When a network pages the temporary user mobile identifier of a
mobile station, the
mobile station sends a response to the network. Next, the network checks the authenticity of the user using a ciphering key, corresponding to the temporary user mobile identifier and a random number. If the temporary user mobile identifier is authenticated, a normal incoming call acceptance procedure is executed. If the
mobile station is authenticated although the temporary user mobile identifier is wrong, the network reassigns a new temporary user mobile identifier to the mobile
station and stops the current communication. In communication, the network and the mobile
station mutually notify encipherment-onset time and negotiate about encipherment manner with each other. In addition, diversity
handover is commenced upon a call attempt. Furthermore, if a
branch replacement is necessary, the current
branch is replaced by new branches capable of executing the diversity
handover. Additionally, when a new call occurs to or from the mobile
station capable of treating a plurality of calls simultaneously, the mobile station uses the same
branch structure and the same communication
frequency band for all of calls. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, a
branch structure and a communication
frequency band, which can continue all of the calls, are selected and used. Therefore, the mobile
communications system is suitable for transmission of various sorts of data in accordance with the development of
multimedia.