SECURITY PROCEDURE AND APPARATUS FOR HANDOVER IN A 3GPP LONG TERM EVOLUTION SYSTEM
First Claim
Patent Images
1. A method for performing a security check in wireless communications, the method comprising:
- receiving a message;
determining whether the message is attempting to change one or more security algorithms in use; and
performing a security action based on the determination.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for implementing a security procedure during handover of a wireless transmit/receive unit (WTRU) in wireless communications that controls the behavior of a handover target if it cannot support the required security algorithms. The handover source can detect that the target does not support the required security algorithms and the WTRU can detect that security algorithms may change during handover. Security procedures for the WTRU include contingencies for Radio Link Failure and if the public land mobile network (PLMN) changes.
112 Citations
33 Claims
-
1. A method for performing a security check in wireless communications, the method comprising:
-
receiving a message; determining whether the message is attempting to change one or more security algorithms in use; and performing a security action based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for performing a security action in wireless communications during a change in public land mobile network (PLMN), the method comprising:
-
detecting a change in a current PLMN; and performing a security action. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A wireless transmit/receive unit (WTRU) comprising:
-
a receiver configured to receive a message; and a processor configured to determine whether the message indicates security algorithms for use at a target. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. An evolved Node-B (e-NB) comprising:
-
a receiver configured to receive a message; and a processor configured to determine whether the message indicates security algorithms for use at a target.
-
Specification