling signals of the secondaryEthernet-like wireless communication system to the wireless deviceduring the masking.

An additional embodiment of accessing and achieving authentication froma secondary Ethernet-like wireless communication system in a regionoverlapped by a dominant Ethernet-like wireless communication system.The secondary Ethernet-like wireless communication system creates anaccess and communication signal space in which radiated access andcommunication signal levels of the secondary Ethernet-like wirelesscommunication system within the access and communication signal spaceexceed access and communication signal levels of the dominantEthernet-like wireless communication system. The system receives awireless device seeking access and communication to the secondaryEthernet-like wireless communication system within the access andcommunication signal space; receiving a search from the wireless devicefor a strongest channel. The system selects the channel of the secondaryEthernet-like wireless communication system by reason of the proximityof the wireless device within the access and communication space; andauthorizing and authenticating the wireless device for operation withinthe secondary Ethernet-like wireless communication system.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description will be better understood in conjunction withthe accompanying drawings as follows:

FIG. 1 is a block schematic of an illustrative service architecture ofan Ethernet-like wireless communication system, which may be a secondarysystem subject to ambient control signal radiation of an overlappingdominant system.

FIG. 2 is a flow chart of a process by which a wireless device accessesand is authenticated by the wireless communication system of FIG. 1.

FIG. 3 is a view of an antenna arrangement used for access in asecondary system.

FIG. 4 is a view of another antenna arrangement usable in theembodiments.

The present embodiments are detailed below with reference to the listedFigures.

DETAILED DESCRIPTION OF THE EMBODIMENTS

Before explaining the present embodiments in detail, it is to beunderstood that the embodiments are not limited to the particularembodiments and that they can be practiced or carried out in variousways.

The embodiments involve a secondary Ethernet-like wireless communicationsystem overlapped by a dominant Ethernet-like wireless communicationsystem, and includes radio access as well as communication foractivation, association, and authentication of a wireless device in thesecondary Ethernet-like wireless communication system.

More specifically the system includes an automated private serviceactivation (APSA) port for accepting access and communication requestsof the wireless device seeking activation, association andauthentication in the secondary Ethernet-like wireless communicationsystem. This APSA port provides an access and communication channel forradiating signals at a level exceeding a signal level of the access andcommunication channel within limited spatial constraints. The APSA portenables a space to exist, a geographical zone, for receiving thewireless device for activation and communication in the secondaryEthernet-like wireless communication system.

As an example, the secondary Ethernet-like wireless communication systemcan be an enterprise wireless LAN system and the dominant Ethernet-likewireless communication system can be a municipal system.

As used herein, the term “Ethernet-like” as the term is used hereinmeans a packet network which is capable of handling an Internet protocoland whose packets usually include an origination address and adestination address. This term also may include networks which utilizeheader compression with fixed session endpoints (e.g. VoIP telephony)wherein originating and terminating addresses are implicit inover-the-air transmissions, and are re-inserted at a wired Ethernetgateway.

Radio access, in this embodiment means completion of a communicationlink between a client device and networked radio system using a commonair interface, following application for service and presentation ofappropriate credentials to enable that service.

To further explain the embodiments, the communication for activation,association and authentication of the wireless device in the secondaryEthernet-like wireless communication system means that a wirelessdevice, such as a computer, personal data assistant, digital pager,wireless cell phone, or wireless LAN modem can perform the step ofexchanging information with an APSA to achieve activation, and in doingso, enable association with the secondary Ethernet-like wirelesscommunication network. Additionally, the wireless device can perform thestep of presenting information entitling it to service as a prelude toauthentication of the wireless device in the secondary Ethernet-likewireless communication system.

The following provides an example of this activation, association andauthentication. For a specific wireless device, a public municipalwireless LAN is the dominant communication system, and a privateenterprise wireless LAN is the secondary communication system. Havingentered an enterprise premises from outdoors, a user turns on his/herdevice and locates it within an APSA enclosure or designated area. Thewireless device receives the APSA signal and selects it preferentially(due to its high signal strength). It extracts system identificationinformation (e.g. SSID) from the APSA signal, and transmits anassociation request to the APSA. This is the first step of obtainingservice from a network that it does not primarily use. Next, is theauthentication step. The wireless device performs the step oftransmitting information regarding its identity (e.g. MAC address). Itmay also send, depending on the system implementation, otheridentification (e.g. access credentials enabling access to other radiosystems) as well information needed to begin an encrypted session. Thesecondary network may then interact with one or more databases (whichmay contain access privileges for both the primary and secondarysystems) to authenticate with the secondary system. The secondarysystem's database could be maintained by an employee of the enterprise(e.g. receptionist), and authentication could be allowed for a selectedperiod of time (e.g. one day), or for certain levels of service (e.g.incoming telephone calls only). The credentials and subsequentauthentication might also be used to charge the user's account for anyoutgoing calls to the primary system.

The APSA port is connected to the secondary wireless communicationsystem via Ethernet (in an example embodiment). This APSA port can bepart of a wireless LAN having digital communication channels whichoperates under the IEEE 802.11 standard or under the IEEE 802.16standard. Those skilled in the art will recognize that other radiostandards can also be used.

The APSA port acts as a base station or access point affiliated with thesecondary system, and may have additional firewall, virus, or otherprotections against misuse. As with other base stations or access pointsthat are members of the secondary network, it provides capability fordevices to both enter the system and communicate using it. However, theAPSA port illuminates only well-defined (usually small) area to minimizeinterception of signals beyond these limits and to produce high signallevels from the secondary network in the space with low transmittedpower.

By radiating the signals, APSA port creates a space in which theradiating signals can be received by the wireless device. This is a3-dimensional space that enables the wireless device to activate andcommunicate with the secondary system under controlled conditions. Thewireless device then associates and communicates with the secondaryEthernet-like wireless communication system within that spatiallylimited zone.

In an embodiment, the secondary Ethernet-like wireless communicationsystem can include a surface covering an antenna for abutting againstand communicating with the wireless device forming a communication zone,at a signal level sufficient to achieve access, association, andauthentication between the wireless device and the secondaryEthernet-like wireless communication system, while exceeding the signallevel of the overlapping dominant Ethernet-like wireless communicationsystem in the space abutting the wireless device. The term “abutting” inthis context refers to placement of the device in close proximity to theAPSA antenna (e.g. fractions of an inch to several inches).

In another embodiment, a surface covering an antenna for access andcommunication to a wireless device seeking access, association, andauthentication can be used with the secondary Ethernet-like wirelesscommunication system which provides shielding for blocking the signallevel of the overlapping dominant Ethernet-like wireless communicationsystem. RF shielding and absorbing materials for creating such anenvironment can be obtained from ETS-Lindgren and others, for example.

In still another embodiment, the secondary Ethernet-like wirelesscommunication system may include a system controller for providingdigital switching and service features connected to the APSA port via anEthernet interface.

For example, this system controller can be a server available from IBM,Gateway, Dell, and others for use with a secondary Ethernet-like system,such as the private enterprise system when the dominant Ethernet likesystem is a public municipal wireless system. This controller can act asan authenticator, handoff coordinator, service agent (e.g. VoIP) etc.connected to the APSA port to the secondary Ethernet-like wirelesssystem. The connection medium between the APSA, secondary Ethernet-likewireless system, and the server may be a wired Ethernet interface in animplementation.

In a similar embodiment, the secondary Ethernet-like wirelesscommunication system can include with the digital controller a NetworkService Platform (NSP) for providing specific service and managementfunctions. An example of an NSP-enabled function would be automaticfrequency and power assignment for a multi-access point network and aservice example would be location-determination of clients based on theserving access point.

In still another embodiment, it is contemplated to include a method forcommunicating which achieves association, authentication and access fora wireless device using a secondary Ethernet-like wireless communicationsystem in a region overlapped by a dominant Ethernet-like wirelesscommunication system.

This method involves creating access, association, and authentication ina signal space formed from a plurality of signals which radiate accessand communication from the secondary Ethernet-like wirelesscommunication system forming a space with signals that exceed the accessand communication signal levels of the dominant Ethernet-like wirelesscommunication system.

This space of strong signals of the secondary Ethernet-like wirelesssystem is formed by first positioning a wireless device that is seekingaccess, association, and authentication with the secondary Ethernet-likewireless system in the signal space and then powering up the wirelessdevice. The wireless device is then used to search for the strongestchannel within the signal space. Then of the multiple channels beingpresented in the signal space, the user and preferentially, or thewireless device can automatically, based on preset preferences, select achannel of the secondary Ethernet-like wireless communication systembecause the wireless device is positioned within the space which can bereferred to as the access and communication space of the secondaryEthernet-like wireless system. After the channel is selected,authorization, authentication, and association of the wireless devicewithin the secondary Ethernet-like wireless communication system canoccur.

The wireless device can thereby link to a private network while being inthe presence of a more-dominant network.

For example, a user, with a wireless personal digital assistant, like aBlackberry™ can walk into the front office of AT&T in San Antonio Tex.which has an exclusive private network. The receptionist at the AT&Toffice would ask the user, if he/she would like to have Internet accesswhile in the AT&T building which has a private Ethernet-like wirelesscommunication system, but the user can also access his own network fromthe same building.

In a usage example, a receptionist would take the user's wireless PDA,place it in a designated APSA enclosure, and then turn it on. Theenclosure could be similar in appearance to a microwave oven. Theprivate AT&T system would then request that the PDA transmit a device IDto begin the access, association and authentication process. Followingthe exchange, the device becomes an authorized user of the privateindoor AT&T system while in the building. In this example, the privatesystem would allow devices to communicate only with the secondaryEthernet-like wireless communication system, which in this example isthe AT&T private indoor system.

In the above example, the “microwave-like” device might have no door(for convenience) and be of a dimension that comfortably sits on a desk,about 15 inches long, 12 inches deep and 8 inches high. The interior ofthe device would consist a 5-sided shielded box with an antenna whichradiates an RF signal that can be used for authentication. Examples ofsuch signals would be commonly-used unlicensed wireless LAN frequenciessuch as 2.4 GHz or 5 GHz, however other frequencies can be used asappropriate for the specific application, consistent with thefrequencies employed by the primary and secondary access networks andassociated client radios.

This embodiment contemplates that if an unwanted potential user tries tobreak into the secondary Ethernet-like system via the APSA, thepotential unwanted user would be unable to use the system because theunwanted user's device is not communicating through the zone or space atthe receptionist's desk. That is, the unwanted user device may be ableto work outside (e.g. on the street) using the public wireless system,but not in the building because the device was not authenticated in theproper zone for new authentications. To give another example, anunwanted user may enter the building via another entrance (e.g. aloading dock), turn on his/her device, but can not log onto the indoorprivate system because he/she has not been authenticated via the APSA.

The method in an embodiment contemplates that the secondaryEthernet-like wireless communication system could also interwork withthe dominant Ethernet-like wireless communication system's toauthenticate a user of the secondary Ethernet-like wirelesscommunication system for a limited set of services (e.g. Internetservice only, or services from the primary Ethernet-like network only)without allowing access to the private intranet. Using such anarrangement, telephone calls from a dominant system, such as a publicoutdoor wireless Ethernet-like system, can still reach a user whileindoors and connected to the secondary Ethernet-like wirelesscommunication system. More specifically, an embodiment contemplates thatcalls from a public wireless phone system may be diverted to thewireless device which is in communication with the secondaryEthernet-like wireless communication system (by virtue of a notificationmessage from the secondary system to the primary system) indicating thatthe user is now indoors and is associated with and authenticated on thesecondary system.

An additional embodiment contemplates that authorizing, associating, andauthenticating of the wireless device can be based on informationretrieved from a database of the dominant Ethernet-like wirelesscommunication system to enable billing of service usage while on thesecondary Ethernet-like wireless communication system to occur throughthe account information based on the subscription that the user has withthe dominant Ethernet-like wireless communication system.

For example, if a user with a wireless device connected to the secondaryEthernet-like wireless communication system wants to place aninternational call while connected to the secondary system, the user canmake the call using the secondary system but be billed on the normalbill that the user has for the user's device with the dominantEthernet-like communication system. In such a case, the userauthenticates the wireless device under the dominant, public system,then goes indoors under the secondary, private system, with billingenabled back through the dominant, public system.

An embodiment of the method envisions that the authorizing, associating,and authenticating activates for a user to use his or her wirelessdevice include using a WDI identifier code. WDI represents the phrase,wireless device identifier which is a specific number for that specificwireless device of the user. In this embodiment, the WDI code isinserted into the wireless device at initial authorization andauthentication, wherein the WDI code is unique to the secondaryEthernet-like wireless system. After initial authorization andauthentication the wireless device preferentially locks on to thesecondary Ethernet-like wireless communication system using the WDIcode.

To better explain this step, a user inserts a number, such as a PersonalIdentification Number (PIN), which is forwarded to the secondaryEthernet-like communication system. Then the system checks the PINagainst a group of pre-identified users in a database of approved users.If the user is in the database and the PIN matches, then authenticationoccurs and connection to the system is fast, quick and secure. Thoseskilled in the art will recognize that various encryption andchallenge-response schemes can be used to accomplish this functionwithout incurring vulnerability to individuals who may wish to gainunauthorized access.

In still another embodiment of the method the wireless device can beoperated in the secondary Ethernet-like wireless system in substitutionfor the dominant Ethernet-like wireless communication system. That is,the user, can enter the AT&T building, be authorized for access andcommunication with the secondary communication system and operate on theAT&T private network in substitution for another carrier, like T-Mobile.In such a circumstance the T-Mobile account could allow either publicWi-Fi access or cellular access (assuming a dual-mode cellular/Wi-Fidevice. Those skilled in the art will recognize that both homogeneousand heterogeneous air interfaces can be accommodated by the APSA systemif corresponding dual or multi-mode devices are available. For example,IEEE 802.11 systems for both dominant and secondary access could beemployed, or similarly IEEE 802.16 systems. Likewise, dual-mode devicescould accommodate an 802.16 dominant system (in one spectral band), andan 802.11 system (in another band). The APSA port can be part of acellular base station having digital communication channels whichoperate under the IEEE standards.

Another version of the method of the embodiments contemplate activatingand authenticating a wireless device of a new user in a secondaryEthernet-like wireless communication system in a region overlapped by adominant Ethernet-like wireless communication system which involvesenabling the activating and authenticating of the new user device withina limited sub-region, that is the microwave-like device of thereceptionist, in the building, wherein the private AT&T system overlapsa dominant Ethernet-like wireless communication system, like T-Mobileand within that sub-region, the microwave like box, providing accesscredentials from an Automatic Private Service Activation (APSA) unit ofthe secondary Ethernet-like system to provide a record and enableservice to the new user. More particularly, in this embodiment, the APSAunit interacts with a database connected to the secondary Ethernet-likewireless network containing all user credentials including new usercredentials, as well as user service preferences and feature sets.

Another embodiment of the method contemplates that the wireless devicecan have installed on it, a private system identification number (PSID)enabling the secondary system to recognize the wireless device by thePSID code. An example of a usable PSID would be an Ethernet address forthe wireless device.

Another version of an embodiment can include a secondary Ethernet-likewireless communication system overlapped by a dominant Ethernet-likewireless communication system, that includes radio access andcommunication for activation, association, and authentication of awireless device in the secondary Ethernet-like wireless communicationsystem having an internet/intranet-connected database including userlists and user features and characteristics for access andcommunications to individuals requesting service in the secondaryEthernet-like wireless communication system and allowing the individualsto insert information concerning user credentials for access andcommunicating information in advance of implementing access,association, and communication requests. The information is providedusing an automated private service activation (APSA) port for acceptingthe access, association, and communication requests of a wireless deviceseeking activation in the secondary Ethernet-like wireless communicationsystem.

This version of the embodiment enables the receptionist in the AT&Tbuilding, the secondary network to remove an entry from a database sothat a user can no loner connect to the secondary communication system.This embodiment, also enables either a potential user, receptionist, orsystem manager to add an entry to the “registered user list” byundertaking a series of steps using a webpage that interacts with adatabase, to obtain access. As an example, the receptionist finds outthat it is 5 pm and Ms. Jones is leaving the building as a visitor forthe last authorized use. The receptionists logs into the database,removes the wireless device listing from the database as an individual,or as one of all visitors on Jun. 11, 2006, or as one of all visitorsbetween 2-5 pm Jun. 11, 2006 or by some other specified filter.Conversely, a visitor wishes to use the AT&T service while in the AT&Tbuilding, and prior to that visit, logs onto the secure website, entersher name, address, and other security required information including thewireless device number, and the website communicates with a databasethat communicates with the secondary communication system. A number isgenerated by the server or another processor of the communication systemenabling the user to be coded into the database and preauthorized to usethe system once the user enters the AT&T building. The database is veryimportant for data management of all visitors and user of the system,particularly for billing purposes.

Even with the database embodiment, it is contemplated that an APSA portwould be usable for radiating access and communication channel signalswithin a limited spatial constraint at a level exceeding a signal levelof the access and communication channels of the dominant communicationsystem and in that limited spatial constraint, the secondarycommunication system could receive signals from the wireless devices foractivation in the secondary Ethernet-like wireless communication system.

Yet another method is contemplated in the embodiments, that is, a methodof activating, associating, and authenticating a wireless device in asecondary Ethernet-like wireless communication system co-located with aprimary Ethernet-like wireless communication system, by masking thesignal strength associated with the primary Ethernet-like wirelesscommunication system and then coupling signals of the secondaryEthernet-like wireless communication system to the wireless deviceduring the masking. In effect, this method is a method that jams thesignals of the dominant communication systems. Usable jamming deviceswould be subject to rules regulating use of such masking devices (e.g.FCC). Examples of such devices are those designed for small-areajamming/masking of GSM signals (e.g. in secure areas). Examples of suchdevices (for cellular frequencies) are Models CJ7, CJ7A, CJ8A, CJ9A,CJ10A sold by Antenna Systems & Solutions, Inc., 931 Albion Avenue,Schaumburg of Illinois 60193, USA.

In this embodiment, the masking of the signal strength involves devisinga signal of the secondary Ethernet-like wireless communication systemthat exceeds in magnitude the signal strength of the primaryEthernet-like wireless communication system as masked within definedspatial limits; and then the wireless device would be operated foractivation purposes within the defined masked spatial limits.

The methods and systems of the embodiments can be used with any twodominant and secondary systems that coexist together. It is contemplatedthat this embodiment can be used with public Ethernet-like wirelesscommunication systems co-located with private or localized Ethernet-likewireless communication systems. It is contemplated, particularly for themasking embodiment, that this method is usable for signals that are onidentical channels between the dominant and secondary communicationsystem, (or public and private communication system).

An additional embodiment contemplates that the user can opt-out of thesecondary Ethernet-like wireless communication system at any time.

The embodiment contemplates that the signals of the dominantcommunication system facilitate activation scenarios for an interactionwith co-located Ethernet-like wireless communication systems.

It is also contemplated that the masking embodiment can be used toblocking radiation of a higher signal strength within a limited space atwhich the wireless device connects.

Masking can be directionally controlling signal radiation of thesecondary Ethernet-like wireless communication system.

The embodiments also contemplate a method of accessing and achievingauthentication from a secondary Ethernet-like wireless communicationsystem in a region overlapped by a dominant Ethernet-like wirelesscommunication system, by creating an access and communication signalspace in which radiated access and communication signal levels of thesecondary Ethernet-like wireless communication system within the accessand communication signal space exceed access and communication signallevels of the dominant Ethernet-like wireless communication system. Inthat superseded area, the wireless device can seek access andcommunication to the secondary Ethernet-like wireless communicationsystem, receive a search from the wireless device to locate thestrongest channel; select the channel of the secondary Ethernet-likewireless communication system within the limited space; obtainauthorization and authentication information for the wireless deviceoperating within the secondary Ethernet-like wireless communicationsystem.

This method enables the secondary Ethernet-like wireless communicationsystem to interwork with the dominant Ethernet-like wirelesscommunication system.

Additionally, this method contemplates that billing service can occurwhile in the secondary Ethernet-like wireless communication systemthrough the dominant Ethernet-like wireless communication system.

In still another embodiment of this method, it is contemplated that thewireless device can receive credentials associated with the wirelessdevice and the secondary Ethernet-like wireless communication systeminformation in advance of accessing the secondary Ethernet-like wirelesscommunication system for allowing administration of services within thesecondary Ethernet-like wireless communication system.

In a variation of the disclosed embodiments a secondary/microcellularsystem may be interconnected with the dominant/macro cellular system sothat the two interwork with each other. In a particular aspect aninter/intranet-connected database may be utilized by both systems. Sucha database may be readily accessed by individuals requesting access tothe secondary system through an internet/intranet connection. Such adatabase could be used to provide mobile station phone numbers andadditionally provide other service provider information.

A secondary, wireless communication system 100 is illustrated in FIG. 1.System 100 is considered to be overlapped (i.e., in an area covered byradiated signals of another dominant system) by a public or dominantEthernet-like communication system having operative and access signalmuch higher in signal strength than used by the system 100.

The overlapping systems are considered to be primarily digital with somebeing analog. They may operate according to TIA/EIA-136, IS-95, IS-54,EDGE or other standards. The secondary and possibly private system 100is considered to be an embodiment operating under an TIA/EIA-136standard although it is to be noted that the embodiment contemplatesoperation under other standards (e.g., including GSM, DECT, etc). Due tothe high signal strength of the dominant system the user of a wirelessdevice is unable to connect to the secondary system 100.

A controller 101 directs operation of the secondary wireless system. Thecontroller includes a Network Service Platform (NSP) 102, a database 103and a digital switch 104.

Controller 101, with its functional sub-units, performs such functionsas digital switching and network operations. These network operationsinclude set-up operations, feature applications, maintain a subscriberdatabase, operate security functions, fault detection and resolution,and RF management functions.

NSP 102 is a server, which with its associated database 103 providesoperational rules and regulations and monitors/identifies the varioususage/users.

Two wireless devices 107 and 108 operating within the private wirelesscommunication system 100. VAP 105 is connected to the digital switch 104via a line interface, which could be an ISDN/BRI connection, a 10Base Tconnection or any other standard telephone lines (e.g., POTS). VAP 106is likewise connected to the digital switch 104 via an ISDN/BRIconnection, a 10Base T connection, or any other standard telephone lines(e.g., POTS). VAP stands for Voice Access Port. POTS stands for PlainOld Telephone System.

The VAPs are assumed to be small (i.e., miniature) base stationsoperating similarly (i.e., in principle) to those of public wirelesscommunications systems. In the illustrative embodiment the controller isco-located with the operative area within the radiation area of theprivate/secondary system.

The ISDN (Integrated Services Digital Network) connection conforms to aset of standards for digital transmission over copper wire and othertransmission media. The suggested service level is the BRI (Basic RateInterface) level intended for small private users and includes two B(bearer) channels (64 Kbps) and one D (delta) channel (16 Kbps).10base-T is a carrier medium connection (e.g., twisted pair wire) usedby many Ethernet systems operating at 10 Mbps. Since the aforementionedtransmission media are well known to those skilled in the art no furtherdescription is believed necessary.

The digital switch 104 is connected to a Local Digital switch 110, whichhandles digital signals passed to and from digital switch 104. LDS 110may be a public server located at a central office or on customerpremises. These various server arrangements are well known in the artand need not be discussed in detail. Various Ethernet-like devices 115may be connected to LDS 110. A trunk 109 connects LDS 110 to a publicnetwork 114.

Automatic Private Service Activation (APSA) device 125 is shownconnected to the controller 101. APSA 125 is essentially a miniaturebase station of the local system 100 which has been modified to permit awireless device to communicate with the controller under an arrangementwhere this connection is masked/shielded from the radiation of thedominant system.

In the embodiment the APSA device radiates a digital signal which is inthe same frequency range as such signal allotted to the primarycommunications system overlapping the secondary system served by APSA125. Suggested shielding/masking techniques are illustrated in FIGS. 3and 4.

In the embodiment, this miniature base station is an Ethernet-like basestation, such as a server.

The APSA 125 and VAP's 105 and 106, in the embodiment, are miniaturebase stations and have capability for communicating with the wirelessdevice using digital signals. These stations may have multiple channelcapability allowing transmission and reception on several channelssimultaneously allowing differing modulation and channel-codingtechniques. As shown in the FIG. 1 they may be connected to a switch, ora controller including a switch, by standard line interfaces (e.g., ISDNBRI, ISDN PRI, 10Base T, Trunk/PRI, etc).

The APSA 125 may be located at an entrance or on the periphery or acombination thereof of the operating extent of the secondarycommunication system. It may operate in an enclosed area (e.g., entrancelobby) or in an enclosure, (like a mini-microwave like device) which isexposed to the environment.

If located at an entrance it may be combined with a premise admittancesystem, which also responds to wireless smart badges used for entryauthentication. The transmission power of the digital access signals areset at a level so that access procedures must be performed with thewireless handset located within a tightly defined space (i.e., normallywithin inches of the APSA antenna)

An APSA 125 operating environment is illustrated schematically in FIG.3. This embodiment presents the wireless device user with a surface 301,which the wireless device 305 is placed against, according to providedinstructions. The ASPA antenna is located just behind the surface, whichis transparent to electromagnetic radiation in the illustrativeembodiment. The distance and signal strength radiated by the antenna 302is selected so that the field strength presented to the wireless deviceat the surface 301 exceeds the radiated signal strength of theoverlapping primary or dominant system. The signal strength of thesecondary system radiation exceeds the ambient field strength of thedominant system at distances very close to the antenna of the secondarysystem.

The antenna 302 is connected to circuitry 303, which in turn isconnected, to the base station equipment 304. This in turn is connectedto the controller 101. The APSA 125 is advantageously located at somelocation easily accessed by potential new users of the secondary system.Such location might be an entrance to a building containing thesecondary system. Other locations will suggest themselves to thoseskilled in the art.

An alternative arrangement is illustrated in the schematic of FIG. 4, inwhich the secondary system access antenna 402 is shielded from ambientradiation of the dominant system. In the embodiment of FIG. 4 theshielding mechanism is a box 407, much like a microwave oven,surrounding the antenna 402 to prevent/reduce the level of ambientradiation of the dominant communication system within the box. Withinthe box 407 the wireless device may interact solely with the secondarysystem antenna 402 independent of radiation of the dominant system.

Alternative arrangements may use an external antenna having highlydirectional radiation constructs to permit access despite the radiantlevel of the dominant system. This arrangement may be useful if theantenna and APSA circuitry are not co-located or other placementrestrictions exist.

A flow chart illustrating the method is presented in FIG. 2. Thisprocess is based on continuing signal activity of an active secondarycommunication system. As indicated in block 221 the APSA base stationcontinually scans for channels of a dominant communications system.These signals, as per block 223, are replicated by the APSA forreceiving registration requests. The APSA transmits these replicatedsignals, as per block 225, as digital channels on the same frequenciesused in the dominant communication system.

The activation/access process in initiated when the user places ahandset (i.e., wireless telephone) close to an APSA antenna, as perblock 201. Registration is achieved with the APSA per block 211.

The APSA communicates with the System controller of the secondary systemper block 213. The device is enabled for communication with thesecondary system per block 217.

The service portion of this embodiment utilizes an intranet-basedapplication program to communicate with the private system controller inpacket format. In a fully automatic instantiation, the controllerreceives the handset's MIN and ESN from the APSA unit, and may interactand/or update an authentication database to admit the new user. Suchupdates could conform to one of several service scenarios, depending onthe strength of access privileges, which may be deemed appropriate. Thefollowing are examples, but one skilled in the art will recognize thatother levels are possible:

1. Verify that the user is a member of the organization, which sponsorsthe private user community via access to a corporate database. Suchusers may be granted unlimited period of access with full privileges.

2. Identify the user as an invited visitor to the organization whowishes to access the system for a limited period of time and with eitherunlimited or limited privileges. In this case, security attendantintervention would be required to authorize access and active period.This operation could be accommodated by an Intranet application pageavailable at the security attendant's location.

3. Identify the user as a dominant communication system subscriber (byaccessing the dominant communication system subscriber database) whowill be allowed to access the system in order to achieve improvedservice in the building, but whose service will be billed through thedominant communication system's subscription.

4. Identify the user as having emergency only (911) authorization whilein the building.

Alternatively, an Internet-connected database accessible directly byindividuals requesting in-building service could permit insertion ofmobile phone number and service provider information in advance (withappropriate security firewalls). Access to this database would allowself-administration of services within the building, either for a fee orfor no-charge use. As an example of a situation where such a servicewould be useful is at a hotel or airline preferred-customer club. Theaccess could be in the form of receiving credentials associated with thewireless device.

Following user validation, via the designated database(s), thecontroller interworks with the APSA unit to transmit a System ID Message(PSID). This message, working with software in the wireless device,installs the PSID into the Number Assignment Module (NAM) memory area.The wireless device is programmed with a new Private SID, itpreferentially locks onto the DCCH of the private system.

This embodiment could also be used to provision users in a particularlocal environment, such as malls, attractions, and conventions. Suchservice would allow calls to be handled by a private cellularenvironment separately from the public or dominant system. Suchapplications could provide different call charges, special features orallow access to other systems operating in service area, such as at aninternational airport). In these instances, a Residential SID may beused instead of the Private SID, but other procedures remain the same.

While these embodiments have been described with emphasis on theembodiments, it should be understood that within the scope of theappended claims, the embodiments might be practiced other than asspecifically described herein.

What is claimed:
 1. A secondary wireless communication system overlappedby a first wireless communication system, comprising: an automatedprivate service activation port for accepting access and communicationrequests of a wireless device seeking activation, association andauthentication in the secondary wireless communication system, theautomated private service activation port providing: an access andcommunication channel for radiating signals at a level exceeding asignal level of an access and communication channel; and a space forreceiving the wireless device for activation and communication in thesecondary wireless communication system.
 2. The secondary wirelesscommunication system of claim 1, further comprising: the automatedprivate service activation port being part of a cellular base stationhaving digital communication channels which operate under an instituteof electrical and electronics engineers 802.11 standard.
 3. Thesecondary wireless communication system of claim 2, further comprising:a surface covering an antenna for abutting against and communicatingwith the wireless device at a signal level sufficient to achieve access,association, and authentication, and exceeding at the surface a signallevel of the first wireless communication system that overlaps thesecondary wireless system.
 4. The secondary wireless communicationsystem of claim 2, further comprising: a surface covering an antenna foraccess and communication to a wireless device seeking access,association, and authentication, and including shielding for blocking asignal level of the first wireless communication system that overlapsthe secondary wireless system.
 5. The secondary wireless communicationsystem of claim 1, further comprising: the automated private serviceactivation port being part of a cellular base station having digitalcommunication channels which operate under an institute of electricaland electronics engineers 802.16 standard.
 6. The secondary wirelesscommunication system of claim 5, further comprising: a surface coveringan antenna for abutting against and communicating with a wireless deviceat a signal level sufficient to achieve access, association, andauthentication, and exceeding at the surface a signal level of the firstwireless communication system that overlaps the secondary wirelesssystem.
 7. The secondary wireless communication system of claim 5,further comprising: a surface covering an antenna for access andcommunication to a wireless device seeking access, association, andauthentication and including shielding for locking a signal level of thefirst wireless communication system that overlaps the secondary wirelesssystem.
 8. The secondary wireless communication system of claim 1,further comprising: a system controller for providing digital switchingand service features connected to the automated private serviceactivation port via an ethernet interface.
 9. The secondary wirelesscommunication system of claim 8, wherein the system controller comprisesa network service platform for providing a service and managementfunction.
 10. A method of communication for achieving association,authentication and access, from a secondary wireless communicationsystem in a region overlapped by a first wireless communication system,comprising: creating access, association, and authentication in a signalspace in which radiated access and communication signal levels of thesecondary wireless communication system within the signal space exceedaccess and communication signal levels of the first wirelesscommunication system; positioning a wireless device seeking access,association, and authentication and communication within the signalspace and powering up the wireless device; searching by the wirelessdevice for a strongest channel; selecting the strongest channel of thesecondary wireless communication system by reason of the positioning ofthe wireless device within the signal space; and authorizing,authenticating, and associating the wireless device for operation withinthe secondary wireless communication system.
 11. The method of claim 10,further comprising: enabling the secondary wireless communication systemto interwork with the first wireless communication system; andauthorizing, associating, and authenticating in accordance with aninstitute of electrical and electronics engineers standard.
 12. Themethod of claim 10, further comprising: authorizing, associating, andauthenticating based on information retrieved from a database of thefirst wireless communication system to enable a billing of servicethrough a subscription to the first wireless communication system. 13.The method of claim 10, further comprising: authorizing, associating,and authenticating to use a wireless device identifier code, wherein thewireless device identifier code is inserted into the wireless device atan initial authorization and authentication, and wherein the wirelessdevice identifier code is unique to the secondary wireless system sothat at a post initial authorization and authentication, the wirelessdevice locks on to the secondary wireless communication system.
 14. Themethod of claim 13, further comprising: operating the wireless device inthe secondary wireless system in substitution for the first wirelesscommunication system.
 15. A method of activating and authenticating awireless device of a new user in a secondary wireless communicationsystem in a region overlapped by a first wireless communication system,comprising: enabling, by a processor, the activating and authenticatingwithin a limited sub-region of the region overlapped by the firstwireless communication system and within the limited sub-regionincluding: providing access credentials from an automatic privateservice activation unit of the secondary wireless communication system;and interacting with a database containing user credentials, and userrequested features, to provide a record and to enable service to the newuser.
 16. The method of claim 15, further a comprising: installing inthe wireless device, a private system identification number.
 17. Amethod of activating, associating, and authenticating a wireless devicein a secondary wireless communication system co-located with a primarywireless communication system, comprising: masking, by a processor, asignal strength associated with the primary wireless communicationsystem; and coupling, by the processor, signals of the secondarywireless communication system to the wireless device during the masking.18. The method of claim 17, wherein the masking of the signal strengthcomprises devising a signal of the secondary wireless communicationsystem so that it exceeds in magnitude a signal strength of the primarywireless communication system as masked within defined spatial limits;and operating the wireless device for activation purposes within thedefined spatial limits.
 19. The method of claim 18, further comprising:using a cellular base station having digital communication channelswhich operate under an institute of electrical and electronics engineersstandard.
 20. The method of claim 19, wherein the secondary wirelesscommunication system is a private local communication system.