Facilitated security for handoff in wireless communications
First Claim
1. A method for facilitating secure handoff in a network having at least first and second wireless base stations and at least one wireless mobile terminal, the method comprising the steps of:
- receiving a request from said at least one wireless mobile terminal for a handoff from said first base station to said second base station; and
transferring security information that was originally supplied by a central security node and was not used by said first base station from said first base station to said second base station in response to said request;
wherein at least a portion of said security information is used to validate said at least one mobile wireless terminal to said second base station.
4 Assignments
0 Petitions
Accused Products
Abstract
A first base station which initially receives a service request from a wireless terminal requests authentication information from a central security node and receives in response at least, one, but typically two or more, sets of security information. When it is time for a handoff from the first base station to a second base station, the first base station transmits to the second base station at least one of the sets of security information it received from the central security node. The second base station then uses the information it received from the first base station to authenticate the wireless terminal.
-
Citations
19 Claims
-
1. A method for facilitating secure handoff in a network having at least first and second wireless base stations and at least one wireless mobile terminal, the method comprising the steps of:
-
receiving a request from said at least one wireless mobile terminal for a handoff from said first base station to said second base station; and transferring security information that was originally supplied by a central security node and was not used by said first base station from said first base station to said second base station in response to said request; wherein at least a portion of said security information is used to validate said at least one mobile wireless terminal to said second base station. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for performing handoffs in a network for providing wireless communication service having at least first and second wireless base stations and a least one wireless terminal, the method comprising the steps of:
-
transmitting a request, from said wireless terminal for a handoff between said first base station and said second base station; receiving a response to said request at said wireless terminal, when said second base station knows said first base station prior to receiving said request, said response indicating that said second base station can engage in expedited handoffs with said first base station; and connecting said wireless terminal for user traffic to said second base station; wherein said expedited handoff employs information about said wireless terminal transferred from said first base station to said second base station. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for performing handoffs in a network having at least first and second wireless base stations and a least one wireless terminal, the method comprising the steps of:
-
transmitting a request, from said wireless terminal for a handoff between said first base station to said second base station; when said second base station does not know said first base station prior to receiving said request, receiving at said wireless terminal an indication that it must connect to said second base station without benefit of security information supplied from said first base station. - View Dependent Claims (16, 17)
-
-
18. A method for performing a handoff in a wireless network having at least first and second base stations and a least one wireless terminal, the method comprising the steps of:
-
receiving a request, by said second base station, from said wireless terminal for a handoff between said first base station to said second base station; performing an expedited handoff using previously unused security information when second base station knows said first base station prior to receiving said request; and performing a nonexpedited handoff when second base station does not know said first base station prior to receiving said request. - View Dependent Claims (19)
-
Specification