Operation of a serving node in a network
First Claim
1. A serving node for use in a telecommunications network, comprising:
- a communications unit for sending and receiving data;
a storage medium for storing data; and
a control unit for controlling the operation of the communications unit and the storage medium;
wherein;
the communications unit is configured to receive security capabilities of a terminal when the terminal registers with the serving node;
the storage medium is configured to store the security capabilities;
the communications unit is configured to receive a path switch request message, the path switch request including another indication of security capabilities of the terminal; and
the communications unit is configured to send the stored security capabilities towards a target base station, if security of the target base station has been upgraded.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides a system and method for repairing corrupt security information. At a serving node in a telecommunications network, security capabilities of a terminal are received when the terminal registers with the serving node. The received security capabilities are stored. A path switch request message is received from a target base station following an X2 handover request sent from a source base station to the target base station for handover of the terminal, the path switch request including the security capabilities of the terminal. The serving node determines whether the security capabilities of the terminal stored in the storage medium should be sent to the target base station. If so, the serving node sends the stored security capabilities of the terminal to the target base station for use in reselecting security algorithms to be used in communications between the target base station and terminal following the handover.
-
Citations
25 Claims
-
1. A serving node for use in a telecommunications network, comprising:
-
a communications unit for sending and receiving data; a storage medium for storing data; and a control unit for controlling the operation of the communications unit and the storage medium;
wherein;the communications unit is configured to receive security capabilities of a terminal when the terminal registers with the serving node; the storage medium is configured to store the security capabilities; the communications unit is configured to receive a path switch request message, the path switch request including another indication of security capabilities of the terminal; and the communications unit is configured to send the stored security capabilities towards a target base station, if security of the target base station has been upgraded. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A base station for use in a telecommunications network, comprising:
-
a communications unit for sending and receiving data; a storage medium for storing data; and a control unit for controlling the operation of the communications unit and the storage medium;
whereinthe communications unit is configured to receive an X2 handover request for handover of a terminal from a source base station, the X2 handover request including security capabilities of the terminal; the control unit is configured to select security algorithms for use in communications between the base station and the terminal following the handover, the selection of the security algorithms being based on the received security capabilities of the terminal; the communications unit is configured to send a path switch request to a serving node, the path switch request including the received security capabilities; the communications unit is configured to receive a message comprising replacement security capabilities of the terminal if the security of the base station has been upgraded; the control unit is configured to select new security algorithms for use in communications between the base station and the terminal based on at least the replacement security capabilities; and the communications unit is configured to send to the terminal an indication of the new selected security algorithms. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method of operating a serving node in a telecommunications network, comprising:
-
receiving security capabilities of a terminal when the terminal registers with the serving node; storing the received security capabilities; receiving a path switch request message, the path switch request including the security capabilities of the terminal; and sending the stored security capabilities towards a target base station, wherein if security of the target base station has been upgraded. - View Dependent Claims (16, 17)
-
-
18. A method of operating a base station in a telecommunications network, comprising:
-
receiving an X2 handover request for handover of a terminal from a source base station, the X2 handover request including security capabilities of the terminal; selecting security algorithms for use in communications between the base station and the terminal following the handover, the selection of the security algorithms being based on the received security capabilities of the terminal; sending a path switch request to a serving node, the path switch request including the security capabilities of the terminal; receiving a message comprising replacement security capabilities of the terminal if the security of the base station has been upgraded; selecting new security algorithms for use in communications between the base station and the terminal based on at least the replacement security capabilities; and indicating the selection of the new security algorithms to the terminal.
-
-
19. A method of operating a telecommunications network, comprising:
-
registering a terminal with a serving node; sending security capabilities of the terminal to the serving node; storing the security capabilities at the serving node; sending an X2 handover request to a target base station for handover of the terminal from a source base station, the X2 handover request including an additional indication of security capabilities of the terminal; at the target base station, selecting security algorithms for use in communications between the target base station and the terminal following the handover, the selection of the security algorithms being based on the received additional indication of the security capabilities of the terminal; sending a handover command message from the target base station to the terminal, the handover command message including an indication of the selected security algorithms; sending a path switch request to the serving node, the path switch request including the additional indication of the security capabilities of the terminal; sending the security capabilities stored at the serving node to the target base station, if security of the target base station has been upgraded; at the target base station, selecting new security algorithms for use in communications between the base station and the terminal based on at least the security capabilities stored at and sent from the serving node; and sending an indication of the selection of the new security algorithms to the terminal.
-
-
20. A computer program product comprising a non-transitory computer readable medium storing a computer program for a serving node in a telecommunications network, said computer program comprises code which run by a processor causes said processor to:
-
receive security capabilities of a terminal when the terminal registers with the serving node; store the received security capabilities; receive a path switch request message, the path switch request including security capabilities of the terminal; and send the stored security capabilities towards a target base station, if security of the target base station has been upgraded. - View Dependent Claims (22)
-
-
21. A computer program product comprising a non-transitory computer readable medium storing a computer program for a base station in a telecommunications network, said computer program comprises code which run by a processor causes said processor to:
-
receive an X2 handover request for handover of a terminal from a source base station, the X2 handover request including security capabilities of the terminal; select security algorithms for use in communications between the base station and the terminal following the handover, the selection of the security algorithms being based on the received security capabilities of the terminal; send a path switch request to a serving node, the path switch request including the security capabilities of the terminal; receive a message comprising replacement security capabilities if the security of the base station has been upgraded; select new security algorithms for use in communications between the base station and the terminal based on at least the replacement security capabilities; and indicate the new security algorithms to the terminal.
-
-
23. A computer program product comprising a non-transitory computer readable medium storing a computer program for a serving node in a telecommunications network, said computer program comprises code which run by a processor causes said processor to:
-
receive security capabilities of a terminal when the terminal registers with the serving node; store the received security capabilities; receive a path switch request message following an X2 handover request sent from a source base station to a target base station for handover of the terminal, the path switch request including security capabilities of the terminal; and send the stored security capabilities to the target base station, wherein security of the target base station has been upgraded. - View Dependent Claims (25)
-
-
24. A computer program product comprising a non-transitory computer readable medium storing a computer program for a base station in a telecommunications network, said computer program comprises code which run by a processor causes said processor to:
-
receive an X2 handover request for handover of a terminal from a source base station, the X2 handover request including security capabilities of the terminal; select security algorithms for use in communications between the base station and the terminal following the handover, the selection of the security algorithms being based on the received security capabilities of the terminal; send a path switch request to a serving node, the path switch request including the security capabilities of the terminal; receive a message comprising replacement security capabilities if the security of the base station has been upgraded; select new security algorithms for use in communications between the base station and the terminal based on at least the replacement security capabilities; and indicate the new security algorithms to the terminal.
-
Specification