Processing

Please wait...

Settings

Settings

1. WO2000041427 - REUSE OF SECURITY ASSOCIATIONS FOR IMPROVING HAND-OVER PERFORMANCE

Publication Number WO/2000/041427
Publication Date 13.07.2000
International Application No. PCT/SE2000/000020
International Filing Date 07.01.2000
Chapter 2 Demand Filed 29.06.2000
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 36/08 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
36Handoff or reselecting arrangements
08Reselecting an access point
H04W 12/06 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
06Authentication
CPC
H04L 63/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
H04L 63/164
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
16Implementing security features at a particular protocol layer
164at the network layer
H04W 12/0013
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
001Protecting confidentiality, e.g. by encryption or ciphering
0013of user plane, e.g. user traffic
H04W 12/0401
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0401Key generation or derivation
H04W 12/04033
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0403using a trusted network node as anchor
04033Key management protocols, e.g. managing shared keys, group keys, multicast keys or rekeying
H04W 12/0602
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
06Authentication
0602Pre-authentication
Applicants
  • TELEFONAKTIEBOLAGET LM ERICSSON (publ) [SE/SE]; S-126 25 Stockholm, SE
Inventors
  • RINMAN, Martin; SE
  • JERRESTAM, Dan; SE
  • CHENG, Yi; SE
  • BJÖRUP, Lars; SE
Agents
  • ANDERSSON, Michael ; Albihns Stockholm AB P.O. Box 5581 S-114 85 Stockholm, SE
Priority Data
09/234,51221.01.1999US
60/115,34908.01.1999US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) REUSE OF SECURITY ASSOCIATIONS FOR IMPROVING HAND-OVER PERFORMANCE
(FR) REUTILISATION D'ASSOCIATIONS DE SECURITE POUR AMELIORER LES PERFORMANCES DE TRANSFERT
Abstract
(EN)
In a radio telecommunication system, the performance of a mobile unit can be significantly improved during a hand-over procedure by reusing existing security associations that correspond to the mobile unit. By reusing existing security associations, a mobile unit can begin secure communications immediately following the hand-over. Otherwise, and in accordance with conventional practice, the mobile unit will have to undertake the time consuming task of renegotiating the required security associations, before it can begin transmitting and receiving secure communications.
(FR)
Dans un système de radiotélécommunication, les performances d'un poste mobile peuvent être considérablement améliorées au cours d'une procédure de transfert par la réutilisation des associations de sécurité existantes qui correspondent au poste mobile. La réutilisation d'associations de sécurité existantes permet au poste mobile de commencer à assurer des communications sécurisées immédiatement après le transfert. Autrement, et selon les pratiques classiques, le poste mobile doit entreprendre la longue tâche de renégocier les associations de sécurité nécessaires avant de commencer à transmettre et à recevoir des communications sécurisées.
Latest bibliographic data on file with the International Bureau