Claims
- 1. A method of operating a communications network comprising:
(1) providing an authentication key at a first node of the network; (2) using the authentication key to derive an authentication indicia related to the authentication key; (3) providing the authentication indicia to a second node of the network; and then subsequently (4) including the authentication key in an interaction termination message transmitted over an air interface between the first node and the second node; and (5) at the second node, confirming that the authentication key included in the interaction termination message is related to the authentication indicia as a condition for performing an interaction termination operation.
- 2. The method of claim 1, further comprising selecting the authentication key at the first node.
- 3. The method of claim 1, wherein the authentication indicia is related to the authentication key by being equal to the authentication key.
- 4. The method of claim 1, wherein the authentication indicia is related to the authentication key by a function.
- 5. The method of claim 1, wherein upon receiving the authentication key included in the interaction termination message, the second node performs the steps of:
determining a calculated authentication indicia using the authentication key included in the interaction termination message; confirming that the calculated authentication indicia represents the authentication indicia provided at step (3).
- 6. The method of claim 1, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function.
- 7. The method of claim 1, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function C=Kasumi(M)AUTHENTICATION KEY, wherein:
M is a parameter derived from an identity of a mobile node; AUTHENTICATION KEY is a parameter derived from the authentication key; and C is the authentication indicia.
- 8. The method of claim 7, wherein M is derived from one of an U-RNTI of the mobile node and a core network UE identity of the mobile node.
- 9. The method of claim 7, wherein the AUTHENTICATION KEY is derived from the authentication key from plural concatenated instances of the authentication key.
- 10. The method of claim 1, wherein the first node is a radio access network node and the second node is a mobile node.
- 11. The method of claim 10, wherein the first node is radio network controller and the second node is a user equipment unit.
- 12. The method of claim 10, further comprising:
the radio access network node providing the authentication indicia to the mobile node in a first radio resource control (RRC) message; the radio access network node including the authentication key in a second radio resource control (RRC) message; the mobile node confirming that the authentication key included in the second radio resource control (RRC) message is related to the authentication indicia as a condition for performing an interaction termination operation.
- 13. The method of claim 12, wherein the first radio resource control (RRC) message is a radio resource control (RRC) connection establish message and the second radio resource control (RRC) message is a radio resource control (RRC) connection release message.
- 14. The method of claim 10, further comprising the radio access network node providing the authentication indicia to the mobile node in conjunction with one of the following:
a radio resource control (RRC) connection establish message; when a new U-RNTI is assigned; after ciphering has been started.
- 15. The method of claim 1, wherein the first node is a mobile node and the second node is a core network node.
- 16. The method of claim 15, further comprising:
the mobile node providing the authentication indicia to the core network upon occurrence of a predetermined event; the mobile node communicating the authentication key to the core network node upon occurrence of an interaction termination event; the core network node confirming that the authentication key communicated to the core network node is related to the authentication indicia as a condition for performing an interaction termination operation.
- 17. The method of claim 16, wherein the predetermined event is registration of the mobile node with the core network node.
- 18. The method of claim 16, wherein the interaction termination operation is a detach operation.
- 19. The method of claim 16, further comprising using an IMSI detach indication message to communicate the authentication key to the core network node.
- 20. The method of claim 16, further comprising:
the mobile node using an IMSI or a TMSI of the mobile node to generate the authentication indicia which is provided to the core network upon the occurrence of the predetermined event.
- 21. The method of claim 20, further comprising:
the core network node using the IMSI or the TMSI of the mobile node to confirm that the authentication key is related to the authentication indicia.
- 22. A communications network comprising:
a first node which stores an authentication key and which uses the authentication key to derive an authentication indicia related to the authentication key; a second node of the network; means for causing the authentication indicia to be provided to the second node; an authentication unit for the first node which includes the authentication key in an interaction termination message, the interaction termination message being transmitted over an air interface between the first node and the second node; and an authentication unit for the second node which confirms that the authentication key included in the interaction termination message is related to the authentication indicia as a condition for performing an interaction termination operation.
- 23. The apparatus of claim 22, wherein the authentication key is selected at the first node.
- 24. The apparatus of claim 22, wherein the authentication indicia is related to the authentication key by being equal to the authentication key.
- 25. The apparatus of claim 22, wherein the authentication indicia is related to the authentication key by a function.
- 26. The apparatus of claim 22, wherein the authentication unit for the second node comprises:
means for determining a calculated authentication indicia using the authentication key included in the interaction termination message; means for confirming that the calculated authentication indicia represents the authentication indicia provided over the air interface.
- 27. The apparatus of claim 22, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function.
- 28. The apparatus of claim 22, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function C=Kasumi(M)AUTHENTICATION KEY, wherein:
M is a parameter derived from an identity of a mobile node; AUTHENTICATION KEY is a parameter derived from the authentication key; and C is the authentication indicia.
- 29. The apparatus of claim 28, wherein M is derived from one of an U-RNTI of the mobile node and a core network UE identity of the mobile node.
- 30. The apparatus of claim 28, wherein the AUTHENTICATION KEY is derived from the authentication key from plural concatenated instances of the authentication key.
- 31. The apparatus of claim 22, wherein the first node is a radio access network node and the second node is a mobile node.
- 32. The apparatus of claim 31, wherein the first node is radio network controller and the second node is a user equipment unit.
- 33. The apparatus of claim 31, wherein the radio access network node provides the authentication indicia to the mobile node in a first radio resource control (RRC) message; wherein the radio access network node includes the authentication key in a second radio resource control (RRC) message; and wherein the mobile node confirms that the authentication key included in the second radio resource control (RRC) message is related to the authentication indicia as a condition for performing an interaction termination operation.
- 34. The apparatus of claim 33, wherein the first radio resource control (RRC) message is a radio resource control (RRC) connection establish message and the second radio resource control (RRC) message is a radio resource control (RRC) connection release message.
- 35. The apparatus of claim 31, wherein the radio access network node provides the authentication indicia to the mobile node in conjunction with one of the following:
a radio resource control (RRC) connection establish message; when a new U-RNTI is assigned; after ciphering has been started.
- 36. The apparatus of claim 22, wherein the first node is a mobile node and the second node is a core network node.
- 37. The apparatus of claim 25, wherein the mobile node provides the authentication indicia to the core network upon occurrence of a predetermined event; wherein the mobile node communicates the authentication key to the core network node upon occurrence of an interaction termination event; wherein the core network node confirms that the authentication key communicated to the core network node upon the occurrence of the interaction termination event is related to the authentication indicia as a condition for performing an interaction termination operation.
- 38. The apparatus of claim 37, wherein the predetermined event is registration of the mobile node with the core network node.
- 39. The apparatus of claim 37, wherein the interaction termination operation is a detach operation.
- 40. The apparatus of claim 37, wherein the mobile node uses an IMSI detach indication message to communicate the authentication key to the core network node.
- 41. The apparatus of claim 37, wherein the mobile node uses an IMSI or a TMSI of the mobile node to generate the authentication indicia which is provided to the core network upon the occurrence of the predetermined event.
- 42. The apparatus of claim 41, wherein the core network node uses the IMSI or the TMSI of the mobile node to confirm that the authentication key is related to the authentication indicia.
- 43. A node of a communications network comprising:
means for causing transmission of an authentication indicia over an air interface; an authentication unit which includes an authentication key derived from the authentication indicia in an interaction termination message which is transmitted over the air interface.
- 44. The apparatus of claim 43, further comprising a key selection unit which selects the authentication key.
- 45. The apparatus of claim 43, wherein the authentication indicia is related to the authentication key by being equal to the authentication key.
- 46. The apparatus of claim 43, wherein the authentication indicia is related to the authentication key by a function.
- 47. The apparatus of claim 43, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function.
- 48. The apparatus of claim 43, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function C=Kasumi(M)AUTHENTICATION KEY, wherein:
M is a parameter derived from an identity of a mobile node; AUTHENTICATION KEY is a parameter derived from the authentication key; and C is the authentication indicia.
- 49. The apparatus of claim 48, wherein M is derived from one of an U-RNTI of the mobile node and a core network UE identity of the mobile node.
- 50. The apparatus of claim 48, wherein the AUTHENTICATION KEY is derived from the authentication key from plural concatenated instances of the authentication key.
- 51. The apparatus of claim 43, wherein the node is a radio access network node.
- 52. The apparatus of claim 51, wherein the node is radio network controller.
- 53. The apparatus of claim 52, wherein the radio access network node transmits the authentication indicia in a first radio resource control (RRC) message, and wherein the radio access network node includes the authentication key in a second radio resource control (RRC) message.
- 54. The apparatus of claim 53, wherein the first radio resource control (RRC) message is a radio resource control (RRC) connection establish message and the second radio resource control (RRC) message is a radio resource control (RRC) connection release message.
- 55. The apparatus of claim 53, wherein the radio access network node provides the authentication indicia to the mobile node in conjunction with one of the following:
a radio resource control (RRC) connection establish message; when a new U-RNTI is assigned; after ciphering has been started.
- 56. The apparatus of claim 43, wherein the node is a mobile node.
- 57. The apparatus of claim 56, wherein the mobile node transmits the authentication indicia upon occurrence of a predetermined event, and wherein the mobile node communicates the authentication key to a core network node upon occurrence of an interaction termination event.
- 58. The apparatus of claim 57, wherein the predetermined event is core network registration of the mobile node.
- 59. The apparatus of claim 57, wherein the interaction termination operation is a detach operation.
- 60. The apparatus of claim 57, wherein the mobile node uses an IMSI detach indication message to communicate the authentication key to the core network node.
- 61. The apparatus of claim 57, wherein the mobile node uses an IMSI or a TMSI of the mobile node to generate the authentication indicia which is provided to the core network upon the occurrence of the predetermined event.
- 62. The apparatus of claim 61, wherein the core network node uses the IMSI or the TMSI of the mobile node to confirm that the authentication key is related to the authentication indicia.
- 63. A radio access network node comprising:
means for causing transmission of an authentication indicia over an air interface to a mobile node; an authentication unit which includes an authentication key derived from the authentication indicia in an interaction termination message which is transmitted over the air interface to the mobile node.
- 64. The apparatus of claim 63, further comprising a key selection unit which selects the authentication key.
- 65. The apparatus of claim 63, wherein the authentication indicia is related to the authentication key by being equal to the authentication key.
- 66. The apparatus of claim 63, wherein the authentication indicia is related to the authentication key by a function.
- 67. The apparatus of claim 63, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function.
- 68. The apparatus of claim 63, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function C=Kasumi(M)AUTHENTICATION KEY, wherein:
M is a parameter derived from a U-RNTI of a mobile node; AUTHENTICATION KEY is a parameter derived from the authentication key; and C is the authentication indicia.
- 69. The apparatus of claim 68, wherein M is derived from one of an U-RNTI of the mobile node and a core network UE identity of the mobile node.
- 70. The apparatus of claim 68, wherein the AUTHENTICATION KEY is derived from the authentication key from plural concatenated instances of the authentication key.
- 71. The apparatus of claim 63, wherein the radio access network node transmits the authentication indicia in a first radio resource control (RRC) message, and wherein the radio access network node includes the authentication key in a second radio resource control (RRC) message.
- 72. The apparatus of claim 71, wherein the first radio resource control (RRC) message is a radio resource control (RRC) connection establish message and the second radio resource control (RRC) message is a radio resource control (RRC) connection release message.
- 73. The apparatus of claim 71, wherein the radio access network node transmits the authentication indicia to the mobile node in conjunction with one of the following:
a radio resource control (RRC) connection establish message; when a new U-RNTI is assigned; after ciphering has been started.
- 74. A mobile node of a communications network comprising:
means for receiving an authentication indicia transmitted over an air interface; an authentication unit which confirms that an authentication key included in an interaction termination message transmitted to the mobile node over the air interface is related to the authentication indicia as a condition for performing an interaction termination operation.
- 75. The apparatus of claim 74, wherein the authentication indicia is related to the authentication key by being equal to the authentication key.
- 76. The apparatus of claim 74, wherein the authentication indicia is related to the authentication key by a function.
- 77. The apparatus of claim 74, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function C=Kasumi(M)AUTHENTICATION KEY, wherein:
M is a parameter derived from an identity of a mobile node; AUTHENTICATION KEY is a parameter derived from the authentication key; and C is the authentication indicia.
- 78. The apparatus of claim 77, wherein M is derived from one of an U-RNTI of the mobile node and a core network UE identity of the mobile node.
- 79. The apparatus of claim 77, wherein the AUTHENTICATION KEY is derived from the authentication key from plural concatenated instances of the authentication key.
- 80. The apparatus of claim 74, wherein the authentication unit comprises:
means for determining a calculated authentication indicia using the authentication key included in the interaction termination message; means for confirming that the calculated authentication indicia represents the authentication indicia provided over the air interface.
- 81. The apparatus of claim 74, wherein the authentication indicia is received by the mobile node in a first radio resource control (RRC) message and wherein the authentication key is included in a second radio resource control (RRC) message; and wherein the mobile node confirms that the authentication key included in the second radio resource control (RRC) message is related to the authentication indicia as a condition for performing an interaction termination operation.
- 82. The apparatus of claim 81, wherein the first radio resource control (RRC) message is a radio resource control (RRC) connection establish message and the second radio resource control (RRC) message is a radio resource control (RRC) connection release message.
- 83. The apparatus of claim 74, wherein the mobile node receives the authentication indicia in conjunction with one of the following:
a radio resource control (RRC) connection establish message; when a new U-RNTI is assigned; after ciphering has been started.
- 84. The apparatus of claim 74, wherein the mobile node is a user equipment unit.
- 85. A node of a communications network comprising:
a memory which stores an association of a mobile node with an authentication indicia, the authentication indicia having been transmitted from the mobile node over an air interface; means for determining a calculated authentication indicia using an authentication key included in an interaction termination message, the interaction termination message having been transmitted from the mobile node over an air interface; means for confirming that the calculated authentication indicia represents the authentication indicia stored in the memory as a condition for performing an interaction termination operation.
- 86. The apparatus of claim 85, wherein the authentication indicia is related to the authentication key by being equal to the authentication key.
- 87. The apparatus of claim 85, wherein the authentication indicia is related to the authentication key by a function.
- 88. The apparatus of claim 85, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function.
- 89. The apparatus of claim 85, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function C=Kasumi(M)AUTHENTICATION KEY, wherein:
M is a parameter derived from an identity of a mobile node; AUTHENTICATION KEY is a parameter derived from the authentication key; and C is the authentication indicia.
- 90. The apparatus of claim 89, wherein M is derived from one of an U-RNTI of the mobile node and a core network UE identity of the mobile node.
- 91. The apparatus of claim 89, wherein the AUTHENTICATION KEY is derived from the authentication key from plural concatenated instances of the authentication key.
- 92. The apparatus of claim 85, wherein the node is a core network node.
- 93. The apparatus of claim 92, wherein the interaction termination operation is a detach operation.
- 94. The apparatus of claim 92, wherein the core network node uses the IMSI or the TMSI of the mobile node to confirm that the authentication key is related to the authentication indicia.
- 95. The apparatus of claim 92, wherein the authentication indicia is received by the core network node during a mobile node registration procedure and wherein the authentication key is included in an IMSI detach indication message.
- 96. A mobile node of a communications network comprising:
means for causing transmission of an authentication indicia over an air interface; an authentication unit which includes an authentication key derived from the authentication indicia in an interaction termination message which is transmitted over the air interface.
- 97. The apparatus of claim 96, further comprising a key selection unit which selects the authentication key.
- 98. The apparatus of claim 96, wherein the authentication indicia is related to the authentication key by being equal to the authentication key.
- 99. The apparatus of claim 96, wherein the authentication indicia is related to the authentication key by a function.
- 100. The apparatus of claim 96, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function.
- 101. The apparatus of claim 96, wherein the authentication indicia is an authentication code which is related to the authentication key by a Kasumi function C=Kasumi(M)AUTHENTICATION KEY, wherein:
M is a parameter derived from an identity of a mobile node; AUTHENTICATION KEY is a parameter derived from the authentication key; and C is the authentication indicia.
- 102. The apparatus of claim 101, wherein M is derived from one of an U-RNTI of the mobile node and a core network UE identity of the mobile node.
- 103. The apparatus of claim 101, wherein the AUTHENTICATION KEY is derived from the authentication key from plural concatenated instances of the authentication key.
- 104. The apparatus of claim 96, wherein the mobile node transmits the authentication indicia during a mobile node registration procedure and wherein the authentication key is included in an IMSI detach indication message.
- 105. The apparatus of claim 96, wherein the mobile node transmits the authentication indicia upon occurrence of a predetermined event, and wherein the mobile node communicates the authentication key to a core network node upon occurrence of an interaction termination operation.
- 106. The apparatus of claim 105, wherein the predetermined event is core network registration of the mobile node.
- 107. The apparatus of claim 105, wherein the interaction termination operation is a detach operation.
- 108. The apparatus of claim 96, wherein the mobile node uses an IMSI detach indication message to communicate the authentication key to a core network node.
- 109. The apparatus of claim 96, wherein the mobile node uses an IMSI or a TMSI of the mobile node to generate the authentication indicia which is provided to a core network upon the occurrence of the predetermined event.
Parent Case Info
[0001] This application is a continuation-in-part of United States Patent Application: U.S. patent application Ser. No. 09/852,915, filed May 11, 2001, and entitled “RELEASING PLURAL RADIO CONNECTIONS WITH OMNIBUS RELEASE MESSAGE,” and is related to U.S. Provisional Patent Application Serial No. 60/317,970, filed Sep. 20, 2001, entitled RECOVERY OF MOBILE STATION(S) IN CONNECTED MODE UPON RNC FAILURE, all of which are incorporated herein by reference in their entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60317970 |
Sep 2001 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09852915 |
May 2001 |
US |
Child |
10113944 |
Apr 2002 |
US |