Methods and Apparatuses Generating a Radio Base Station Key in a Cellular Radio System
First Claim
1. A method of creating a Terminal Identity Token for identifying a User Equipment (UE) connected to a radio base station in a radio system, wherein the UE communicates with the radio base station via a secure communication associated with an existing cryptographic key, said method comprising:
- creating the Terminal Identity Token based on a physical cell identity of a target cell known to both the UE and the radio base station, the terminal identity and the existing key.
1 Assignment
0 Petitions
Accused Products
Abstract
A Terminal Identity Token is created for identifying a User Equipment (UE) connected to a radio base station in a radio system. The UE communicates with the radio base station via a secure communication associated with an existing cryptographic key. The Terminal Identity Token is created based on a physical cell identity of a target cell known to both the UE and the radio base station, the terminal identity, and the existing key. By using the Terminal Identity Token, a secure communication can be established and enhanced without having to provide for additional security network components or additional signaling.
-
Citations
15 Claims
-
1. A method of creating a Terminal Identity Token for identifying a User Equipment (UE) connected to a radio base station in a radio system, wherein the UE communicates with the radio base station via a secure communication associated with an existing cryptographic key, said method comprising:
creating the Terminal Identity Token based on a physical cell identity of a target cell known to both the UE and the radio base station, the terminal identity and the existing key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method in a radio base station acting as a target base station of identifying a User Equipment (UE) wherein the UE communicates with a source radio base station via a secure communication associated with an existing cryptographic key, said method comprising:
-
receiving a first Terminal Identity Token from a source base station, the first Terminal Identity Token being generated by the source base station based on a physical cell identity of a target cell, a terminal identity, and an existing key; receiving a second Terminal Identity Token from a UE, the second Terminal Identity Token being generated by the UE based on the physical cell identity of the target cell, the terminal identity, and the existing key; and identifying the UE in the target radio base station based on the received Terminal Identity Tokens. - View Dependent Claims (10, 11, 12)
-
-
13. A User Equipment (UE) adapted to identify itself, the UE being connectable to a first radio base station in a radio system and adapted to communicate with a second radio base station of the radio system via a secure communication associated with a unique existing encryption key, and wherein said UE is configured to:
-
create the Terminal Identity Token based on a physical cell identity of a target cell known to both the UE and the first radio base station, the terminal identity and the existing key; and transmit the Terminal Identity Token to one of the first and second radio base stations of the radio system as an identity of the UE. - View Dependent Claims (14, 15)
-
Specification