Security Activation for Dual Connectivity
First Claim
1. A method, in a first node, for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to the first node and to the second node, the method comprising:
- determining a first set of security algorithms, wherein the first set is supported by the wireless terminal;
determining a second set of security algorithms, wherein the second set is supported by the second node; and
indicating a security algorithm to the second node, wherein the security algorithm is chosen from the intersection of the first and second sets.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to a first node and to the second node. An example method, implemented in the first node, includes determining (610) a first set of security algorithms, the first set including those algorithms supported by the wireless terminal. A second set of security algorithms is also determined (620), where the second set includes those security algorithms that are supported by the second node. In some embodiments, this determining (620) includes receiving information from the second node, the information identifying which security algorithms are supported by the second node. At least one security algorithm is then indicated (630) to the second node, wherein the indicated security algorithm is chosen from the intersection of the first and second sets.
-
Citations
26 Claims
-
1. A method, in a first node, for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to the first node and to the second node, the method comprising:
-
determining a first set of security algorithms, wherein the first set is supported by the wireless terminal; determining a second set of security algorithms, wherein the second set is supported by the second node; and indicating a security algorithm to the second node, wherein the security algorithm is chosen from the intersection of the first and second sets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, in a second node, for determining a security algorithm to be used for secured communications between a wireless terminal and the second node while the wireless terminal is dually connected to a first node and to the second node, the method comprising:
-
receiving, from the first node, an indication of the security algorithm to be used for secured communications between the wireless terminal and the second node; and using the security algorithm for secured communications between the wireless terminal and the second node while the wireless terminal is dually connected to the first node and to the second node. - View Dependent Claims (11, 12)
-
-
13. A first network node arranged to determine a security algorithm to be used for secured communications between a wireless terminal and a second network node while the wireless terminal is dually connected to the first network node and to the second network node, the first network node comprising:
-
interface circuitry configured to communicate with the second network node; and processing circuitry configured to; determine a first set of security algorithms, wherein the first set is supported by the wireless terminal; determine a second set of security algorithms, wherein the second set is supported by the second network node; and indicate a security algorithm to the second network node, via the interface circuitry, wherein the security algorithm is chosen from the intersection of the first and second sets. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A second network node arranged to determine a security algorithm to be used for secured communications between a wireless terminal and a second network node while the wireless terminal is dually connected to the first network node and to the second network node, the second network node comprising:
-
interface circuitry configured to communicate with the first network node and the wireless terminal; and processing circuitry configured to; receive from the first network node, via the interface circuitry, an indication of the security algorithm to be used for secured communications between the wireless terminal and the second network node; and use the security algorithm for secured communications between the wireless terminal and the second network node while the wireless terminal is dually connected to the first network node and to the second network node. - View Dependent Claims (23, 24)
-
-
25. A first network node arranged to determine a security algorithm to be used for secured communications between a wireless terminal and a second network node while the wireless terminal is dually connected to the first network node and to the second network node, the first network node comprising:
-
interface circuitry configured to communicate with the second network node; a determining module for determining a first set of security algorithms, wherein the first set is supported by the wireless terminal, and for determining a second set of security algorithms, wherein the second set is supported by the second network node; and an indicating module for indicating the security algorithm to the second network node, via the interface circuitry, wherein the security algorithm is chosen from the intersection of the first and second sets.
-
-
26. A second network node arranged to determine a security algorithm to be used for secured communications between a wireless terminal and a second network node while the wireless terminal is dually connected to the first network node and to the second network node, the second network node comprising:
-
interface circuitry configured to communicate with the first network node and the wireless terminal; a receiving module for receiving from the first network node, via the interface circuitry, an indication of the security algorithm to be used for secured communications between the wireless terminal and the second network node; and a security module for applying the security algorithm to secured communications between the wireless terminal and the second network node while the wireless terminal is dually connected to the first network node and to the second network node.
-
Specification