OPERATION OF A SERVING NODE IN A NETWORK
First Claim
1. A serving node for use in a telecommunications network, comprising:
- a communications unit for sending and receiving data;
a storage medium for storing data; and
a control unit for controlling the operation of the communications unit and the storage medium;
wherein;
the communications unit is configured to receive security capabilities of a terminal when the terminal registers with the serving node;
the storage medium is configured to store the security capabilities;
the communications unit is configured to receive a path switch request message, the path switch request including another indication of security capabilities of the terminal; and
the communications unit is configured to send the stored security capabilities towards a target base station.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides a system and method for repairing corrupt security information. At a serving node in a telecommunications network, security capabilities of a terminal are received when the terminal registers with the serving node. The received security capabilities are stored. A path switch request message is received from a target base station following an X2 handover request sent from a source base station to the target base station for handover of the terminal, the path switch request including the security capabilities of the terminal. The serving node determines whether the security capabilities of the terminal stored in the storage medium should be sent to the target base station. If so, the serving node sends the stored security capabilities of the terminal to the target base station for use in reselecting security algorithms to be used in communications between the target base station and terminal following the handover.
-
Citations
26 Claims
-
1. A serving node for use in a telecommunications network, comprising:
-
a communications unit for sending and receiving data; a storage medium for storing data; and a control unit for controlling the operation of the communications unit and the storage medium;
wherein;the communications unit is configured to receive security capabilities of a terminal when the terminal registers with the serving node; the storage medium is configured to store the security capabilities; the communications unit is configured to receive a path switch request message, the path switch request including another indication of security capabilities of the terminal; and the communications unit is configured to send the stored security capabilities towards a target base station. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9)
-
-
8. The serving node of 1, wherein the communications unit is configured to send the stored security capabilities to the target base station in a path switch request acknowledgement message.
-
10. A base station for use in a telecommunications network, comprising:
-
a communications unit for sending and receiving data; a storage medium for storing data; and a control unit for controlling the operation of the communications unit and the storage medium;
whereinthe communications unit is configured to receive an X2 handover request for handover of a terminal from a source base station, the X2 handover request including security capabilities of the terminal; the control unit is configured to select security algorithms for use in communications between the base station and the terminal following the handover, the selection of the security algorithms being based on the received security capabilities of the terminal; the communications unit is configured to send a path switch request to a serving node, the path switch request including the received security capabilities; the communications unit is configured to receive a message comprising replacement security capabilities of the terminal; the control unit is configured to select new security algorithms for use in communications between the base station and the terminal based on at least the replacement security capabilities; and the communications unit is configured to send to the terminal an indication of the new selected security algorithms. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method of operating a serving node in a telecommunications network, comprising:
-
receiving security capabilities of a terminal when the terminal registers with the serving node; storing the received security capabilities; receiving a path switch request message, the path switch request including the security capabilities of the terminal; and sending the stored security capabilities towards a target base station. - View Dependent Claims (17, 18)
-
-
19. A method of operating a base station in a telecommunications network, comprising:
-
receiving an X2 handover request for handover of a terminal from a source base station, the X2 handover request including security capabilities of the terminal; selecting security algorithms for use in communications between the base station and the terminal following the handover, the selection of the security algorithms being based on the received security capabilities of the terminal; sending a path switch request to a serving node, the path switch request including the security capabilities of the terminal; receiving a message comprising replacement security capabilities of the terminal; selecting new security algorithms for use in communications between the base station and the terminal based on at least the replacement security capabilities; and indicating the selection of the new security algorithms to the terminal.
-
-
20. A method of operating a telecommunications network, comprising:
-
registering a terminal with a serving node; sending security capabilities of the terminal to the serving node; storing the security capabilities at the serving node; sending an X2 handover request to a target base station for handover of the terminal from a source base station, the X2 handover request including an additional indication of security capabilities of the terminal; at the target base station, selecting security algorithms for use in communications between the target base station and the terminal following the handover, the selection of the security algorithms being based on the received additional indication of the security capabilities of the terminal; sending a handover command message from the target base station to the terminal, the handover command message including an indication of the selected security algorithms; sending a path switch request to the serving node, the path switch request including the additional indication of the security capabilities of the terminal; sending the security capabilities stored at the serving node to the target base station; at the target base station, selecting new security algorithms for use in communications between the base station and the terminal based on at least the security capabilities stored at and sent from the serving node; and sending an indication of the selection of the new security algorithms to the terminal.
-
-
21. A computer program product comprising code adapted to be executed on a serving node in a telecommunications network, the code operable to cause the serving node to:
-
receive security capabilities of a terminal when the terminal registers with the serving node; store the received security capabilities; receive a path switch request message, the path switch request including the security capabilities of the terminal; and send the stored security capabilities towards a target base station. - View Dependent Claims (23)
-
-
22. A computer program product comprising code adapted to be executed on a base station in a telecommunications network, the code operable to cause the base station to:
-
receive an X2 handover request for handover of a terminal from a source base station, the X2 handover request including security capabilities of the terminal; select security algorithms for use in communications between the base station and the terminal following the handover, the selection of the security algorithms being based on the received security capabilities of the terminal; send a path switch request to a serving node, the path switch request including the security capabilities of the terminal; receive a message comprising replacement security capabilities; select new security algorithms for use in communications between the base station and the terminal based on at least the replacement security capabilities; and indicate the new security algorithms to the terminal.
-
-
24. A computer program, comprising computer readable code which, when operated by a serving node in a telecommunications network, causes the serving node to:
-
receive security capabilities of a terminal when the terminal registers with the serving node; store the received security capabilities; receive a path switch request message following an X2 handover request sent from a source base station to a target base station for handover of the terminal, the path switch request including the security capabilities of the terminal; and send the stored security capabilities to the target base station. - View Dependent Claims (26)
-
-
25. A computer program, comprising computer readable code which, when operated by a base station in a telecommunications network, causes the base station to:
-
receive an X2 handover request for handover of a terminal from a source base station, the X2 handover request including security capabilities of the terminal; select security algorithms for use in communications between the base station and the terminal following the handover, the selection of the security algorithms being based on the received security capabilities of the terminal; send a path switch request to a serving node, the path switch request including the security capabilities of the terminal; receive a message comprising replacement security capabilities; select new security algorithms for use in communications between the base station and the terminal based on at least the replacement security capabilities; and indicate the new security algorithms to the terminal.
-
Specification