When a network pages the temporary user mobile identifier of a 
mobile station, the 
mobile station sends a response to the network. Next, the network checks the authenticity of the user using a ciphering key, corresponding to the temporary user mobile identifier and a random number. If the temporary user mobile identifier is authenticated, a normal incoming call acceptance procedure is executed. If the 
mobile station is authenticated although the temporary user mobile identifier is wrong, the network reassigns a new temporary user mobile identifier to the mobile 
station and stops the current communication. In communication, the network and the mobile 
station mutually notify encipherment-onset time and negotiate about encipherment manner with each other. In addition, diversity 
handover is commenced upon a call attempt. Furthermore, if a 
branch replacement is necessary, the current 
branch is replaced by new branches capable of executing the diversity 
handover. Additionally, when a new call occurs to or from the mobile 
station capable of treating a plurality of calls simultaneously, the mobile station uses the same 
branch structure and the same communication 
frequency band for all of calls. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, a 
branch structure and a communication 
frequency band, which can continue all of the calls, are selected and used. Therefore, the mobile 
communications system is suitable for transmission of various sorts of data in accordance with the development of 
multimedia.