Abstract:
A method of using a ciphering key in a mobile station (18) from a first base station (12) in a first cellular communications system controlled by a first mobile switching control (10) station to a second base station in a second, different cellular system controlled by a second mobile switching control station is described. The method comprises generating for the mobile station a cipher key for use by the mobile station during communication in the second cellular communications system. The cipher key is generated by the mobile station from a private key assigned to the mobile station for the second cellular communications system and from a random number generated by the second cellular communications system. The cipher key is then communicated to the first mobile system and a private long code is generated for use by the mobile station during communication in the first cellular communications system.
Abstract:
A general global gateway (GGG) internetworks between a first network and a second network so that a mobile station having a subscription in a first network can roam into a second network and be authenticated to use the second network. The GGG obtains authentication parameters from the mobile station and determines whether the authentication parameters satisfy GGG authentication criteria. If it does, then the GGG accesses the first network and stores authentication information from the first network for subsequent accesses to the first network by the mobile station.
Abstract:
A network operator identifier is used to uniquely identify each network operator to support international roaming. The network operator identifier includes (1) a Mobile Country Code (MCC) that identifies the country in which a network operator belongs and (2) a Network Operator Code (NOC), which may be a Mobile Network Code (MNC), that distinguishes network operators within a given MCC. Each network operator is assigned a unique combination of MCC and NOC that distinctly identifies the network operator, and the network operator identifier can be stored in a single entry in a preferred roaming list. The base stations of each network operator broadcast the network operator identifier in signaling messages. A mobile station receives a signaling message from a base station, obtains the network operator identifier, searches its preferred roaming list for an entry with the network operator identifier, and determines whether or not the current CDMA network is accessible.
Abstract:
In a wireless communication system, a method and apparatus of communicating between at least one base station and a core network is claimed. Signaling messages and voice streams are transported using packet-switched protocols (IP). A CIC field (Circuit Identity Code) is used to identify at least one VoIP streams. The CIC field may be interpreted as a UDP port number for the voice over IP stream. Also, a synchronization source or contributing source filed of a RTP header may be used as the CIC field (fig. 1).