Secure network connection allowing choice of a suitable security algorithm
First Claim
Patent Images
1. A method for use in a mobile radio communications device network connection procedure, the method comprising:
- at a network, sending to a mobile radio communications device a first list of a plurality of security algorithms supported in the network including both an Access-Stratum (AS) and Non-Access-Stratum (NAS) security container, the network being an upgraded network and the mobile radio communications device being a non-upgraded device;
at the mobile radio communications device, in response to receiving the first list of the plurality of security algorithms supported in the network, sending an AS confirmation message, which is not integrity protected, and subsequently sending a NAS registration update message and a second list including supported security algorithms and unsupported security algorithms in the mobile radio communications device, the unsupported security algorithms being indicated separately from the supported security algorithms; and
at the network, generating and sending an AS security mode command message upon receipt of the NAS registration message based on the second list provided to the network.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention provides for a method for use in a mobile radio communications device network connection procedure and including the step of, at a network, sending to a mobile radio communications device a list of a plurality of security algorithms supported in the network and so as to allow choice of a suitable algorithm irrespective of the degree of update that the device may have experienced.
7 Citations
15 Claims
-
1. A method for use in a mobile radio communications device network connection procedure, the method comprising:
-
at a network, sending to a mobile radio communications device a first list of a plurality of security algorithms supported in the network including both an Access-Stratum (AS) and Non-Access-Stratum (NAS) security container, the network being an upgraded network and the mobile radio communications device being a non-upgraded device; at the mobile radio communications device, in response to receiving the first list of the plurality of security algorithms supported in the network, sending an AS confirmation message, which is not integrity protected, and subsequently sending a NAS registration update message and a second list including supported security algorithms and unsupported security algorithms in the mobile radio communications device, the unsupported security algorithms being indicated separately from the supported security algorithms; and at the network, generating and sending an AS security mode command message upon receipt of the NAS registration message based on the second list provided to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A mobile radio communications device, comprising:
-
a processor configured to; receive, from a network, a first list of security algorithms supported by the network including both an Access-Stratum (AS) and Non-Access-Stratum (NAS) security container, the network being an upgraded network and the mobile radio communications device being a non-upgraded device; send an AS confirmation message, which is not integrity protected, and subsequently sending a NAS registration update message and a second list including supported security algorithms and unsupported security algorithms in the mobile radio communications device in response to receiving the first list of a plurality of security algorithms supported in the network, the unsupported security algorithms being indicated separately from the supported security algorithms; and receive an AS security mode command message upon receipt of the NAS registration message based on the second list provided to the network. - View Dependent Claims (13)
-
-
14. A mobile radio communications network device, comprising:
-
a processor configured to; signal to a mobile radio communications device arranged to operate within the network a first list of supported security algorithms including both an Access-Stratum (AS) and Non-Access-Stratum (NAS) security container, the network being an upgraded network and the mobile radio communications device being a non-upgraded device; and receive an AS confirmation message, which is not integrity protected, and subsequently sending a NAS registration update message and a second list including supported security algorithms and unsupported security algorithms in the mobile radio communications device, the unsupported security algorithms being indicated separately from the supported security algorithms; and generate and send an AS security mode command message upon receipt of the NAS registration message based on the second list provided to the network. - View Dependent Claims (15)
-
Specification