WO2011130681A1 - Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node - Google Patents

Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node Download PDF

Info

Publication number
WO2011130681A1
WO2011130681A1 PCT/US2011/032754 US2011032754W WO2011130681A1 WO 2011130681 A1 WO2011130681 A1 WO 2011130681A1 US 2011032754 W US2011032754 W US 2011032754W WO 2011130681 A1 WO2011130681 A1 WO 2011130681A1
Authority
WO
WIPO (PCT)
Prior art keywords
security context
message
network node
serving network
key
Prior art date
Application number
PCT/US2011/032754
Other languages
French (fr)
Inventor
Adrian Edward Escott
Anand Palanigounder
Original Assignee
Qualcomm Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/084,353 external-priority patent/US8848916B2/en
Priority to UAA201213040A priority Critical patent/UA106531C2/en
Priority to EP11717849.1A priority patent/EP2559292B1/en
Priority to CN201180019386.5A priority patent/CN102845105B/en
Priority to BR112012026451-6A priority patent/BR112012026451B1/en
Priority to AU2011239421A priority patent/AU2011239421B2/en
Priority to CA2796511A priority patent/CA2796511C/en
Priority to JP2013505194A priority patent/JP5649248B2/en
Application filed by Qualcomm Incorporated filed Critical Qualcomm Incorporated
Priority to RU2012148695/07A priority patent/RU2525083C2/en
Priority to SG2012076642A priority patent/SG184878A1/en
Priority to KR1020127030016A priority patent/KR101474094B1/en
Publication of WO2011130681A1 publication Critical patent/WO2011130681A1/en
Priority to IL222458A priority patent/IL222458A/en
Priority to ZA2012/08617A priority patent/ZA201208617B/en
Priority to HK13107003.5A priority patent/HK1179804A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Definitions

  • the present invention relates generally to an enhanced security context for user equipment operating in a Universal Mobile Telecommunications Service (UMTS), GSM Edge Radio Access Network (GERAN), and/or Long Term Evolution (LTE) or Evolved UTRAN (E-UTRAN).
  • UMTS Universal Mobile Telecommunications Service
  • GERAN GSM Edge Radio Access Network
  • LTE Long Term Evolution
  • E-UTRAN Evolved UTRAN
  • a successful AKA (Authentication and Key Agreement) authentication in a LTE fourth generation (4G) network or (UMTS third generation (3G) radio access network or in a GERAN networks using 3G AKA authentication results in a pair of shared keys, a cipher key (CK) and an integrity key (IK), for securing communications between a user equipment (UE) and the network.
  • the shared keys may be used directly to secure the traffic between the UE and the network as in the case of UTRAN (UMTS Terrestrial Radio Access Network), or may be used to statically derive keys, e.g., KAS ME or keys derived from it, in the case of E-UTRAN and Kc or Kci28, in the case of GERAN (GSM Edge Radio Access Network).
  • a compromised key may result in serious security problems until the keys are changed at a next AKA authentication. Typically, the AKA authentication is not run often due to the significant overhead required. Also, if both keys (CK and IK) are compromised, then the keys used between the UE and the serving Radio Access Network may also get compromised.
  • CK and IK both keys
  • the keys used between the UE and the serving Radio Access Network may also get compromised.
  • R C radio network controller
  • Node B may be collapsed together into one node at the edge of the network.
  • the RNC needs the keys for functionalities such as user plane ciphering and signaling plane ciphering and integrity protection.
  • the RNC functionality may be deployed in an exposed location such as in a Home Node B in a UMTS Femtocell. Accordingly, RNC functionality deployed in possibly insecure locations providing access (including physical access) may allow the keys, CK and IK, to be compromised.
  • Session keys (modified version of CK and IK) may be used to lower the security risks associated with exposed RNC functionality. Techniques for providing such session keys are disclosed in U.S. Patent Application Publication No. US 2007/0230707 Al .
  • An aspect of the present invention may reside in a method for transitioning a remote station from a current serving network node having first security context to a new serving network node.
  • the remote station provides at least one legacy key associated with a second security context, wherein the first security context includes a security property that is not supported by the second security context.
  • the remote station generates at least one session key, in accordance with the first security context, based on an information element associated with the first security context.
  • the remote station forwards a first message to the new serving network node.
  • the first message includes the information element associated with the first security context.
  • the remote station receives, in response to the first message, a second message from the new serving network node.
  • the second message has a response based on either the at least one legacy key or the at least one session key.
  • the remote station determines that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key. Accordingly, the remote station protects communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
  • the information element may comprise a count value.
  • the count value may be updated for a session.
  • the first security context may be an enhanced UMTS security context
  • the second security context may be a legacy security context.
  • the second message may include a message authentication code (MAC), and the remote station may determine that the response is based on the at least one legacy key by determining that the MAC was calculated using the at least one legacy key.
  • the remote station may comprise a mobile user equipment
  • a remote station may include means for providing at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context; means for generating at least one session key, in accordance with the first security context, based on an information element associated with the first security context; means for forwarding a first message to a new serving network node, wherein the first message includes the information element signaling associated with the first security context; means for receiving, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; means for determining that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and means for protecting communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
  • a remote station which may include a processor configured to: provide at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context; generate at least one session key, in accordance with the first security context, based on an information element associated with the first security context; forward a first message to a new serving network node, wherein the first message includes the information element associated with the first security context; receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; determine that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and protect communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
  • Another aspect of the invention may reside in a computer program product, comprising computer-readable storage medium, comprising code for causing a computer to provide at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context; code for causing a computer to generate at least one session key, in accordance with the first security context, based on an information element associated with the first security context; code for causing a computer to forward a first message to a new serving network node, wherein the first message includes the information element associated with the first security context; code for causing a computer to receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; code for causing a computer to determine that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and code for causing
  • FIG. 1 is a block diagram of an example of a wireless communication system.
  • FIG. 2 is a block diagram of an example of a wireless communication system in accordance with a UMTS/UTRAN architecture.
  • FIG. 3 is a block diagram of an example of a wireless communication system in accordance with a GERAN architecture.
  • FIG. 4 is a flow diagram of a method for transitioning a remote station from a serving network node having an enhanced security context to a new serving network node.
  • FIG. 5 is a flow diagram of a method for establishing an enhanced security context between a remote station and a serving network based on an attach request message.
  • FIG. 6 is a flow diagram of a method for establishing at least one session key from an enhanced security context between a remote station and a serving network based on a service request message.
  • FIG. 7 is a flow diagram of a method for establishing at least one session key from an enhanced security context between a remote station and a serving network based on a routing area update request message.
  • FIG. 8 is a block diagram of a computer including a processor and a memory.
  • FIG. 9 is a block diagram of an example of a wireless communication system in accordance with an E-UTRAN architecture.
  • FIG. 10 is a flow diagram of a method for transitioning a remote station from a serving network node having an enhanced security context to a new serving network node.
  • an aspect of the present invention may reside in a method 400 for transitioning a remote station 210 from a serving network node 230 having an enhanced security context to a new serving network node 230'.
  • the remote station provides at least one legacy key (step 410) and generates at least one session key, in accordance with the enhanced security context, based on an information element associated with the enhanced security context (step 420).
  • the remote station forwards a first message to the new serving network node (step 430).
  • the first message includes the information element associated with the enhanced security context.
  • the remote station receives, in response to the first message, a second message from the new serving network node (step 440).
  • the second message has a response based on either the at least one legacy key or the at least one session key.
  • the remote station determines that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key (step 450). Accordingly, the remote station protects communications based on the legacy key upon determining that the new serving network node does not support the enhanced security context (step 460).
  • the information element may comprise a count value.
  • a remote station 210 may include means (processor 810) for providing at least one legacy key; means for generating at least one session key, in accordance with an enhanced security context, based on an information element associated with the enhanced security context; means for forwarding a first message to a new serving network node, wherein the first message includes the information element signaling associated with the enhanced security context; means for receiving, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; means for determining that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key; and means for protecting communications based on the legacy key upon determining that the new serving network node does not support the enhanced security context.
  • a remote station 210 which may include a processor 810 configured to: provide at least one legacy key; generate at least one session key, in accordance with an enhanced security context, based on an information element associated with the enhanced security context; forward a first message to a new serving network node, wherein the first message includes the information element associated with the enhanced security context; receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; determine that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key; and protect communications based on the legacy key upon determining that the new serving network node does not support the enhanced security context.
  • Another aspect of the invention may reside in a computer program product, comprising computer-readable storage medium 820, comprising code for causing a computer 800 to provide at least one legacy key; code for causing a computer to generate at least one session key, in accordance with the enhanced security context, based on an information element associated with the enhanced security context; code for causing a computer to forward a first message to a new serving network node, wherein the first message includes the information element associated with the enhanced security context; code for causing a computer to receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; code for causing a computer to determine that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key; and code for causing a computer to protect communications based on the legacy key upon determining that the new serving network node does not support the enhanced security context.
  • the serving core network 230 is connected to a serving RAN (Radio Access
  • the serving RAN includes a Node B and a RNC (Radio Network Controller).
  • the serving RAN includes a BTS (Base Transceiver Station) and a BSC (Base Station Controller).
  • the serving core network includes an MSC/VLR (Mobile Switching Center/Visitor Location Register) for providing circuit-switched (CS) service, and an SGSN (Serving GPRS Support Node) for providing packet-switched (PS) services.
  • the home network includes an HLR (Home Location Register) and an AuC (Authentication Center).
  • the UE 210 and the serving core network 230 may be enhanced with new security properties to create an enhanced UMTS security context (ESC) using a COUNT (counter value).
  • a 256-bit root key (KASMEU) for the ESC may be derived from the CK and IK when AKA authentication is performed.
  • the root key may be set equal to CK
  • the COUNT may be a 16-bit counter value that is maintained between the UE and the serving core network.
  • a legacy UTRAN security context consists of KSI (a 3 -bit Key Set Identifier), CK (a 128-bit encryption key), and IK (a 128-bit integrity key).
  • the present invention provides a technique to smoothly fallback to legacy nodes from enhanced nodes.
  • Mobile equipment / User Equipment that supports the ESC may be designated UE+.
  • An SGSN and an MSC/VLR that supports ESC may be designated SGSN+ and MSC/VLR+.
  • the ESC is an example of the first security context. (A legacy SGSN and MSC/VLR are indicated without the plus sign.)
  • the method for fallback to legacy nodes is independent of the method used to determine the session keys. Not supporting the ESC is an example of the second security context.
  • the UE+ 210 and the SGSN+ or MSC/VLR+ share the ESC which includes KSI (key set identifier) as currently used in UMTS/GERAN, and the root key KASMEU-
  • the session keys CK ⁇ and IK ⁇ are calculated from the root key KASMEU an d the parameter (e.g., the COUNT value) exchanged between the UE+ and the SGSN+ or MSC/VLR+ (step 1010).
  • the SGSN+ 230 or MSC/VLR+ also derive CKL and IKL (step 1020), which function as legacy keys, from KASMEU an d fixed parameters such that CKL and IKL are cryptographically independent of each other, i.e., knowing CKL and IKL does not reveal KASMEU ⁇
  • the ESC parameters may be moved from an SGSN+ 230 or MSC/VLR+ to a target SGSN 230' or MSC/VLR that does not support the ESC.
  • the source SGSN+ or MSC/VLR+ includes CK L and IK L in the Information Elements (IEs) that carry the legacy IK and CK (i.e., in the existing CK/IK IEs) (step 1040.
  • K A SMEU is m a new IE (step 1050).
  • the COUNT value is also provided to the target to permit derivation of session keys (step 1060). If the target SGSN or MSC/VLR that does not support the ESC, it will ignore the new IEs and use CKL and IKL as the legacy CK and IK.
  • the UE+ includes in its messages to the target the relevant information to calculate the session keys.
  • the UE+ does not know yet whether the target supports the ESC. If the target is a legacy node (e.g., does not understand the ESC), then it uses CKL and IK L received from the source SGSN+ or MSC/VLR+ as the legacy UMTS security context (along with KSI/CKSN). If the target supports the ESC, then it can continue the use of the ESC.
  • the target SGSN+ or MSC/VLR+ signals its support of the ESC to the UE.
  • the UE+ may receive the SMC (security mode command) from the SMC (security mode command) from the SMC (security mode command).
  • the UE+ uses both the IKL and IK ⁇ to determine whether the ESC is supported by the target SGSN (or MSC/VLR) (step 1080). More specifically, the UE+ calculates the MAC for the SMC using both IK L and IK S . The UE+ checks the calculated MAC with the MAC value included in the SMC. If the received MAC is equal to the MAC calculated with IK ⁇ , then the target supports the ESC. If the received MAC is equal to the MAC calculated with IKL, then the target does not support the ESC (step 1090). Otherwise, the UE+ rejects the received message (e.g., SMC) due to integrity failure.
  • the received message e.g., SMC
  • GERAN PS the SGSN+ signals its support of the ESC in the Authentication and Ciphering message.
  • GERAN CS if security is enabled before signaling of MSC capabilities can be received by the UE+, GERAN key Kc or Kci 28 derived from CKL and IK L may be used temporarily until a switch is possible.
  • both the target and the UE+ fall back to using a legacy security context with CKL and IKL as the CK and IK.
  • the target could signal support for the ESC in the SMC (e.g., by adding a new IE that the RNC received from the SGSN+ or MSC/VLR+). If no indication is received, the UE+ may assume it is communicating with a legacy SGSN or MSC/VLR.
  • This alternative enhancement requires changes to the RNC (i.e., the RNC has to upgraded to send the SMC's with the new IEs).
  • Connected Mode active mode
  • the UE+ determines the capability of the target SGSN (e.g., SMC is not possible in connected mode or it will result in a break in the on-going call/session, which is not preferable).
  • the source SGSN includes
  • CK S and IK S in the legacy CK and IK IEs.
  • Both the target SGSN and the UE+ realize that the target SGSN only supports a legacy context through subsequent signaling (e.g., idle mode or service requests or SMC) and will fallback to a legacy security context with CKs and IK ⁇ . This is different from idle mode where C3 ⁇ 4 and IKL are used as the IK and CK by the legacy nodes.
  • the target SGSN+ supports the ESC, it uses the root key KASMEU to derive the ESC as described before.
  • the UE 210 may signal that it supports ESC in a UMTS attach request message (step 510).
  • the support signal may be the presence of a new information element (IE) in the message.
  • the IE may comprise the COUNT value.
  • a serving network SN 230 that does not support ESC will ignore the new IE.
  • Authentication data (RAND, XRES, CK, IK, AUTN) is obtained from the HLR/AuC 240 (step 515).
  • the SN may indicate ESC support in the AKA challenge (Authentication Request) to the UE (step 520).
  • the UE performs the authentication procedures (step 525) and returns a response RES to the SN (step 530).
  • the UE and SN derive the root key KASMEU an d the session keys CKs and IKs (step 535).
  • the SN forwards the session keys to the RAN 220 in an SMC (Security Mode Command) message (step 540).
  • the RAN generates a message authentication code (MAC) using the session key IK S , which is forwarded to the UE in an SMC message (step 545).
  • MAC message authentication code
  • the UE checks the MAC (step 550) using the session key IK S that the UE derived (step 535), and returns a complete indication to the RAN (step 555), which forwards it to the SN (step 560). The UE is then able to protect communications using the session keys (step 565).
  • the UE 210 forwards a service request message which includes the COUNT value to the SN 230 (step 610).
  • the UE and SN derive new the session keys CKs and IKs from the root key KASMEU (step 620).
  • the SN forwards the session keys to the RAN 220 in an SMC message (step 630).
  • the RAN generates a MAC, which is forwarded to the UE in an SMC message (step 640).
  • the UE checks the MAC (step 650), and returns a complete indication to the RAN (step 660), which forwards it to the SN (step 670).
  • the UE is then able to protect communications using the session keys (step 680).
  • a method 700 related to mobility management procedures 700 (such as a Routing Area Update (RAU) or Location Area Update (LAU)
  • the UE 210 forwards a RAU (or LAU) request message which includes the COUNT value to the SN 230 (step 710).
  • the UE and SN may derive new the session keys CK ⁇ and IK ⁇ from the root key KASMEU (step 720)
  • the SN may forward the session keys to the RAN 220 in an SMC message (step 730).
  • the RAN may generate a MAC, which may be forwarded to the UE in an SMC message (step 740).
  • the UE may check the MAC (step 750), and may return a complete indication to the RAN (step 760), which forwards it to the SN (step 770).
  • the SN then sends a RAU accept message to the UE (step 780).
  • the UE is then able to protect communications using the session keys.
  • New access stratum (AS) keys may be generated for each transition from Idle to
  • the COUNT value may be sent in idle mobility messages and in initial layer 3 messages, e.g., Attaches, RAUs, LAUs, for idle, mobility, or service request.
  • the SN may check that the sent COUNT value has not been used before, and updates the stored COUNT value in the process. If the COUNT value is new (e.g., received COUNT value > stored COUNT value), the UE and the SN proceed to calculate the new key CK ⁇ and IK ⁇ , using a Key Derivation Function (KDF) such as HMAC-SHA256, from the root key KASMEU an d the sent COUNT value.
  • KDF Key Derivation Function
  • the KDF may include additional information, such as RAN node identity, for the new key calculation.
  • the SN rejects the message.
  • Kc and Kc ⁇ s are calculated from CK ⁇ and IK ⁇ , it may be done in the same manner as when calculated from CK and IK.
  • the session keys may have a lifetime such that the UE and the serving network keep and use the session keys until either it is no longer necessary to store the keys to send traffic securely between the UE and the network (UE moves to Idle mode), or a new context is created at a subsequent event (e.g., AKA authentication or a mobility event).
  • An SGSN will treat CK' as the legacy CK and the IK' as the legacy IK, and ignore the K A SME, whereas an SGSN+ will treat KASME as it's KASMEU and CK' as it's CKs and IK' as it IKs.
  • MME and E-UTRAN will be considered as an enhanced serving network as the security context transferred from E-UTRAN is always considered as the enhanced security context.
  • the remote station 210 may comprise a computer 800 that includes a storage medium 820 such as memory, a display 830, and an input device 840 such as a keyboard.
  • the apparatus may include a wireless connection 850.
  • a wireless remote station (RS) 102 may communicate with one or more base stations (BS) 104 of a wireless communication system 100.
  • the wireless communication system 100 may further include one or more base station controllers (BSC) 106, and a core network 108.
  • Core network may be connected to an Internet 1 10 and a Public Switched Telephone Network (PSTN) 1 12 via suitable backhauls.
  • PSTN Public Switched Telephone Network
  • a typical wireless remote station may include a handheld phone, or a laptop computer.
  • the wireless communication system 100 may employ any one of a number of multiple access techniques such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), space division multiple access (SDMA), polarization division multiple access (PDMA), or other modulation techniques known in the art.
  • CDMA code division multiple access
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • SDMA space division multiple access
  • PDMA polarization division multiple access
  • a wireless device 102 may include various components that perform functions based on signals that are transmitted by or received at the wireless device.
  • a wireless headset may include a transducer adapted to provide an audio output based on a signal received via the receiver.
  • a wireless watch may include a user interface adapted to provide an indication based on a signal received via the receiver.
  • a wireless sensing device may include a sensor adapted to provide data to be transmitted to another device.
  • a wireless device may communicate via one or more wireless communication links that are based on or otherwise support any suitable wireless communication technology.
  • a wireless device may associate with a network.
  • the network may comprise a body area network or a personal area network (e.g., an ultra-wideband network).
  • the network may comprise a local area network or a wide area network.
  • a wireless device may support or otherwise use one or more of a variety of wireless communication technologies, protocols, or standards such as, for example, CDMA, TDMA, OFDM, OFDMA, WiMAX, and Wi-Fi.
  • a wireless device may support or otherwise use one or more of a variety of corresponding modulation or multiplexing schemes.
  • a wireless device may thus include appropriate components (e.g., air interfaces) to establish and communicate via one or more wireless communication links using the above or other wireless communication technologies.
  • a device may comprise a wireless transceiver with associated transmitter and receiver components (e.g., a transmitter and a receiver) that may include various components (e.g., signal generators and signal processors) that facilitate communication over a wireless medium.
  • the teachings herein may be incorporated into (e.g., implemented within or performed by) a variety of apparatuses (e.g., devices).
  • a phone e.g., a cellular phone
  • PDA personal data assistant
  • an entertainment device e.g., a music or video device
  • a headset e.g., headphones, an earpiece, etc.
  • a microphone e.g., a medical device, e.g., a biometric sensor, a heart rate monitor, a pedometer, an EKG device, etc.
  • a user I/O device e.g., a watch, a remote control, a light switch, a keyboard, a mouse, etc.
  • a tire pressure monitor e.g., a computer, a point-of-sale device, an entertainment device, a hearing aid, a set-top box, or any other suitable device.
  • teachings herein may be adapted for use in low power applications (e.g., through the use of an impulse-based signaling scheme and low duty cycle modes) and may support a variety of data rates including relatively high data rates (e.g., through the use of high-bandwidth pulses).
  • a wireless device may comprise an access device (e.g., a Wi-Fi access point) for a communication system.
  • an access device may provide, for example, connectivity to another network (e.g., a wide area network such as the Internet or a cellular network) via a wired or wireless communication link.
  • the access device may enable another device (e.g., a Wi-Fi station) to access the other network or some other functionality.
  • another device e.g., a Wi-Fi station
  • one or both of the devices may be portable or, in some cases, relatively non-portable.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • a software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium.
  • the storage medium may be integral to the processor.
  • the processor and the storage medium may reside in an ASIC.
  • the ASIC may reside in a user terminal.
  • the processor and the storage medium may reside as discrete components in a user terminal.
  • the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software as a computer program product, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
  • Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage media may be any available media that can be accessed by a computer.
  • such computer- readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • any connection is properly termed a computer-readable medium.
  • the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave
  • the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium.
  • Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed is a method for transitioning a remote station from a current serving network node having an enhanced security context to a new serving network node. In the method, the remote station provides at least one legacy key, and generates at least one session key based on an information element associated with the enhanced security context. The remote station forwards a first message having the information element to the new serving network node. The remote station receives a second message, from the new serving network node, having a response based on either the legacy key or the session key. The remote station determines that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key. Accordingly, the remote station protects communications based on the legacy key upon determining that the enhanced security context is not supported.

Description

APPARATUS AND METHOD FOR TRANSITIONING FROM A SERVING NETWORK NODE THAT SUPPORTS AN ENHANCED SECURITY CONTEXT TO A LEGACY SERVING NETWORK NODE
BACKGROUND
Cross-Reference to Related Applications
[0001] This application claims the benefit of U.S. Provisional Application No.
61/324,991, filed April 16, 2010, which application is incorporated herein by reference.
Field
[0002] The present invention relates generally to an enhanced security context for user equipment operating in a Universal Mobile Telecommunications Service (UMTS), GSM Edge Radio Access Network (GERAN), and/or Long Term Evolution (LTE) or Evolved UTRAN (E-UTRAN).
Background
[0003] A successful AKA (Authentication and Key Agreement) authentication in a LTE fourth generation (4G) network or (UMTS third generation (3G) radio access network or in a GERAN networks using 3G AKA authentication results in a pair of shared keys, a cipher key (CK) and an integrity key (IK), for securing communications between a user equipment (UE) and the network. The shared keys may be used directly to secure the traffic between the UE and the network as in the case of UTRAN (UMTS Terrestrial Radio Access Network), or may be used to statically derive keys, e.g., KASME or keys derived from it, in the case of E-UTRAN and Kc or Kci28, in the case of GERAN (GSM Edge Radio Access Network).
[0004] A compromised key may result in serious security problems until the keys are changed at a next AKA authentication. Typically, the AKA authentication is not run often due to the significant overhead required. Also, if both keys (CK and IK) are compromised, then the keys used between the UE and the serving Radio Access Network may also get compromised. [0005] In UMTS/HSPA (High Speed Packet Access) deployments, some or all of functionalities of a radio network controller (R C) and a Node B may be collapsed together into one node at the edge of the network. The RNC needs the keys for functionalities such as user plane ciphering and signaling plane ciphering and integrity protection. However, the RNC functionality may be deployed in an exposed location such as in a Home Node B in a UMTS Femtocell. Accordingly, RNC functionality deployed in possibly insecure locations providing access (including physical access) may allow the keys, CK and IK, to be compromised.
[0006] Session keys (modified version of CK and IK) may be used to lower the security risks associated with exposed RNC functionality. Techniques for providing such session keys are disclosed in U.S. Patent Application Publication No. US 2007/0230707 Al .
[0007] Unfortunately, the use of such session keys require upgrade modifications to the serving networks. However, networks operators are likely to upgrade serving networks in a staged manner.
[0008] There is therefore a need for a technique for a remote station to interoperate with serving network nodes supporting an enhanced security context and with legacy serving network nodes.
SUMMARY
[0009] An aspect of the present invention may reside in a method for transitioning a remote station from a current serving network node having first security context to a new serving network node. In the method, the remote station provides at least one legacy key associated with a second security context, wherein the first security context includes a security property that is not supported by the second security context. The remote station generates at least one session key, in accordance with the first security context, based on an information element associated with the first security context. The remote station forwards a first message to the new serving network node. The first message includes the information element associated with the first security context. The remote station receives, in response to the first message, a second message from the new serving network node. The second message has a response based on either the at least one legacy key or the at least one session key. The remote station determines that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key. Accordingly, the remote station protects communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
[0010] In more detailed aspects of the invention, the information element may comprise a count value. The count value may be updated for a session. The first security context may be an enhanced UMTS security context, and the second security context may be a legacy security context. The second message may include a message authentication code (MAC), and the remote station may determine that the response is based on the at least one legacy key by determining that the MAC was calculated using the at least one legacy key. The remote station may comprise a mobile user equipment
[0011] Another aspect of the invention may reside in a remote station which may include means for providing at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context; means for generating at least one session key, in accordance with the first security context, based on an information element associated with the first security context; means for forwarding a first message to a new serving network node, wherein the first message includes the information element signaling associated with the first security context; means for receiving, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; means for determining that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and means for protecting communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
[0012] Another aspect of the invention may reside in a remote station which may include a processor configured to: provide at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context; generate at least one session key, in accordance with the first security context, based on an information element associated with the first security context; forward a first message to a new serving network node, wherein the first message includes the information element associated with the first security context; receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; determine that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and protect communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
Another aspect of the invention may reside in a computer program product, comprising computer-readable storage medium, comprising code for causing a computer to provide at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context; code for causing a computer to generate at least one session key, in accordance with the first security context, based on an information element associated with the first security context; code for causing a computer to forward a first message to a new serving network node, wherein the first message includes the information element associated with the first security context; code for causing a computer to receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; code for causing a computer to determine that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and code for causing a computer to protect communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] FIG. 1 is a block diagram of an example of a wireless communication system.
[0015] FIG. 2 is a block diagram of an example of a wireless communication system in accordance with a UMTS/UTRAN architecture.
[0016] FIG. 3 is a block diagram of an example of a wireless communication system in accordance with a GERAN architecture.
[0017] FIG. 4 is a flow diagram of a method for transitioning a remote station from a serving network node having an enhanced security context to a new serving network node.
[0018] FIG. 5 is a flow diagram of a method for establishing an enhanced security context between a remote station and a serving network based on an attach request message.
[0019] FIG. 6 is a flow diagram of a method for establishing at least one session key from an enhanced security context between a remote station and a serving network based on a service request message.
[0020] FIG. 7 is a flow diagram of a method for establishing at least one session key from an enhanced security context between a remote station and a serving network based on a routing area update request message.
[0021] FIG. 8 is a block diagram of a computer including a processor and a memory.
[0022] FIG. 9 is a block diagram of an example of a wireless communication system in accordance with an E-UTRAN architecture.
[0023] FIG. 10 is a flow diagram of a method for transitioning a remote station from a serving network node having an enhanced security context to a new serving network node.
DETAILED DESCRIPTION
[0024] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
[0025] With reference to FIGS. 2 though 4, an aspect of the present invention may reside in a method 400 for transitioning a remote station 210 from a serving network node 230 having an enhanced security context to a new serving network node 230'. In the method, the remote station provides at least one legacy key (step 410) and generates at least one session key, in accordance with the enhanced security context, based on an information element associated with the enhanced security context (step 420). The remote station forwards a first message to the new serving network node (step 430). The first message includes the information element associated with the enhanced security context. The remote station receives, in response to the first message, a second message from the new serving network node (step 440). The second message has a response based on either the at least one legacy key or the at least one session key. The remote station determines that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key (step 450). Accordingly, the remote station protects communications based on the legacy key upon determining that the new serving network node does not support the enhanced security context (step 460). The information element may comprise a count value.
[0026] With further reference to FIG. 8, another aspect of the invention may reside in a remote station 210 which may include means (processor 810) for providing at least one legacy key; means for generating at least one session key, in accordance with an enhanced security context, based on an information element associated with the enhanced security context; means for forwarding a first message to a new serving network node, wherein the first message includes the information element signaling associated with the enhanced security context; means for receiving, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; means for determining that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key; and means for protecting communications based on the legacy key upon determining that the new serving network node does not support the enhanced security context.
[0027] Another aspect of the invention may reside in a remote station 210 which may include a processor 810 configured to: provide at least one legacy key; generate at least one session key, in accordance with an enhanced security context, based on an information element associated with the enhanced security context; forward a first message to a new serving network node, wherein the first message includes the information element associated with the enhanced security context; receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; determine that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key; and protect communications based on the legacy key upon determining that the new serving network node does not support the enhanced security context.
[0028] Another aspect of the invention may reside in a computer program product, comprising computer-readable storage medium 820, comprising code for causing a computer 800 to provide at least one legacy key; code for causing a computer to generate at least one session key, in accordance with the enhanced security context, based on an information element associated with the enhanced security context; code for causing a computer to forward a first message to a new serving network node, wherein the first message includes the information element associated with the enhanced security context; code for causing a computer to receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key; code for causing a computer to determine that the new serving network node does not support the enhanced security context if the response of the second message is based on the legacy key; and code for causing a computer to protect communications based on the legacy key upon determining that the new serving network node does not support the enhanced security context.
[0029] The serving core network 230 is connected to a serving RAN (Radio Access
Network) 220 which provides wireless communications to the remote station 210. In a UMTS/UTRAN architecture, the serving RAN includes a Node B and a RNC (Radio Network Controller). In a GERAN architecture, the serving RAN includes a BTS (Base Transceiver Station) and a BSC (Base Station Controller). The serving core network includes an MSC/VLR (Mobile Switching Center/Visitor Location Register) for providing circuit-switched (CS) service, and an SGSN (Serving GPRS Support Node) for providing packet-switched (PS) services. The home network includes an HLR (Home Location Register) and an AuC (Authentication Center).
[0030] The UE 210 and the serving core network 230 may be enhanced with new security properties to create an enhanced UMTS security context (ESC) using a COUNT (counter value). A 256-bit root key (KASMEU) for the ESC may be derived from the CK and IK when AKA authentication is performed. The root key may be set equal to CK||IK, or it may be derived using a more complex derivation resulting in additional useful security properties (e.g., CK and IK do not need to be kept). The COUNT may be a 16-bit counter value that is maintained between the UE and the serving core network. (Note: a legacy UTRAN security context consists of KSI (a 3 -bit Key Set Identifier), CK (a 128-bit encryption key), and IK (a 128-bit integrity key).
[0031] The present invention provides a technique to smoothly fallback to legacy nodes from enhanced nodes. Mobile equipment / User Equipment that supports the ESC may be designated UE+. An SGSN and an MSC/VLR that supports ESC may be designated SGSN+ and MSC/VLR+. The ESC is an example of the first security context. (A legacy SGSN and MSC/VLR are indicated without the plus sign.) The method for fallback to legacy nodes is independent of the method used to determine the session keys. Not supporting the ESC is an example of the second security context.
[0032] With reference to Figure 10, the UE+ 210 and the SGSN+ or MSC/VLR+ share the ESC which includes KSI (key set identifier) as currently used in UMTS/GERAN, and the root key KASMEU- The session keys CK§ and IK§ are calculated from the root key KASMEU and the parameter (e.g., the COUNT value) exchanged between the UE+ and the SGSN+ or MSC/VLR+ (step 1010). The SGSN+ 230 or MSC/VLR+ also derive CKL and IKL (step 1020), which function as legacy keys, from KASMEU and fixed parameters such that CKL and IKL are cryptographically independent of each other, i.e., knowing CKL and IKL does not reveal KASMEU ·
[0033] During idle mobility, or when the UE+ attaches to a new serving network (step
1030), the ESC parameters may be moved from an SGSN+ 230 or MSC/VLR+ to a target SGSN 230' or MSC/VLR that does not support the ESC. For UE+ mobility to such a target node, the source SGSN+ or MSC/VLR+ includes CKL and IKL in the Information Elements (IEs) that carry the legacy IK and CK (i.e., in the existing CK/IK IEs) (step 1040. KASMEU is m a new IE (step 1050). The COUNT value is also provided to the target to permit derivation of session keys (step 1060). If the target SGSN or MSC/VLR that does not support the ESC, it will ignore the new IEs and use CKL and IKL as the legacy CK and IK.
[0034] The UE+ includes in its messages to the target the relevant information to calculate the session keys. The UE+ does not know yet whether the target supports the ESC. If the target is a legacy node (e.g., does not understand the ESC), then it uses CKL and IKL received from the source SGSN+ or MSC/VLR+ as the legacy UMTS security context (along with KSI/CKSN). If the target supports the ESC, then it can continue the use of the ESC. The target SGSN+ or MSC/VLR+ signals its support of the ESC to the UE.
[0035] In UMTS, the UE+ may receive the SMC (security mode command) from the
RNC without knowing whether the target supports the ESC (step 1070). In this case, the UE+ uses both the IKL and IK§ to determine whether the ESC is supported by the target SGSN (or MSC/VLR) (step 1080). More specifically, the UE+ calculates the MAC for the SMC using both IKL and IKS. The UE+ checks the calculated MAC with the MAC value included in the SMC. If the received MAC is equal to the MAC calculated with IK§, then the target supports the ESC. If the received MAC is equal to the MAC calculated with IKL, then the target does not support the ESC (step 1090). Otherwise, the UE+ rejects the received message (e.g., SMC) due to integrity failure.
[0036] In GERAN PS, the SGSN+ signals its support of the ESC in the Authentication and Ciphering message. In GERAN CS, if security is enabled before signaling of MSC capabilities can be received by the UE+, GERAN key Kc or Kci28 derived from CKL and IKL may be used temporarily until a switch is possible.
[0037] If the target SGSN or MSC/VLR does not support the ESC, both the target and the UE+ fall back to using a legacy security context with CKL and IKL as the CK and IK.
[0038] Alternatively, the target could signal support for the ESC in the SMC (e.g., by adding a new IE that the RNC received from the SGSN+ or MSC/VLR+). If no indication is received, the UE+ may assume it is communicating with a legacy SGSN or MSC/VLR. This alternative enhancement requires changes to the RNC (i.e., the RNC has to upgraded to send the SMC's with the new IEs).
[0039] In Connected Mode (active mode) mobility, it is not possible for the UE+ to determine the capability of the target SGSN (e.g., SMC is not possible in connected mode or it will result in a break in the on-going call/session, which is not preferable).
[0040] If the SGSN is changed in the connected mode, then the source SGSN includes
CKS and IKS in the legacy CK and IK IEs. Both the target SGSN and the UE+ realize that the target SGSN only supports a legacy context through subsequent signaling (e.g., idle mode or service requests or SMC) and will fallback to a legacy security context with CKs and IK§. This is different from idle mode where C¾ and IKL are used as the IK and CK by the legacy nodes. If the target SGSN+ supports the ESC, it uses the root key KASMEU to derive the ESC as described before.
[0041] With reference to FIG. 5, in a method 500 related to UMTS attach procedures, the UE 210 may signal that it supports ESC in a UMTS attach request message (step 510). The support signal may be the presence of a new information element (IE) in the message. The IE may comprise the COUNT value. A serving network SN 230 that does not support ESC will ignore the new IE. Authentication data (RAND, XRES, CK, IK, AUTN) is obtained from the HLR/AuC 240 (step 515). The SN may indicate ESC support in the AKA challenge (Authentication Request) to the UE (step 520). The UE performs the authentication procedures (step 525) and returns a response RES to the SN (step 530). Upon successful authentication (step 530), the UE and SN derive the root key KASMEU and the session keys CKs and IKs (step 535). The SN forwards the session keys to the RAN 220 in an SMC (Security Mode Command) message (step 540). The RAN generates a message authentication code (MAC) using the session key IKS, which is forwarded to the UE in an SMC message (step 545). The UE checks the MAC (step 550) using the session key IKS that the UE derived (step 535), and returns a complete indication to the RAN (step 555), which forwards it to the SN (step 560). The UE is then able to protect communications using the session keys (step 565).
[0042] With reference to FIG. 6, in a method 600 related to an Idle to Active Mode procedure 600, the UE 210 forwards a service request message which includes the COUNT value to the SN 230 (step 610). The UE and SN derive new the session keys CKs and IKs from the root key KASMEU (step 620). The SN forwards the session keys to the RAN 220 in an SMC message (step 630). The RAN generates a MAC, which is forwarded to the UE in an SMC message (step 640). The UE checks the MAC (step 650), and returns a complete indication to the RAN (step 660), which forwards it to the SN (step 670). The UE is then able to protect communications using the session keys (step 680).
[0043] With reference to FIG. 7, in a method 700 related to mobility management procedures 700 (such as a Routing Area Update (RAU) or Location Area Update (LAU), the UE 210 forwards a RAU (or LAU) request message which includes the COUNT value to the SN 230 (step 710). Optionally, the UE and SN may derive new the session keys CK§ and IK§ from the root key KASMEU (step 720) The SN may forward the session keys to the RAN 220 in an SMC message (step 730). The RAN may generate a MAC, which may be forwarded to the UE in an SMC message (step 740). The UE may check the MAC (step 750), and may return a complete indication to the RAN (step 760), which forwards it to the SN (step 770). The SN then sends a RAU accept message to the UE (step 780). The UE is then able to protect communications using the session keys.
[0044] New access stratum (AS) keys may be generated for each transition from Idle to
Active State. Similarly, keys may be generated at other events. The COUNT value may be sent in idle mobility messages and in initial layer 3 messages, e.g., Attaches, RAUs, LAUs, for idle, mobility, or service request. The SN may check that the sent COUNT value has not been used before, and updates the stored COUNT value in the process. If the COUNT value is new (e.g., received COUNT value > stored COUNT value), the UE and the SN proceed to calculate the new key CK§ and IK§, using a Key Derivation Function (KDF) such as HMAC-SHA256, from the root key KASMEU and the sent COUNT value. The KDF may include additional information, such as RAN node identity, for the new key calculation. If the check fails (the COUNT value is not new), the SN rejects the message. For GERAN usage, when Kc and Kc^s are calculated from CK§ and IK§ , it may be done in the same manner as when calculated from CK and IK.
[0045] The session keys (CK§ and IK§) may have a lifetime such that the UE and the serving network keep and use the session keys until either it is no longer necessary to store the keys to send traffic securely between the UE and the network (UE moves to Idle mode), or a new context is created at a subsequent event (e.g., AKA authentication or a mobility event).
[0046] The procedures described above can also be used to smoothly fallback to legacy nodes when the UE+ is transitioning from E-UTRAN (FIG. 9) to UTRAN/GERAN, When transitioning from E-UTRAN to UTRAN/GERAN, the Mobility Management Entity (MME) sends to SGSN/SGSN+ both the 256-bit key called KASME and a pair of keys called cipher key (CK') and integrity keys (ΙΚ') derived from KASME. An SGSN will treat CK' as the legacy CK and the IK' as the legacy IK, and ignore the KASME, whereas an SGSN+ will treat KASME as it's KASMEU and CK' as it's CKs and IK' as it IKs. It should be noted here that MME and E-UTRAN will be considered as an enhanced serving network as the security context transferred from E-UTRAN is always considered as the enhanced security context.
[0047] The remote station 210 may comprise a computer 800 that includes a storage medium 820 such as memory, a display 830, and an input device 840 such as a keyboard. The apparatus may include a wireless connection 850.
[0048] With reference to FIG. 1 , a wireless remote station (RS) 102 (or UE) may communicate with one or more base stations (BS) 104 of a wireless communication system 100. The wireless communication system 100 may further include one or more base station controllers (BSC) 106, and a core network 108. Core network may be connected to an Internet 1 10 and a Public Switched Telephone Network (PSTN) 1 12 via suitable backhauls. A typical wireless remote station may include a handheld phone, or a laptop computer. The wireless communication system 100 may employ any one of a number of multiple access techniques such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), space division multiple access (SDMA), polarization division multiple access (PDMA), or other modulation techniques known in the art.
[0049] A wireless device 102 may include various components that perform functions based on signals that are transmitted by or received at the wireless device. For example, a wireless headset may include a transducer adapted to provide an audio output based on a signal received via the receiver. A wireless watch may include a user interface adapted to provide an indication based on a signal received via the receiver. A wireless sensing device may include a sensor adapted to provide data to be transmitted to another device.
[0050] A wireless device may communicate via one or more wireless communication links that are based on or otherwise support any suitable wireless communication technology. For example, in some aspects a wireless device may associate with a network. In some aspects the network may comprise a body area network or a personal area network (e.g., an ultra-wideband network). In some aspects the network may comprise a local area network or a wide area network. A wireless device may support or otherwise use one or more of a variety of wireless communication technologies, protocols, or standards such as, for example, CDMA, TDMA, OFDM, OFDMA, WiMAX, and Wi-Fi. Similarly, a wireless device may support or otherwise use one or more of a variety of corresponding modulation or multiplexing schemes. A wireless device may thus include appropriate components (e.g., air interfaces) to establish and communicate via one or more wireless communication links using the above or other wireless communication technologies. For example, a device may comprise a wireless transceiver with associated transmitter and receiver components (e.g., a transmitter and a receiver) that may include various components (e.g., signal generators and signal processors) that facilitate communication over a wireless medium.
[0051] The teachings herein may be incorporated into (e.g., implemented within or performed by) a variety of apparatuses (e.g., devices). For example, one or more aspects taught herein may be incorporated into a phone (e.g., a cellular phone), a personal data assistant ("PDA"), an entertainment device (e.g., a music or video device), a headset (e.g., headphones, an earpiece, etc.), a microphone, a medical device (e.g., a biometric sensor, a heart rate monitor, a pedometer, an EKG device, etc.), a user I/O device (e.g., a watch, a remote control, a light switch, a keyboard, a mouse, etc.), a tire pressure monitor, a computer, a point-of-sale device, an entertainment device, a hearing aid, a set-top box, or any other suitable device.
[0052] These devices may have different power and data requirements. In some aspects, the teachings herein may be adapted for use in low power applications (e.g., through the use of an impulse-based signaling scheme and low duty cycle modes) and may support a variety of data rates including relatively high data rates (e.g., through the use of high-bandwidth pulses).
[0053] In some aspects a wireless device may comprise an access device (e.g., a Wi-Fi access point) for a communication system. Such an access device may provide, for example, connectivity to another network (e.g., a wide area network such as the Internet or a cellular network) via a wired or wireless communication link. Accordingly, the access device may enable another device (e.g., a Wi-Fi station) to access the other network or some other functionality. In addition, it should be appreciated that one or both of the devices may be portable or, in some cases, relatively non-portable.
[0054] Those of skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
[0055] Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
[0056] The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
[0057] The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
[0058] In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software as a computer program product, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer- readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
[0059] The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims

1. A method for transitioning a remote station from a current serving network node having first security context to a new serving network node, comprising:
the remote station providing at least one legacy key associated with a second security context, wherein the first security context includes a security property that is not supported by the second security context;
the remote station generating at least one session key, in accordance with the first security context, based on an information element associated with the first security context;
the remote station forwarding a first message to the new serving network node, wherein the first message includes the information element associated with the first security context;
the remote station receiving, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key;
the remote station determining that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and
the remote station protecting communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
2. A method for transitioning as defined in claim 1, wherein the information element comprises a count value.
3. A method for transitioning as defined in claim 2, wherein the count value is updated for a session.
4. A method for transitioning as defined in claim 1, wherein the first security context is an enhanced UMTS security context, and the second security context is a legacy security context.
5. A method for transitioning as defined in claim 1, wherein the remote station comprises a mobile user equipment.
6. A method for transitioning as defined in claim 1, wherein the second message includes a message authentication code (MAC), and the remote station determines that the response is based on the at least one legacy key by determining that the MAC was calculated using the at least one legacy key.
7. A remote station, comprising:
means for providing at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context;
means for generating at least one session key, in accordance with the first security context, based on an information element associated with the first security context;
means for forwarding a first message to a new serving network node, wherein the first message includes the information element signaling associated with the first security context;
means for receiving, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key;
means for determining that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and
means for protecting communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
8. A remote station as defined in claim 7, wherein the information element comprises a count value.
9. A remote station as defined in claim 8, wherein the count value is updated for a session.
10. A remote station as defined in claim 7, wherein the first security context is an enhanced UMTS security context, and the second security context is a legacy security context.
11. A remote station, comprising:
a processor configured to:
provide at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context;
generate at least one session key, in accordance with the first security context, based on the legacy key and an information element associated with the first security context;
forward a first message to a new serving network node, wherein the first message includes the information element associated with the first security context;
receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key;
determine that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and
protect communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
12. A remote station as defined in claim 11, wherein the information element comprises a count value.
13. A remote station as defined in claim 12, wherein the count value is updated for a session.
14. A remote station as defined in claim 11, wherein the first security context is an enhanced UMTS security context, and the second security context is a legacy security context.
15. A computer program product, comprising :
computer-readable storage medium, comprising:
code for causing a computer to provide at least one legacy key associated with a second security context, wherein a first security context of a current serving network node includes a security property that is not supported by the second security context;
code for causing a computer to generate at least one session key, in accordance with the first security context, based on an information element associated with the first security context;
code for causing a computer to forward a first message to a new serving network node, wherein the first message includes the information element associated with the first security context;
code for causing a computer to receive, in response to the first message, a second message from the new serving network node, wherein the second message has a response based on either the at least one legacy key or the at least one session key;
code for causing a computer to determine that the new serving network node does not support the first security context if the response of the second message is based on the at least one legacy key; and
code for causing a computer to protect communications based on the at least one legacy key upon determining that the new serving network node does not support the first security context.
16. A computer program product as defined in claim 15, wherein the information element comprises a count value.
17. A computer program product as defined in claim 16, wherein the count value is updated for a session.
18. A computer program product as defined in claim 15, wherein the first security context is an enhanced UMTS security context, and the second security context is a legacy security context.
PCT/US2011/032754 2010-04-16 2011-04-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node WO2011130681A1 (en)

Priority Applications (13)

Application Number Priority Date Filing Date Title
KR1020127030016A KR101474094B1 (en) 2010-04-16 2011-04-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
JP2013505194A JP5649248B2 (en) 2010-04-16 2011-04-15 Apparatus and method for transitioning from a serving network node that supports an improved security context to a traditional serving network node
CN201180019386.5A CN102845105B (en) 2010-04-16 2011-04-15 For the apparatus and method shifted from the serving network node of support of enhanced security context to legacy service network node
BR112012026451-6A BR112012026451B1 (en) 2010-04-16 2011-04-15 EQUIPMENT AND METHOD FOR TRANSITIONING FROM A SERVER NETWORK NODE THAT SUPPORTS AN IMPROVED SECURITY CONTEXT TO A LEGACY SERVER NETWORK NODE
AU2011239421A AU2011239421B2 (en) 2010-04-16 2011-04-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
CA2796511A CA2796511C (en) 2010-04-16 2011-04-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
RU2012148695/07A RU2525083C2 (en) 2010-04-16 2011-04-15 Apparatus and method for transitioning from serving network node supporting enhanced security context to legacy serving network node
UAA201213040A UA106531C2 (en) 2010-04-16 2011-04-15 DEVICE AND METHOD FOR TRANSITION FROM a serving network node that supports enhanced security context to a legacy serving network node
EP11717849.1A EP2559292B1 (en) 2010-04-16 2011-04-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
SG2012076642A SG184878A1 (en) 2010-04-16 2011-04-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
IL222458A IL222458A (en) 2010-04-16 2012-10-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
ZA2012/08617A ZA201208617B (en) 2010-04-16 2012-11-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
HK13107003.5A HK1179804A1 (en) 2010-04-16 2013-06-14 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US32499110P 2010-04-16 2010-04-16
US61/324,991 2010-04-16
US13/084,353 2011-04-11
US13/084,353 US8848916B2 (en) 2010-04-15 2011-04-11 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node

Publications (1)

Publication Number Publication Date
WO2011130681A1 true WO2011130681A1 (en) 2011-10-20

Family

ID=44182166

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/032754 WO2011130681A1 (en) 2010-04-16 2011-04-15 Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node

Country Status (17)

Country Link
US (1) US9191812B2 (en)
EP (1) EP2559292B1 (en)
JP (1) JP5649248B2 (en)
KR (1) KR101474094B1 (en)
CN (1) CN102845105B (en)
AU (1) AU2011239421B2 (en)
BR (1) BR112012026451B1 (en)
CA (1) CA2796511C (en)
HK (1) HK1179804A1 (en)
IL (1) IL222458A (en)
MY (1) MY154249A (en)
RU (1) RU2525083C2 (en)
SG (1) SG184878A1 (en)
TW (1) TWI477132B (en)
UA (1) UA106531C2 (en)
WO (1) WO2011130681A1 (en)
ZA (1) ZA201208617B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015512181A (en) * 2012-01-30 2015-04-23 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Call handover between multiple cellular communication system nodes supporting different security contexts
EP2770767B1 (en) * 2011-10-21 2017-02-01 Huawei Technologies Co., Ltd Method, system, and related device for gsm security

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5412444B2 (en) * 2008-02-08 2014-02-12 エイディシィ・テレコミュニケーションズ・インコーポレイテッド Enterprise mobile network for providing cellular wireless services using licensed radio frequency spectrum and session initiation protocol
US8848916B2 (en) 2010-04-15 2014-09-30 Qualcomm Incorporated Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
WO2011137580A1 (en) * 2010-05-04 2011-11-10 Qualcomm Incorporated Shared circuit switched security context
WO2014109968A1 (en) * 2013-01-09 2014-07-17 Ntt Docomo, Inc. Secure radio access with inter-enb carrier aggregation
CN105706474B (en) * 2013-10-30 2019-12-13 日本电气株式会社 Apparatus, system and method for secure direct communication in proximity-based services
US10299171B2 (en) * 2013-12-03 2019-05-21 Telefonaktiebolaget Lm Ericsson (Publ) First service network node, a second service network node and methods relating to handling of a service session
US10091649B2 (en) * 2015-07-12 2018-10-02 Qualcomm Incorporated Network architecture and security with encrypted client device contexts
EP3485671B1 (en) * 2016-07-18 2023-01-25 Telefonaktiebolaget LM Ericsson (publ) Security of ciphering and integrity protection
US10462837B2 (en) * 2016-11-04 2019-10-29 Qualcomm Incorporated Method, apparatus, and system for reestablishing radio communication links due to radio link failure
KR102208868B1 (en) * 2017-01-30 2021-01-29 텔레호낙티에볼라게트 엘엠 에릭슨(피유비엘) Security anchor function in 5G systems
KR102143023B1 (en) * 2018-04-16 2020-08-10 텔레호낙티에볼라게트 엘엠 에릭슨(피유비엘) Secure handling for resuming RRC from inactive state

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070230707A1 (en) 2006-03-28 2007-10-04 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for handling keys used for encryption and integrity
WO2008092999A1 (en) * 2007-02-02 2008-08-07 Nokia Corporation Changing radio access network security algorithm during handover
WO2009008627A2 (en) * 2007-07-10 2009-01-15 Lg Electronics Inc. A method of establishing fast security association for handover between heterogeneous radio access networks
WO2009020789A2 (en) * 2007-08-03 2009-02-12 Interdigital Patent Holdings, Inc. Security procedure and apparatus for handover in a 3gpp long term evolution system
EP2139260A1 (en) * 2007-05-15 2009-12-30 Huawei Technologies Co., Ltd. Method for performing security negotiation during handoff between different wireless access technology and device thereof
EP2205014A2 (en) * 2009-01-05 2010-07-07 HTC Corporation Method of handling inter-system handover security in wireless communications system and related communication device

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6591364B1 (en) 1998-08-28 2003-07-08 Lucent Technologies Inc. Method for establishing session key agreement
US6876747B1 (en) 2000-09-29 2005-04-05 Nokia Networks Oy Method and system for security mobility between different cellular systems
US6986040B1 (en) 2000-11-03 2006-01-10 Citrix Systems, Inc. System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US7873163B2 (en) 2001-11-05 2011-01-18 Qualcomm Incorporated Method and apparatus for message integrity in a CDMA communication system
EP1784944B1 (en) * 2004-09-02 2009-03-18 ID Quantique S.A. Two non-orthogonal states quantum cryptography method and apparatus with intra-and inter-qubit interference for eavesdropper detection
EP1638261A1 (en) * 2004-09-16 2006-03-22 Matsushita Electric Industrial Co., Ltd. Configuring connection parameters in a handover between access networks
WO2006084183A1 (en) 2005-02-04 2006-08-10 Qualcomm Incorporated Secure bootstrapping for wireless communications
FI20050393A0 (en) 2005-04-15 2005-04-15 Nokia Corp Replacement of key material
KR20070015770A (en) 2005-08-01 2007-02-06 엘지전자 주식회사 Method for Performing and Controlling Handover between Heterogeneous Networks
CA2567416C (en) 2005-11-07 2018-10-09 Harsch Khandelwal Verification of a testimonial
US7752441B2 (en) * 2006-02-13 2010-07-06 Alcatel-Lucent Usa Inc. Method of cryptographic synchronization
CN101406024A (en) 2006-03-22 2009-04-08 Lg电子株式会社 Security considerations for the LTE of UMTS
ZA200808185B (en) * 2006-03-28 2009-12-30 Ericsson Telefon Ab L M A method and apparatus for handling keys used for encryption and integrity
PT1999930T (en) 2006-03-28 2017-04-07 ERICSSON TELEFON AB L M (publ) A method and apparatus for handling keys used for encryption and integrity
US8462742B2 (en) 2006-03-31 2013-06-11 Samsung Electronics Co., Ltd System and method for optimizing authentication procedure during inter access system handovers
US8583929B2 (en) 2006-05-26 2013-11-12 Alcatel Lucent Encryption method for secure packet transmission
US20080076425A1 (en) 2006-09-22 2008-03-27 Amit Khetawat Method and apparatus for resource management
US20080072047A1 (en) * 2006-09-20 2008-03-20 Futurewei Technologies, Inc. Method and system for capwap intra-domain authentication using 802.11r
US8094817B2 (en) 2006-10-18 2012-01-10 Telefonaktiebolaget Lm Ericsson (Publ) Cryptographic key management in communication networks
KR101048560B1 (en) 2006-10-20 2011-07-11 노키아 코포레이션 Network device, user equipment, and computer readable media for generating protection keys in next generation mobile networks
EP1973265A1 (en) 2007-03-21 2008-09-24 Nokia Siemens Networks Gmbh & Co. Kg Key refresh in SAE/LTE system
CN101304600B (en) 2007-05-08 2011-12-07 华为技术有限公司 Method and system for negotiating safety capability
KR100924168B1 (en) 2007-08-07 2009-10-28 한국전자통신연구원 Method for generating authorization key and method for negotiating authorization in communication system based frequency overlay
CN101378591B (en) 2007-08-31 2010-10-27 华为技术有限公司 Method, system and device for negotiating safety capability when terminal is moving
CN101232736B (en) 2008-02-22 2012-02-29 中兴通讯股份有限公司 Method for setting initialization of cryptographic key existence counter among different access systems
US8145195B2 (en) 2008-04-14 2012-03-27 Nokia Corporation Mobility related control signalling authentication in mobile communications system
US8595501B2 (en) 2008-05-09 2013-11-26 Qualcomm Incorporated Network helper for authentication between a token and verifiers
CN101610147A (en) 2008-06-16 2009-12-23 华为技术有限公司 Cipher key processing method, system, equipment and terminal
JP4465015B2 (en) 2008-06-20 2010-05-19 株式会社エヌ・ティ・ティ・ドコモ Mobile communication method
JP5156581B2 (en) 2008-10-31 2013-03-06 株式会社エヌ・ティ・ティ・ドコモ Mobile station
US20100304713A1 (en) 2009-06-01 2010-12-02 Penny Lynne Bright Technique for restricting access to a wireless communication service
US8848916B2 (en) 2010-04-15 2014-09-30 Qualcomm Incorporated Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
US9084110B2 (en) 2010-04-15 2015-07-14 Qualcomm Incorporated Apparatus and method for transitioning enhanced security context from a UTRAN/GERAN-based serving network to an E-UTRAN-based serving network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070230707A1 (en) 2006-03-28 2007-10-04 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for handling keys used for encryption and integrity
WO2008092999A1 (en) * 2007-02-02 2008-08-07 Nokia Corporation Changing radio access network security algorithm during handover
EP2139260A1 (en) * 2007-05-15 2009-12-30 Huawei Technologies Co., Ltd. Method for performing security negotiation during handoff between different wireless access technology and device thereof
WO2009008627A2 (en) * 2007-07-10 2009-01-15 Lg Electronics Inc. A method of establishing fast security association for handover between heterogeneous radio access networks
WO2009020789A2 (en) * 2007-08-03 2009-02-12 Interdigital Patent Holdings, Inc. Security procedure and apparatus for handover in a 3gpp long term evolution system
EP2205014A2 (en) * 2009-01-05 2010-07-07 HTC Corporation Method of handling inter-system handover security in wireless communications system and related communication device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Security architecture (3GPP TS 33.102 version 8.1.0 Release 8); ETSI TS 133 102", 1 January 2009, ETSI STANDARD, EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE (ETSI), SOPHIA ANTIPOLIS CEDEX, FRANCE, XP014043538 *
3RD GENERATION PARTNERSHIP PROJECT (3GPP TM): "3GPP TS 33.401 V8.2.1 (2008-12), 3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;3GPP System Architecture Evolution (SAE):Security Architecture", 19 December 2008, 3GPP TS 33.401 V8.2.1,, PAGE(S) 1 - 58, XP002574135 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2770767B1 (en) * 2011-10-21 2017-02-01 Huawei Technologies Co., Ltd Method, system, and related device for gsm security
JP2015512181A (en) * 2012-01-30 2015-04-23 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Call handover between multiple cellular communication system nodes supporting different security contexts
US10433161B2 (en) 2012-01-30 2019-10-01 Telefonaktiebolaget Lm Ericsson (Publ) Call handover between cellular communication system nodes that support different security contexts

Also Published As

Publication number Publication date
HK1179804A1 (en) 2013-10-04
US20150043734A1 (en) 2015-02-12
JP2013526159A (en) 2013-06-20
UA106531C2 (en) 2014-09-10
CN102845105A (en) 2012-12-26
IL222458A (en) 2017-05-29
KR101474094B1 (en) 2014-12-17
AU2011239421B2 (en) 2014-06-05
MY154249A (en) 2015-05-29
IL222458A0 (en) 2012-12-31
CA2796511A1 (en) 2011-10-20
BR112012026451B1 (en) 2021-09-28
RU2525083C2 (en) 2014-08-10
BR112012026451A2 (en) 2016-08-09
CN102845105B (en) 2016-03-16
ZA201208617B (en) 2013-07-31
SG184878A1 (en) 2012-11-29
EP2559292B1 (en) 2017-07-26
JP5649248B2 (en) 2015-01-07
TW201203989A (en) 2012-01-16
KR20130018883A (en) 2013-02-25
CA2796511C (en) 2016-06-21
RU2012148695A (en) 2014-05-27
US9191812B2 (en) 2015-11-17
EP2559292A1 (en) 2013-02-20
TWI477132B (en) 2015-03-11
AU2011239421A1 (en) 2012-11-08

Similar Documents

Publication Publication Date Title
US9084110B2 (en) Apparatus and method for transitioning enhanced security context from a UTRAN/GERAN-based serving network to an E-UTRAN-based serving network
US8848916B2 (en) Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
US9191812B2 (en) Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
CA2795358C (en) Apparatus and method for signaling enhanced security context for session encryption and integrity keys
JP5398934B2 (en) Apparatus and method for migrating an extended security context from a UTRAN-based serving network to a GERAN-based serving network

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180019386.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11717849

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2796511

Country of ref document: CA

Ref document number: 2013505194

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 1201005450

Country of ref document: TH

Ref document number: 12012502077

Country of ref document: PH

WWE Wipo information: entry into national phase

Ref document number: 9069/CHENP/2012

Country of ref document: IN

ENP Entry into the national phase

Ref document number: 2011239421

Country of ref document: AU

Date of ref document: 20110415

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20127030016

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: A201213040

Country of ref document: UA

ENP Entry into the national phase

Ref document number: 2012148695

Country of ref document: RU

Kind code of ref document: A

REEP Request for entry into the european phase

Ref document number: 2011717849

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011717849

Country of ref document: EP

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112012026451

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112012026451

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20121016