Automatic wireless service activation in a private local wireless system

ABSTRACT

Automatic activation (i.e., first time access) of digital wireless/cellular mobile telephones with a private/localized wireless/cellular system (i.e. a secondary system) occurs within an area having an overlapping macrocellular primary wireless communication system (i.e., a dominant system). Operation of the secondary access procedure is achieved by shielding/masking an access and authentication process for the secondary system from interference from the control signal levels of the dominant wireless communication system. During the first time access, the secondary system is supplied with the SID and MIN and ESN numbers for authentication and resultant access.

FIELD OF THE INVENTION

This invention addresses the problem of activating service for awireless telephone in a wireless system other than the normal homesystem of that wireless telephone or a system that might grant access asa roaming type activation. In a particular aspect it concerns activationof a wireless telephone to operate in a local or secondary system,overlapped by a macro or primary system. Activation in a private orsecondary wireless system for a permanent or a limited-time duration isconsidered. It specifically relates to first time activation of digitalwireless/mobile telephones. A method of using a wireless handset'sautomatic activation features for obtaining service on such a wirelesssystem is described. In one particular aspect, the invention addressesprovisioning of service to in-building/campus wireless users inaccord/compliance with pre-existing standards. The wireless system maybe cellular, PCN, PCS, or a similar mobile radio system

BACKGROUND

A wireless telephone typically needs to be activated before it canoperate in a particular wireless system. Normally this process isrequired only once since subsequent uses of the wireless telephone inthat system is already authorized. Access in different systems isgenerally covered by roaming procedures allowing use of the wirelesstelephone as it moves to another system. This granting of use permissionis dependent upon agreements between different systems and access todatabases to verify the legitimacy of the wireless telephone operatingout of its home territory.

There are a large number of localized and/or private wireless systemswhich are not part of arrangements permitting roaming and may indeedoperate within a territory already covered or overlaid by other carriersincluding the home carrier of a wireless telephone seeking use of alocalized and/or private wireless system. Such localized and/or privatewireless systems operate at low signal levels compared to outdoormacrocell systems. These localized and/or private systems are frequentlyfound within buildings and on campus sites.

TIA/EIA-136, a cellular standard covering digital cellular TDMA systems,explicitly provides for providing service to private user communities.Service is granted by means of a Private System IDentification (PSID)code entered into each wireless telephone requesting service from theprivate/local wireless system. This PSID code must be entered into thehandset, which is requesting service. The process is elementary but itis not simple in real economic terms. For example to insert the PSIDinto the wireless telephone manually is elementary and at the same timeboth inefficient and costly especially in the circumstance of initiallyproviding service to a ‘large’ number of users. Even on an occasionalbasis a structured entry process requiring experienced humanintervention must still be maintained. This procedure must includedecisions regarding control over duration of registry and extent of useprivileges offered.

Service provisioning, by over-the-air downloading of requiredinformation, is available on many macrocellular cellular/wirelesssystems of public carriers. In one cellular system a telephone numberand System ID (SID) code is assigned and downloaded to awireless/cellular telephone and the user enters the related informationin response to a visually presented operation menu provided by thewireless telephone. The registration is completed with a specificsequence of steps which include searching a range of digitalmacrocellular RF control channels; latching on to the strongest controlchannel received; and then installing activation and authenticationinformation into the wireless telephone over the air.

The key to this automatic setup procedure, in part, is the ability ofthe wireless/cellular phone to preferentially seek (i.e., tune-in to)the strongest macrocellular setup channel in the locality. Thiscomplicates the desire for automatic setup procedures for private andlocal wireless/cellular systems. The first obstacle is the relativelyhigh signal level of the macrocellular system compared to the privatelocal/system. The relatively high signal level of the macrocellularsystem overrides any setup channel of the private/local system renderingit impossible for the wireless telephone to latch onto the local/privatesystem.

At present there is no way of automatically provisioning awireless/mobile digital phone (e.g., digital cellular telephone) to asecondary wireless communication system in an area radiated by a morepowerful dominant wireless communication system (i.e., a macrocellularsystem). The macrocellular signal strength overrides any provisioningsignal provided by the secondary system.

SUMMARY OF THE INVENTION

A method and apparatus is provided permitting individual wirelesstelephones (i.e., cellular) use of the wireless telephone's inherentdownloading capability to permit automatic activation to achieveregistration and activation to a secondary (i.e., private) wirelesscommunication system (e.g., cellular system) by downloading directlyinto the wireless telephone the necessary system information.

Automatic activation (i.e., first time access) of digitalwireless/cellular mobile telephones with a private/localizedwireless/cellular system (i.e. a secondary system) occurs, in accordwith the invention, within an area having an overlapping macrocellularprimary wireless communication system (i.e., a dominant system).Operation of the secondary access procedure, to register and receiveservice from the secondary system, is achieved by shielding/masking anaccess and authentication process for the secondary system frominterference from the control signal levels of the dominant wirelesscommunication system. During the first time access, the secondary systemis supplied with the PSID and MIN and ESN numbers needed forauthentication and resultant access.

In particular the process requires masking only during theauthentication and access processing allowing the application ofshielding/masking for this process only. In one masking arrangement theantenna for the secondary system used for access and authenticationprocedures radiates a control channel signal that exceeds a radiationlevel of the dominant system control channel only within a very shortdistance from an access antenna of the secondary system. For example, insome situations, this distance is about an inch or less. Hence when thewireless telephone is within this distance the secondary system acts asthe dominant system in the region for access and authenticationprocedures.

In another embodiment the antenna, of the secondary system, dedicatedfor access processes may be in a shielded enclosure which blocksradiation from the dominant system within the enclosure. Such a shieldcould be a conductive grid formed into a box enclosure into which thewireless telephone may be inserted and placed next to an antenna of thesecondary system used for access procedures.

In one exemplary embodiment the secondary system uses identical signalformats and frequencies for access as used by the overlapping dominantsystem. These may be defined by a cellular standard such as ANSITIA/EIA-136, which provides standards for providing services to privateuser communities. In a specific embodiment the secondary system scansthe overhead channels of the dominant system and replicates thesesignals and frequencies for creating its own overhead and controlchannels.

In the disclosed embodiment the secondary wireless communication systemoperates in a region covered by an overlapping dominant wirelesscommunication system. The secondary system uses access signals andtechniques in at least one access method identical to those of thedominant system (i.e., TIA/EIA-136 procedures). It may, in someinstances, use different access methods (i.e., analog processing) notused by the dominant system. The secondary system special access mode isoperative for access to new wireless telephones needing initialauthentication and access data to be inserted into the wireless phone toenable operation in the secondary system. Access is enabled only if thephone is positioned so that the received radiation from the accessantenna of the secondary system is stronger than the ambient radiatedsignal strength of the dominant system when the wireless telephone ispositioned properly relative to the access antenna of the secondarysystem.

In a variation of the disclosed embodiments a secondary/microcellularsystem may be interconnected with the dominant/macrocellular system sothat the two interwork with each other. In a particular aspect aninter/intranet-connected database may be utilized by both systems. Sucha database may be readily accessed by individuals requesting access tothe secondary system through an internet/intranet connection. Such adatabase could be used to provide mobile station phone numbers andadditionally provide other service provider information.

DESCRIPTION OF THE DRAWING

FIG. 1 is a block schematic of an illustrative service architecture of awireless communication system, which may be a secondary system subjectto ambient control signal radiation of an overlapping dominant system;

FIG. 2 is a flow chart of a process by which a wireless telephoneaccesses and is authenticated by the wireless communication system ofFIG. 1;

FIG. 3 is a view of an antenna arrangement used for access in asecondary system;

FIG. 4 is a view of another antenna arrangement used for access in asecondary system;

FIGS. 5, 6, 7 and 8 disclose message flow procedures for supporting OATSprocedures;

FIG. 9 is a flow chart of the TIA/EIA-136 DCCH search procedure; and

FIG. 10 is a block schematic of an alternate service architecture tothat of FIG. 1.

DETAILED DESCRIPTION

An exemplary private wireless communication (i.e., secondary) system 100is illustrated in FIG. 1. System 100 is considered to be overlapped(i.e., in an area covered by radiated signals of another system) by apublic or primary wireless telephone (i.e., dominant) system havingoperative and access signal much higher in signal strength than used bythe system 100. The overlapping systems are considered to be primarilydigital with some being analog. They may operate according toTIA/EIA-136, IS-95, IS-54, EDGE or other standards. The private system100 is considered to be an exemplary embodiment operating under anTIA/EIA-136 standard although it is to be noted that the inventioncontemplates operation under other standards (e.g., including GSM, DECT,etc). Due to the high signal strength of the dominant system the user ofa wireless telephone is unable to connect to the secondary system 100.

A controller 101 directs operation of the secondary (i.e.primary/private) wireless system. It includes a Network Service Platform(NSP) 102, a database 103 and a digital switch 104. Controller 101, withits functional sub-units, performs such functions as digital switchingand network operations. These network operations include call set-up,feature applications, maintain a subscriber database, securityfunctions, fault detection and resolution, and RF management functions.NSP 102 is a server, which with its associated database 103 providesoperational rules and regulations and monitors/identifies the varioususage/users.

Two Voice Access Ports (VAP) 105 and 106 act as system base stations tosupply wireless service to wireless telephones 107 and 108 operatingwithin the exemplary private wireless communication system 100. VAP 105is connected to the digital switch 104 via a line interface, which couldbe an ISDN/BRI connection, a 10Base T connection or any other standardtelephone lines (e.g., POTS). VAP 106 is likewise connected to thedigital switch 104 via an ISDN/BRI connection, a 10Base T connection, orany other standard telephone lines (e.g., POTS). The VAPs are assumed tobe small (i.e., miniature) base stations operating similarly (i.e., inprinciple) to those of public wireless communications systems. In theillustrative embodiment the controller is co-located with the operativearea within the radiation area of the private/secondary system. In analternative arrangement the controller 101 may be located with NSP 102connecting to a local digital switch at a telephone central office(i.e., replacing digital switch 104).

The ISDN (Integrated Services Digital Network) connection conforms to aset of standards for digital transmission over copper wire and othertransmission media. The suggested service level is the BRI (Basic RateInterface) level intended for small private users and includes two B(bearer) channels (64 Kbps) and one D (delta) channel (16 Kbps).10base-T is a carrier medium connection (e.g., twisted pair wire) usedby many Ethernet systems operating at 10 Mbps. Since the aforementionedtransmission media are well known to those skilled in the art no furtherdescription is believed necessary.

The digital switch 104 is connected to a Local Digital switch 110, whichhandles digital signals passed to and from digital switch 104. LDS 110may be a public switch located at a central office or a PBX (PrivateBranch eXchange) on customer premises. These various switchingarrangements are well known in the art and need not be discussed indetail. Various line telephones 115 may be connected to LDS 110. A trunk109 connects LDS 110 to a public network 114.

Automatic Private Service Activation (APSA) device 125 is shownconnected by an ISDN/BRI connection to the controller 101. APSA 125 isessentially a miniature base station of the local system 100 which hasbeen modified to permit a wireless telephone to communicate with thecontroller under an arrangement where this connection is masked/shieldedfrom the radiation of the dominant system. In the exemplary embodimentthe APSA device radiates both an analog and a digital access channelwhich is in the same frequency range as such signal allotted to themacrocellular primary communications system overlapping the secondarysystem served by APSA 125. Suggested exemplary shielding/maskingtechniques are illustrated in FIGS. 3 and 4.

In the exemplary embodiment, this miniature base station is a cellularradio base station, which can establish both analog and digitalchannels. This base station may be based on Digital Radio Processing(DRP) techniques, which accomplish transmission and reception ofcellular radio signals by use of numerical rather than conventionalanalog signal processing techniques. These radio techniques are wellknown in the art and need not be further discussed herein.

The APSA 125 and VAPs 105 and 106, in the exemplary embodiment, areminiature base stations and have capability for communicating with thewireless telephone using both analog and digital (i.e., TIA/EIA-136)formats. These may have multiple channel capability allowingtransmission and reception on several channels simultaneously allowingdiffering modulation and channel-coding techniques. As shown in the FIG.1 they may be connected to a switch, or a controller including a switch,by standard line interfaces (e.g., ISDN BRI, ISDN PRI, 10Base T,Trunk/PRI, etc).

The APSA 125 may be located at an entrance or on the periphery or acombination thereof of the operating extent of the secondarycommunication system. It may operate in an enclosed area (e.g., entrancelobby) or in an enclosure, which is exposed to the environment. If at anentrance it may be combined with a premise admittance system, which alsoresponds radio-linked badges used for entry authentication. Thetransmission power of the analog and digital access signals are set at alevel so that access procedures must be performed with the wirelesshandset located within a tightly defined space (i.e., normally withininches of the APSA antenna)

An exemplary APSA 125 operating environment is illustrated schematicallyin FIG. 3. This embodiment presents the wireless telephone user with asurface 301, which the wireless telephone handset 305 is placed against,according to provided instructions. The ASPA antenna is located justbehind the surface, which is transparent to electromagnetic radiation inthe illustrative embodiment. The distance and signal strength radiatedby the antenna 302 is selected so that the field strength presented tothe wireless telephone handset at the surface 301 exceeds the radiatedsignal strength of the overlapping primary or dominant system. A graphof signal strength curves positioned below the schematic relates thesignal strength to distance from the secondary system access antenna. Itcompares signal field strength of both the secondary and dominantsystems related to a linear distance from the secondary antenna. As isapparent the signal strength of the secondary system radiation exceedsthe ambient field strength of the dominant system at distances veryclose to the antenna of the secondary system.

The antenna 302 is connected to RF processing circuitry 303, which inturn is connected, to the base station equipment 304. This in turn isconnected to the controller 101. The APSA 125 is advantageously locatedat some location easily accessed by potential new users of the secondarysystem. Such location might be an entrance to a building containing thesecondary system. Other locations will suggest themselves to thoseskilled in the art.

An alternative arrangement is illustrated in the schematic of FIG. 4, inwhich the secondary system access antenna 402 is shielded from ambientradiation of the dominant system. In the exemplary embodiment of FIG. 4the shielding mechanism is a box 407 surrounding the antenna 402 toprevent/reduce the level of ambient radiation of the dominant within thebox. Within the box 407 the wireless telephone may interact solely withthe secondary system antenna 402 independent of radiation of thedominant system.

Alternative arrangements may use an external antenna having highlydirectional radiation constructs to permit access despite the radiantlevel of the dominant system. This arrangement may be useful if theantenna and APSA circuitry are not co-located or other placementrestrictions exist.

An illustrative procedure for activating a wireless telephone in thesecondary communication system, following exemplary TIA/EIA-136procedures, is shown in the process flow chart of FIG. 2. This processis based on continuing signal activity of an active secondarycommunication system. As indicated in block 221 the APSA base stationcontinually scans for detecting Analog and Digital macrocell overheadchannels of a dominant communications system. These signals, as perblock 223, are replicated by the APSA for receiving registrationrequests. The APSA transmits these replicated signals, as per block 225,as digital and analog control channels on the same frequencies used inthe primary macrocell.

The activation/access process in initiated when the user places ahandset (i.e., wireless telephone) close to an APSA antenna, as perblock 201. An inquiry is performed, as per decision block 203, todetermine if the handset has previously operated on digital service. Ifit has not the handset finds and locks on to an analog overhead channel,as per block 205. The handset decodes the DCCH (Digital ControlChannels) in analog ACCH (Analog Control Channels), as per block 209,and finds the DCCH of the APSA. The handset then registers with the APSAsending it its ESN and MIN, as per block 211.

If the decision of block 203 determines that the handset has previouslyoperated on digital service the flow process proceeds to theinstructions of block 207 and the handset as instructed follows theTIA/EIA-136 recommended search procedure. Registration is achieved withthe APSA following the sending of the handset's ESN and MIN.

The APSA parses ESN and MIN and, as per block 213, sends it to theSystem controller of the secondary system. The APSA as per block 215begins an OATS process and as per block 217 the handset executes theconventional OATS process with the APSA to install the PSID which is aprivate SID causing the handset to preferentially lock onto the DCCH ofthe private system.

OATS (Over-the-air-Activation TeleService) is a standard process(TIA/EIA-136-720) to support data exchange between a wireless telephone(i.e., a mobile station, MS) and a customer service center. OATSprovides guidance to properly providing message flows for activation ofan unprogrammed wireless telephone and for modifying of NAM parametersin a previously activated wireless telephone. FIGS. 5, 6, 7 and 8 toshow typical message flows that support the OATS procedures. Thepreamble message flow is shown in FIG. 5 and in FIG. 6 a message flowexample over a DTC (Digital Traffic Channel) is shown for activation ofan unprogrammed wireless telephone (i.e., MS).

Message flow, over a DTC, for a previously activated wireless telephoneis shown in the FIG. 7 and message flow over a DCCH for a previouslyactivated wireless telephone is shown in the FIG. 8. OATS is a procedureknown to those skilled in the art and further discussion is not believednecessary.

A DCCH search reference model is shown in flow chart form in the FIG. 9.It basically illustrates that the handset is powered on or in serviceand a DCCH is searched for. Analog and Digital is differentiated and ascan is made for a control channel. The process depends upon a scan ofcontrol channels and once a suitable control channel with acceptableservice is found the handset stops scanning and it camps on (i.e., lockson) the acceptable service. This procedure is part if TIA/EIA-136 and iswell known to those skilled in the art. Further description is notbelieved necessary.

The service portion of this invention utilizes an intranet-basedapplication program to communicate with the private system controller inpacket format. In a fully automatic instantiation, the controllerreceives the handset's MIN and ESN from the APSA unit, and may interactand/or update an authentication database to admit the new user. Suchupdates could conform to one of several service scenarios, depending onthe strength of access privileges, which may be deemed appropriate. Thefollowing are examples, but one skilled in the art will recognize thatother levels are possible:

1. Verify that the user is a member of the organization, which sponsorsthe private user community via access to a corporate database. Suchusers may be granted unlimited period of access with full privileges.

2. Identify the user as an invited visitor to the organization whowishes to access the system for a limited period of time and with eitherunlimited or limited privileges. In this case, security attendantintervention would be required to authorize access and active period.This operation could be accommodated by an Intranet application pageavailable at the security attendant's location.

3. Identify the user as a macrocellular subscriber (by accessing themacrocellular subscriber database) who will be allowed to access thesystem in order to achieve improved service in the building, but whoseservice will be billed through the macrocellular subscription.

4. Identify the user as having emergency only (911) authorization whilein the building.

Alternatively, an Internet-connected database accessible directly byindividuals requesting in-building service could permit insertion ofmobile phone number and service provider information in advance (withappropriate security firewalls). Access to this database would allowself-administration of services within the building, either for a fee orfor no-charge use. As an example of a situation where such a servicewould be useful is at a hotel or airline preferred-customer club.

Following user validation, via the designated database(s), thecontroller interworks with the APSA unit to transmit a System ID Message(PSID/RSID). This message, working with software in the handset,installs the PSID into the Number Assignment Module (NAM) memory areausing OATS. Following the requirements of TIA/EIA-136, after the handsetis programmed with a new Private SID, it preferentially locks onto theDCCH of the private system.

This invention could also be used to provision so-called“TelePoint-like” service to users in a particular local environment,such as malls, attractions, and conventions. Such service would allowcalls to be handled by a private cellular environment separately fromthe macrocellular system. Such applications could provide different callcharges, special features (e.g. enhanced local calling plans), or allowaccess to “underlay” cellular systems operating in service area coveredby a CAI-standard other than that used by the handset desiring service(e.g. encapsulated TIA/EIA-136 service in a European GSM service area,such as at an international airport). In these instances, a ResidentialSID may be used instead of the Private SID, but other procedures remainthe same.

While the invention has been exemplified in a specific embodiment, it isreadily apparent that many variations thereof exist which fall withinthe scope of the invention. Practice of these variations is within thescope of the invention. An exemplary variation is shown in the FIG. 10.The operating environment may be a wireless Centrex environment in ahome or small office environment in which wireless or cordlesscommunication devices are connected to a public network such as aninternet or PSTN (Public Switched Telephone network). In this embodimentthe voice access ports (VAPs) 151,152 and APSA 155 are connected viaISDN/BRI lines 157, 158, 159 to a local service provider's publicdigital switch 161 (e.g., 5ESS, DMS 100 switches, etc.). Many othervariations, of this invention, are equally envisioned by those skilledin the art.

What is claimed is:
 1. A secondary wireless communication systemoverlapped by a dominant wireless communication system, and includingradio access for activation and authentication of a wireless telephonein the secondary wireless communication system, comprising: an automatedprivate service activation (APSA) port for accepting access requests ofa wireless telephone seeking activation in the secondary wirelesscommunication system; the APSA port providing an access control channelradiating signals at a level exceeding a signal level of the accesscontrol channel only within limited spatial constraints; and a providingspace for receiving wireless telephone for activation in the secondarywireless communication system.
 2. The secondary wireless communicationsystem of claim 1, further comprising: the APSA port being part of acellular base station having both analog communication channels anddigital communication channels which operate under the TIA/EIA-136standard.
 3. The secondary wireless communication system of claim 2,further comprising: the APSA port includes a surface covering an antennafor abutting a wireless telephone against and communicating a controlchannel to the wireless telephone at a signal level sufficient toachieve access and authentication and exceeding at that abutting space acontrol channel signal level of the overlapping dominant wirelesscommunication system.
 4. The secondary wireless communication system ofclaim 2, further comprising: the APSA port further including an antennaaccessible to a wireless telephone seeking access and authentication andincluding shielding for blocking a control channel signal level of theoverlapping dominant wireless communication system.
 5. The secondarywireless communication system of claim 1, further comprising: a systemcontroller for providing digital switching and service featuresconnected to the APSA port via a standard line interface.
 6. Thesecondary wireless communication system of claim 5, further comprising:the controller further including a Network Service Platform (NSP) forproviding specific service and management functions.
 7. A method ofaccessing and achieving authentication from a secondary wirelesscommunication system in a region overlapped by a dominant wirelesscommunication system, comprising the steps of: creating access signalspace in which radiated access control signal levels of the secondarywireless communication system within the signal space exceed accesscontrol signal levels of the dominant wireless communication system;positioning a wireless telephone seeking access within the access signalspace and powering up the wireless telephone; searching by the wirelesstelephone for the strongest control channel; selecting the controlchannel of the secondary wireless communication system by reason ofpositioning of the wireless telephone within the access space; andauthorizing and authenticating the wireless telephone for operationwithin the secondary wireless communication system.
 8. The method ofclaim 7, further comprising the steps of: enabling the secondarywireless communication system to interwork with the dominant wirelesscommunication system; and authorizing and authenticating performed inaccordance with TDMA standards recognized under TIA/EIA-136.
 9. Themethod of claim 7, further comprising the steps of: enabling thesecondary wireless communication system to interwork with the dominantwireless communication system; and authorizing and authenticatingperformed in accordance with analog standards.
 10. The method of claim7, further comprising the step of: authorizing and authenticating basedon information retrieved from a database of the dominant wirelesscommunication system to enable billing of service through subscriptionto that system.
 11. The method of claim 7, further comprising the stepof: authorizing and authenticating structured to use a SubscriberIDentification (SID) code, wherein the SID code is inserted into thewireless telephone at initial authorization and authentication, andwherein the SID code is unique to the secondary wireless systems so thatpost initial authorization and authentication the wireless telephonepreferentially locks on to the secondary wireless communication system.12. The method of claim 11, further comprising the step of: operatingthe wireless telephone in the secondary wireless system in substitutionfor the dominant wireless communication system.
 13. A method ofactivating and authenticating a wireless telephone of a new user in asecondary wireless communication system in a region overlapped by adominant wireless communication system, comprising the steps of:enabling the activating and authenticating within a limited sub-regionof the region overlapped by a dominant wireless communication system andwithin that sub-region including the steps of: providing a mobileidentification number (MIN) and an electronic serial number (ESN) froman Automatic Private Service Activation (APSA) unit of the secondarysystem; and interact with a secondary system database to provide arecord and enable service to the new user.
 14. The method of claim 13,further a comprising the step of: installing a private systemidentification number (PSID) into a number assignment Module (NAM). 15.The method of claim 13, further comprising the step of: installing by anover the air Activation system (OATS) process.
 16. The method of claim13, further comprising: locking onto a Digital Control Channel (DCCH) ofthe secondary wireless system.
 17. A secondary wireless communicationsystem overlapped by a dominant wireless communication system, andincluding radio access for activation and authentication of a wirelesstelephone in the secondary wireless communication system, comprising: aninternet/intranet-connected database including user lists and userfeatures and characteristics and accessible to individuals requestingservice in the secondary wireless communication system and allowing theindividuals to insert information concerning mobile station number andaccess information in advance of implementing access requests; anautomated private service activation (APSA) port for accepting theaccess requests of a wireless telephone seeking activation in thesecondary wireless communication system.
 18. The wireless communicationsystem of claim 17, further comprising: the APSA port providing anaccess control channel radiating signals at a level exceeding a signallevel of the access control channel only within limited spatialconstraints; and a providing space for receiving wireless telephones foractivation in the secondary wireless communication system.
 19. In awireless centrex environment, a secondary wireless communication systemoverlapped by a dominant wireless communication system, and includingradio access for activation and authentication of a wireless telephonein the secondary wireless communication system, comprising: a pluralityof voice access ports (VAP) connected to a local digital switchassociated with a public switched telephone network (PSTN); and anautomated private service activation (APSA) port for accepting theaccess requests of a wireless telephone seeking activation in thesecondary wireless communication system; wherein the APSA port isconnected to a local digital switch associated with a PSTN; and whereinthe APSA port provides an access control channel radiating signals at alevel exceeding a signal level of the access control channel only withinlimited spatial constraints.