Method, System and Device for Negotiating Security Capability when Terminal Moves
First Claim
1. A user equipment (UE) comprising:
- a transmitter configured to send, in situations where the UE moves in idle state from a non-long term evolution (non-LTE) network to a long term evolution (LTE) network, UE security capabilities supported by the UE to the LTE network for a non-access stratum (NAS) security algorithm selection use;
a receiver configured to receive a selected NAS security algorithm from the LTE network; and
a processor configured to generate a root key from an authentication vector-related key available at the UE and to derive, from the generated root key, a NAS protection key for communicating with the LTE network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, user equipment (UE) and system are provided for negotiating a security capability during idle state mobility of the UE from a non-long term evolution (non-LTE) network to a long term evolution (LTE) network. The UE sends UE security capabilities supported by the UE to the LTE network for a non-access stratum (NAS) security algorithm selection use. The UE then receives from the LTE network selected NAS security algorithm. The UE further generates a root key from an authentication vector-related key stored at the UE and then derives, from the generated root key, a NAS protection key for security communication with the LTE network.
5 Citations
24 Claims
-
1. A user equipment (UE) comprising:
-
a transmitter configured to send, in situations where the UE moves in idle state from a non-long term evolution (non-LTE) network to a long term evolution (LTE) network, UE security capabilities supported by the UE to the LTE network for a non-access stratum (NAS) security algorithm selection use; a receiver configured to receive a selected NAS security algorithm from the LTE network; and a processor configured to generate a root key from an authentication vector-related key available at the UE and to derive, from the generated root key, a NAS protection key for communicating with the LTE network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for security capability negotiation during idle state mobility of a user equipment (UE), in a situation where the UE moves from a non-long term evolution (non-LTE) network to a long term evolution (LTE) network, the method comprising:
-
sending, by the UE, UE security capabilities supported by the UE to the LTE network for a non-access stratum (NAS) security algorithm selection use; receiving, by the UE, a selected NAS security algorithm from the LTE network; generating, by the UE, a root key from an authentication vector-related key available at the UE; and deriving, by the UE, a NAS protection key according to the generated root key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for security capability negotiation during idle state mobility, the system comprising:
-
a user equipment (UE) configured to communicatively connect with a non-long term evolution (non-LTE) network or a long term evolution (LTE) network, wherein in situations where the UE in idle state moves from the non-LTE network to the LTE network, the UE is further configured to; send UE security capabilities supported by the UE to the LTE network for a non-access stratum (NAS) security algorithm selection use; receive a selected NAS security algorithm from the LTE network; and generate a root key from an authentication vector-related key available at the UE; and derive from with the generated root key a NAS protection key for communicating with the LTE network. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification