US20040242195A1 - Method for processing security message in mobile communication system - Google Patents

Method for processing security message in mobile communication system Download PDF

Info

Publication number
US20040242195A1
US20040242195A1 US10/746,985 US74698503A US2004242195A1 US 20040242195 A1 US20040242195 A1 US 20040242195A1 US 74698503 A US74698503 A US 74698503A US 2004242195 A1 US2004242195 A1 US 2004242195A1
Authority
US
United States
Prior art keywords
security
message
check
value
relating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/746,985
Inventor
Sung Chun
Seung Yi
Young Lee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LG Electronics Inc
Original Assignee
LG Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LG Electronics Inc filed Critical LG Electronics Inc
Priority to US10/777,843 priority Critical patent/US7471943B2/en
Publication of US20040242195A1 publication Critical patent/US20040242195A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Definitions

  • the present invention relates to a message processing method applied to mobile communication, and more particularly, to a method for processing a security message in a RRC layer.
  • UMTS universal mobile telecommunications system
  • UE user equipment
  • UTRAN UMTS terrestrial radio access network
  • CN core network
  • the UTRAN comprises a plurality of RNSs (radio network subsystems).
  • Each of the RNS comprises RNC (radio network controller) and a plurality of Node Bs managed by the RNC.
  • RNC radio network controller
  • a Node B receives uplink signals transmitted from UE and transmits downlink signals to the UE.
  • the RNC takes charge of allocation and management of radio resource, and plays a role of an access point to connect the Node Bs to the CN.
  • Each UE connected to the UMTS is managed by a specific RNC in the UTRAN, and the specific RNC is called SRNC (serving RNC).
  • SRNC serving RNC
  • the UTRAN configures, maintains, and manages RABs (radio access bearers) for the communications between the UE and the CN.
  • the CN applies end-to-end QoS (quality of service) requirements to the RAB, and the RAB supports QoS requirements set up by the CN.
  • the UTRAN therefore configures, maintains, and manages the RAB, thereby enabling to meet the end-to-end QoS requirements.
  • a radio interface protocol vertically comprises a physical layer, a data link layer, and a network layer and horizontally comprises a user plane for providing data information and a control plane for providing signaling.
  • the protocol layers are grouped into L1 (layer 1), L2 (layer 2), and L3 (layer 3) based on three lower layers of an OSI (open system interconnection) reference model.
  • L1 provides upper layers with information transfer service using various radio transmission techniques.
  • the L1 is connected to a MAC (medium access control) layer of the upper layers via transport channels.
  • a RLC layer supports data transmission reliably and carries out segmentation and concatenation on RLC SDUs (service data units) transferred from the upper layers.
  • the RLC SDUs transferred from the upper layers are divided into RLC data units that can be processed in the RLC layer, and header information is added to the divided RLC data units to transfer to the MAC layer as a form of PDU (protocol data unit).
  • PDU protocol data unit
  • a PDCP (packet data convergence protocol) layer is disposed over the RLC layer.
  • the PDCP layer makes data, which is transferred through the network protocol, be transmitted efficiently over a radio interface of which bandwidth is relatively narrow.
  • a BMC (broadcast/multicast control) layer schedules UEs to which a CB (cell broadcast) message transferred from the CN will be transmitted, and transfers the CB message to the corresponding UEs located in specific cell(s) on the basis of the scheduling.
  • a RRC (radio resource control) layer controls transport and physical channels to perform the establishment, reconfiguration, and release of RBs (radio bearers).
  • the RB means a service provided by the L2 for data transfer between the UE and UTRAN.
  • various channels for receiving/transmitting data are defined between the UEs and the UTRAN to use.
  • Data are sent and received between the PHY layer of UE and that of the UTRAN using the physical channel.
  • data transport paths between the protocol layers are defined as transport and logical channels in the radio access network of the UMTS.
  • the logical channels are provided for data exchange between the RLC and MAC layer, while the transport channels are provided for data exchange between the MAC and PHY layer. Mapping between transport channels is performed in the MAC layer, while another mapping between the transport and physical layers is performed in the physical layer.
  • the ciphering adds a specific mask, which is known to both of transmitting and receiving parties only, to a message so that a third party failing to know the mask is unable to recognize the contents of the message.
  • the integrity check is used for checking whether an unauthorized third party has altered the contents of the message or whether the transmission is made by an unauthenticated party. Namely, the integrity check is performed for integrity protection and is a procedure required for checking whether the contents of the received message are intentionally and previously changed by the third party.
  • the ciphering and the integrity check are simultaneously carried out on most of the messages transferred to the RRC layer and most of the control messages transmitted to the upper layers of the RRC layer. And, the ciphering is carried out on other general user data only. Such integrity check can be carried out in the RRC layer.
  • the receiving party carries out the integrity check on the received message.
  • the received message is normally processed or discarded according to whether the received message passes the integrity check or not.
  • one of the received messages may be a security setup control message.
  • the security setup control message is used for initiating to secure messages that will be transmitted thereafter.
  • the security setup control message can be used for controlling security-relating environment variables that are used for the connection on which the security process has been carried out.
  • security-relating environment setup information Information, which is related to controlling the security-relating environment variables, among the contents contained in the security setup control message is called security-relating environment setup information. Yet, the security-relating information contained in the security setup control message itself can be changed by the unauthenticated third party or can be transmitted by the unauthenticated transmitting party, whereby it is unable to rely on such security-relating information.
  • the present invention is directed to a method for processing a security message in mobile communication system that substantially obviates one or more problems due to limitations and disadvantages of the related art.
  • An object of the present invention is to provide a security setup control message processing method including security check of a security message itself.
  • a method for processing security message in mobile communication system includes the steps of receiving the security message, storing previous security-relating variables, carrying out security check on the security message, discarding or processing the security message according to a result of the security check, and updating the security-relating variables.
  • the present invention is characterized in that the security check of the security message itself is performed to secure integrity protection.
  • FIG. 1 illustrates a flowchart of a general message processing method
  • FIG. 2 illustrates a flowchart of a method for processing a security setup control message according to a first embodiment of the present invention
  • FIG. 3 illustrates a flowchart of a method for processing a security setup control message according to a second embodiment of the present invention
  • FIG. 4 illustrates a diagram of one embodiment representing COUNT-I in security-relating environment variables
  • FIG. 5 illustrates a diagram for explaining one embodiment of generating an authentication value in integrity check.
  • FIG. 1 illustrates a flowchart of a general message processing method.
  • UE user equipment
  • S 11 general message
  • S 12 carries out integrity check on it
  • the message is normally processed or discarded. Namely, if the message passes the integrity check, it is normally processed (S 13 ) If the message fails to pass the integrity check, it is discarded since there exists a security problem (S 14 ).
  • FIG. 2 illustrates a flowchart of a method for processing a security setup control message according to a first embodiment of the present invention.
  • UE user equipment receives a security setup control message (S 21 ). And, security-relating environment variables are updated using security-relating environment setup information contained in the received security setup control message (S 22 ).
  • the UE (ex. terminal) carries out security check on the security setup control message itself using the updated security-relating environment variables (S 23 ).
  • the security check includes integrity check. If the security setup control message passes the integrity check, the message is normally processed (S 24 ). Yet, if the security setup control message fails to pass the integrity check, the message is judged as abnormal so that the received security setup control message is discarded (S 25 ). Moreover, it is unable to rely on the security-relating environment setup information included in the security setup control message. Hence, it is unable to use the security-relating environment setup information.
  • the security-relating environment variables of the receiving party do not coincide with those of a transmitting party anymore, it is unable to further exchange messages, and the receiving party cannot be provided with further requested services.
  • FIG. 3 illustrates a flowchart of a method for processing a security setup control message according to a second embodiment of the present invention.
  • a method for processing a security setup control message is carried out in a following manner.
  • UE user equipment receives a security setup control message (S 31 ). Before the UE carries out security check on the security setup control message itself, security-relating environment variables which were previously set are temporarily stored (S 32 ). And, the security-relating environment variables are updated using security-relating environment setup information included in the received security setup control message (S 33 ).
  • the UE (ex. terminal) carries out security check on the security setup control message itself using the updated security-relating environment variables (S 34 ). And, the security check includes integrity check. If the security setup control message passes a result of the integrity check, the temporarily stored security-relating environment variables are deleted (S 35 ). Thereafter, security check is carried out on messages received later using the updated security-relating environment variables and the message is normally processed (S 36 ).
  • the security setup control message fails to pass the integrity check, it is handled such that the security setup control message is not received. Namely, if it is judged that the message is abnormal, the received security setup control message is discarded (S 37 ). Moreover, the security-relating environment setup information included in the security setup control message cannot be used since it is not reliable. Thus, in case that the security setup control message is unable to pass the security check, the security setup control message is discarded as well as the temporarily stored security-relating environment variables are restored (S 38 ). And, messages received later are processed using the restored security-relating environment variables.
  • a method of performing the integrity check is explained in detail as follows. For such explanation, parameters required for performing the integrity check are explained. In order to perform the integrity check, required are such parameters as IK (integrity key), COUNT-I, MESSAGE, DIRECTION (direction identifier, 1 bit), and FRESH.
  • FIG. 4 illustrates a diagram of one embodiment representing COUNT-I in security-relating environment variables.
  • COUNT-I is one of security-relating environment variables. Namely, the COUNT-I is a value corresponding to a sequence number for integrity check.
  • the COUNT-I includes a pair or areas.
  • One area of the two includes RRC HFN (hyper frame number) of 28 bits, while the other area of the two includes RRC SN (sequence number) of 4 bits.
  • a procedure of updating the security-relating environment variables is carried out in a manner that HFN as a value of upper 28 bits of the COUNT-I is reset.
  • the reset HFN may be a START value transmitted recently by a terminal, 0, or a specific value.
  • UE carries out security check on the received security setup control message using the updated security-relating environment variables.
  • the IK among the parameters for performing the integrity check indicates an integrity key, which is generated from an authentication procedure in an upper layer of the RRC layer to have the RRC layer be informed of.
  • a value of the IK is not transmitted via a radio interface, but the upper layer of the RRC layer in the terminal and a network (ex. UTRAN) calculate values of the IK to use based on specific input values, respectively.
  • a value of the START is read from an SIM card when the terminal initiates connection between RRC layers of the UTRAN and the terminal, and is transmitted to the UTRAN.
  • the value of the START which is included in a message transmitted from the upper layer of the RRC layer of the terminal, may be transmitted to the UTRAN.
  • the value of the START is defined as the greatest number of upper 20 bits of the currently used values of the COUNT-I or COUNT-C (which is used for ciphering and plays a role similar to the COUNT-I) And the value of the START currently used between the RRC layers of the terminal and UTRAN is stored in the SIM card when the connection between the RRC layers of the terminal and UTRAN ends.
  • the MESSAGE means a message which is transmitted itself.
  • the DIRECTION is a direction discriminator and its value varies in accordance with uplink or downlink.
  • the DIRECTION can be set as ‘0’ or ‘1’ on uplink or downlink.
  • the FRESH is a value given to each terminal independently, and is a value that UTRAN transmits to UE on an initial state of the RRC connection. Namely, the value of the FRESH is an arbitrary number that UTRAN transmits to UE, which is for securing the security of the UTRAN from the terminal reusing the values of the COUNT-I and MAC-I in a manner that UTRAN provides UE with a new value every RRC connection.
  • a value of the MAC-I (message authentication code-I) is a message authentication code calculated using UIA (UMTS integrity algorithm) with security-relating environment values, which is an integrity checksum inserted in RRC PDU.
  • FIG. 5 illustrates a diagram for explaining one embodiment of generating an authentication value in integrity check, in which ‘f9’ is a standardized integrity check authentication generation algorithm adopted by 3GPP.
  • UTRAN and terminal use values of the parameters as input values, thereby generating values of MAC-I and XMAC-I using such an algorithm as ‘f9’.
  • the MAC-I is an integrity check authentication value generated from the UTRAN
  • the XMAC-I is an integrity check authentication value generated from the terminal. If all input values of the UTRAN and terminal are equal to each other, the values of the MAC-I and XMAC-I generated from the procedure of FIG. 3 will be equal to each other. Yet, if the message is changed in the middle of processing, input values of MESSAGE of receiving and transmitting parties are different from each other so that the value of the XMAC-I is not equal to that of the MAC-I.
  • the terminal judges that contents of the received security setup control message are intentionally changed during transmission or that the received security setup control message is transmitted from an unauthenticated party. In such a case the security setup control message is judged as invalid, thereby failing to pass the integrity check.
  • UTRAN changes a portion of the input values used for the procedure in FIG. 3 whenever sending a new message. And, the UTRAN generates a new MAC-I each time using the partial change of input values. This is performed to prevent that an unauthorized party reuses the value of the MAC-I to pass the integrity check.
  • the UTRAN increases the SN value of the COUNT-I by increment of ‘1’ whenever sending a message.
  • the SN value constructs lower 4 bits of the COUNT-I. Being 4 bits, the SN value can have values ranging between 0 ⁇ 15 and sequentially increases by ‘1’ from ‘0’. Once the SN value becomes ‘15’, the next SN value becomes ‘0’ and then increases by the increment of ‘1’ again.
  • HFN corresponding to upper value of the COUNT-I value is increased by ‘1’ whenever the SN becomes back to ‘0’ from 15.
  • the terminal recognizes the SN value of the received message and judges that the SN value has completed one cycle, the terminal increases its HFN value by ‘1’.
  • the COUNT-I can coincide with that of the transmitting party. If such a method is used, the terminal and UTRAN can have the same COUNT-I information even if SN information is sent only. Besides, security information leakage, which may occur when the entire COUNT-I is sent, to a third party can be prevented.
  • UTRAN enables the receiving party to accurately calculate the XMAC-I value as well as adds the SN value as lower value of the COUNT-I to the message of each message transmission to prevent the unauthorized third party from passing the integrity check.
  • the LMAC-I value which will be used as a reference for the terminal to perform the integrity check, is added to the message to transmit.
  • UE Once UE receives the security setup control message, it is necessary to perform the security check of the SN value. For this, UE manages its local parameter SN only using the SN values received so far. If the SN value transmitted together with the security setup control message is equal to the local parameter SN value of the terminal, it can be assumed that a third party sends the message using the same security information of the transmitting party or that the same message is transmitted again from the authenticated UTRAN. In such a case, the terminal immediately discards the security setup control message.
  • the terminal configures COUNT-I using the SN value received together with the security setup control message and calculates XMAC-I using the parameters set previously in COUNT-I and UE.
  • the parameters set previously in UE include MESSAGE, DIRECTION, FRESH.
  • the UE By comparing the MAC-I value transmitted together with the security setup control message to the XMAC- 1 value calculated by UE, the UE performs the integrity check of the security setup control message.
  • the receiving party stores the SN value included in the message in the local parameter SN and uses it for the SN value check of the next message.
  • the method according to the present invention is implemented as a program and can be stored in recording media (CD ROM, floppy disk, hard disk, optical magnetic disk, etc.) as a form that can be read by computer.
  • recording media CD ROM, floppy disk, hard disk, optical magnetic disk, etc.

Abstract

Disclosed is a method for processing security message in mobile communication system. The present invention provides a method of securing integrity protection for a received security message and includes the steps of receiving the security message, storing previous security-relating variables, carrying out security check on the security message, discarding or processing the security message according to a result of the security check, and updating the security-relating variables. Accordingly, the present invention enables to carry out integrity check by storing the security-relating variables previously even if the security message itself is discarded.

Description

  • This application claims the benefit of the Korean Application No. P2003-08512 filed on 3 Feb., 2003, which is hereby incorporated by reference. [0001]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0002]
  • The present invention relates to a message processing method applied to mobile communication, and more particularly, to a method for processing a security message in a RRC layer. [0003]
  • 2. Discussion of the Related Art [0004]
  • UMTS (universal mobile telecommunications system) includes UE (user equipment), UTRAN (UMTS terrestrial radio access network), and CN (core network). Moreover, the UTRAN comprises a plurality of RNSs (radio network subsystems). Each of the RNS comprises RNC (radio network controller) and a plurality of Node Bs managed by the RNC. A Node B receives uplink signals transmitted from UE and transmits downlink signals to the UE. The RNC takes charge of allocation and management of radio resource, and plays a role of an access point to connect the Node Bs to the CN. Each UE connected to the UMTS is managed by a specific RNC in the UTRAN, and the specific RNC is called SRNC (serving RNC). [0005]
  • The UTRAN configures, maintains, and manages RABs (radio access bearers) for the communications between the UE and the CN. The CN applies end-to-end QoS (quality of service) requirements to the RAB, and the RAB supports QoS requirements set up by the CN. The UTRAN therefore configures, maintains, and manages the RAB, thereby enabling to meet the end-to-end QoS requirements. [0006]
  • A radio interface protocol vertically comprises a physical layer, a data link layer, and a network layer and horizontally comprises a user plane for providing data information and a control plane for providing signaling. The protocol layers are grouped into L1 (layer 1), L2 (layer 2), and L3 (layer 3) based on three lower layers of an OSI (open system interconnection) reference model. The L1 provides upper layers with information transfer service using various radio transmission techniques. And, the L1 is connected to a MAC (medium access control) layer of the upper layers via transport channels. [0007]
  • A RLC layer supports data transmission reliably and carries out segmentation and concatenation on RLC SDUs (service data units) transferred from the upper layers. The RLC SDUs transferred from the upper layers are divided into RLC data units that can be processed in the RLC layer, and header information is added to the divided RLC data units to transfer to the MAC layer as a form of PDU (protocol data unit). [0008]
  • A PDCP (packet data convergence protocol) layer is disposed over the RLC layer. The PDCP layer makes data, which is transferred through the network protocol, be transmitted efficiently over a radio interface of which bandwidth is relatively narrow. A BMC (broadcast/multicast control) layer schedules UEs to which a CB (cell broadcast) message transferred from the CN will be transmitted, and transfers the CB message to the corresponding UEs located in specific cell(s) on the basis of the scheduling. [0009]
  • On request from higher layers, A RRC (radio resource control) layer controls transport and physical channels to perform the establishment, reconfiguration, and release of RBs (radio bearers). In this case, the RB means a service provided by the L2 for data transfer between the UE and UTRAN. [0010]
  • Meanwhile, various channels for receiving/transmitting data are defined between the UEs and the UTRAN to use. Data are sent and received between the PHY layer of UE and that of the UTRAN using the physical channel. In addition to physical channel, data transport paths between the protocol layers are defined as transport and logical channels in the radio access network of the UMTS. The logical channels are provided for data exchange between the RLC and MAC layer, while the transport channels are provided for data exchange between the MAC and PHY layer. Mapping between transport channels is performed in the MAC layer, while another mapping between the transport and physical layers is performed in the physical layer. [0011]
  • Various kinds of messages are received/transmitted between the terminal and UTRAN. ‘Security check’ is mostly carried out to protect data contained in the messages. Such ‘security check’ includes ‘ciphering’ and ‘integrity check’. [0012]
  • The ciphering adds a specific mask, which is known to both of transmitting and receiving parties only, to a message so that a third party failing to know the mask is unable to recognize the contents of the message. [0013]
  • And, the integrity check is used for checking whether an unauthorized third party has altered the contents of the message or whether the transmission is made by an unauthenticated party. Namely, the integrity check is performed for integrity protection and is a procedure required for checking whether the contents of the received message are intentionally and previously changed by the third party. [0014]
  • In the UMTS, the ciphering and the integrity check are simultaneously carried out on most of the messages transferred to the RRC layer and most of the control messages transmitted to the upper layers of the RRC layer. And, the ciphering is carried out on other general user data only. Such integrity check can be carried out in the RRC layer. [0015]
  • Thus, if the message of which contents are changed by the third party between the transmitting and receiving parties is received, or in order to filter a message transmitted from the unauthenticated transmitting party, the receiving party carries out the integrity check on the received message. Hence, the received message is normally processed or discarded according to whether the received message passes the integrity check or not. [0016]
  • For instance, one of the received messages may be a security setup control message. In connection between the UE and the network (ex. UTRAN), the security setup control message is used for initiating to secure messages that will be transmitted thereafter. Moreover, the security setup control message can be used for controlling security-relating environment variables that are used for the connection on which the security process has been carried out. [0017]
  • Information, which is related to controlling the security-relating environment variables, among the contents contained in the security setup control message is called security-relating environment setup information. Yet, the security-relating information contained in the security setup control message itself can be changed by the unauthenticated third party or can be transmitted by the unauthenticated transmitting party, whereby it is unable to rely on such security-relating information. [0018]
  • SUMMARY OF THE INVENTION
  • Accordingly, the present invention is directed to a method for processing a security message in mobile communication system that substantially obviates one or more problems due to limitations and disadvantages of the related art. [0019]
  • An object of the present invention is to provide a security setup control message processing method including security check of a security message itself. [0020]
  • Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings. [0021]
  • To achieve these objects and other advantages and in accordance with the purpose of the invention, as embodied and broadly described herein, a method for processing security message in mobile communication system according to the present invention includes the steps of receiving the security message, storing previous security-relating variables, carrying out security check on the security message, discarding or processing the security message according to a result of the security check, and updating the security-relating variables. [0022]
  • The present invention is characterized in that the security check of the security message itself is performed to secure integrity protection. [0023]
  • It is to be understood that both the foregoing general description and the following detailed description of the present invention are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.[0024]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principle of the invention. In the drawings: [0025]
  • FIG. 1 illustrates a flowchart of a general message processing method; [0026]
  • FIG. 2 illustrates a flowchart of a method for processing a security setup control message according to a first embodiment of the present invention; [0027]
  • FIG. 3 illustrates a flowchart of a method for processing a security setup control message according to a second embodiment of the present invention; [0028]
  • FIG. 4 illustrates a diagram of one embodiment representing COUNT-I in security-relating environment variables; and [0029]
  • FIG. 5 illustrates a diagram for explaining one embodiment of generating an authentication value in integrity check.[0030]
  • DETAILED DESCRIPTION OF THE INVENTION
  • Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. [0031]
  • FIG. 1 illustrates a flowchart of a general message processing method. [0032]
  • Referring to FIG. 1, UE (user equipment) firstly receives a general message (S[0033] 11) and then carries out integrity check on it (S12). In accordance with a result of the integrity check, the message is normally processed or discarded. Namely, if the message passes the integrity check, it is normally processed (S13) If the message fails to pass the integrity check, it is discarded since there exists a security problem (S14).
  • FIG. 2 illustrates a flowchart of a method for processing a security setup control message according to a first embodiment of the present invention. [0034]
  • Referring to FIG. 2, UE (user equipment) receives a security setup control message (S[0035] 21). And, security-relating environment variables are updated using security-relating environment setup information contained in the received security setup control message (S22). The UE (ex. terminal) carries out security check on the security setup control message itself using the updated security-relating environment variables (S23). The security check includes integrity check. If the security setup control message passes the integrity check, the message is normally processed (S24). Yet, if the security setup control message fails to pass the integrity check, the message is judged as abnormal so that the received security setup control message is discarded (S25). Moreover, it is unable to rely on the security-relating environment setup information included in the security setup control message. Hence, it is unable to use the security-relating environment setup information.
  • In the first embodiment of the present invention, once a receiving party receives the security setup control message, the previously set security-relating environment variables are updated with the security-relating environment setup information included in the message, and the previous security-relating environment variables are discarded. Hence, the security-relating environment variables of the receiving party do not coincide with those of a transmitting party anymore, it is unable to further exchange messages, and the receiving party cannot be provided with further requested services. [0036]
  • FIG. 3 illustrates a flowchart of a method for processing a security setup control message according to a second embodiment of the present invention. [0037]
  • Referring to FIG. 3, a method For processing a security setup control message is carried out in a following manner. [0038]
  • First of all, UE (user equipment) receives a security setup control message (S[0039] 31). Before the UE carries out security check on the security setup control message itself, security-relating environment variables which were previously set are temporarily stored (S32). And, the security-relating environment variables are updated using security-relating environment setup information included in the received security setup control message (S33).
  • The UE (ex. terminal) carries out security check on the security setup control message itself using the updated security-relating environment variables (S[0040] 34). And, the security check includes integrity check. If the security setup control message passes a result of the integrity check, the temporarily stored security-relating environment variables are deleted (S35). Thereafter, security check is carried out on messages received later using the updated security-relating environment variables and the message is normally processed (S36).
  • However, if the security setup control message fails to pass the integrity check, it is handled such that the security setup control message is not received. Namely, if it is judged that the message is abnormal, the received security setup control message is discarded (S[0041] 37). Moreover, the security-relating environment setup information included in the security setup control message cannot be used since it is not reliable. Thus, in case that the security setup control message is unable to pass the security check, the security setup control message is discarded as well as the temporarily stored security-relating environment variables are restored (S38). And, messages received later are processed using the restored security-relating environment variables.
  • In accordance with the second embodiment of the present invention, even if the message of which contents are changed in the middle of transmission from the UTRAN to UE is received, or even if the security setup control message provided from an unauthenticated party is received, it is able to maintain the security-relating environment variables to be equal to those of the terminal using the previously set security-relating environment variables by storing and restoring them. Hence, if the security-relating environment setup variables are deleted instead of being stored, it is able to prevent the case that the message cannot be processed later due to the difference between the security-relating environment variables of the UE and the UTRAN. [0042]
  • A method of performing the integrity check is explained in detail as follows. For such explanation, parameters required for performing the integrity check are explained. In order to perform the integrity check, required are such parameters as IK (integrity key), COUNT-I, MESSAGE, DIRECTION (direction identifier, 1 bit), and FRESH. [0043]
  • FIG. 4 illustrates a diagram of one embodiment representing COUNT-I in security-relating environment variables. [0044]
  • COUNT-I is one of security-relating environment variables. Namely, the COUNT-I is a value corresponding to a sequence number for integrity check. [0045]
  • Referring to FIG. 4, the COUNT-I includes a pair or areas. One area of the two includes RRC HFN (hyper frame number) of 28 bits, while the other area of the two includes RRC SN (sequence number) of 4 bits. [0046]
  • A procedure of updating the security-relating environment variables is carried out in a manner that HFN as a value of upper 28 bits of the COUNT-I is reset. Namely, the reset HFN may be a START value transmitted recently by a terminal, 0, or a specific value. And, UE carries out security check on the received security setup control message using the updated security-relating environment variables. [0047]
  • The IK among the parameters for performing the integrity check indicates an integrity key, which is generated from an authentication procedure in an upper layer of the RRC layer to have the RRC layer be informed of. A value of the IK is not transmitted via a radio interface, but the upper layer of the RRC layer in the terminal and a network (ex. UTRAN) calculate values of the IK to use based on specific input values, respectively. [0048]
  • A value of the START is read from an SIM card when the terminal initiates connection between RRC layers of the UTRAN and the terminal, and is transmitted to the UTRAN. The value of the START, which is included in a message transmitted from the upper layer of the RRC layer of the terminal, may be transmitted to the UTRAN. While the connection between the RRC layers of the UTRAN and terminal is activated, the value of the START is defined as the greatest number of upper 20 bits of the currently used values of the COUNT-I or COUNT-C (which is used for ciphering and plays a role similar to the COUNT-I) And the value of the START currently used between the RRC layers of the terminal and UTRAN is stored in the SIM card when the connection between the RRC layers of the terminal and UTRAN ends. [0049]
  • The MESSAGE means a message which is transmitted itself. The DIRECTION is a direction discriminator and its value varies in accordance with uplink or downlink. The DIRECTION can be set as ‘0’ or ‘1’ on uplink or downlink. The FRESH is a value given to each terminal independently, and is a value that UTRAN transmits to UE on an initial state of the RRC connection. Namely, the value of the FRESH is an arbitrary number that UTRAN transmits to UE, which is for securing the security of the UTRAN from the terminal reusing the values of the COUNT-I and MAC-I in a manner that UTRAN provides UE with a new value every RRC connection. A value of the MAC-I (message authentication code-I) is a message authentication code calculated using UIA (UMTS integrity algorithm) with security-relating environment values, which is an integrity checksum inserted in RRC PDU. [0050]
  • If there is no procedure of updating the value of the FRESH, a security invader easily makes the security of UTRAN vulnerable by requesting that the value of the START that will be used as an upper value of the COUNT-I should be set into a very small value when new connection between RRC layers is requested and then by using a pair of vales of the SN and MAC-I which was used for the previous connection between the RRC layers. Yet, such vulnerability of the security can be prevented by assigning a new value of the FRESH in UTRAN whenever the connection between RRC layers is newly established. [0051]
  • FIG. 5 illustrates a diagram for explaining one embodiment of generating an authentication value in integrity check, in which ‘f9’ is a standardized integrity check authentication generation algorithm adopted by 3GPP. [0052]
  • Referring to FIG. 5, UTRAN and terminal use values of the parameters as input values, thereby generating values of MAC-I and XMAC-I using such an algorithm as ‘f9’. The MAC-I is an integrity check authentication value generated from the UTRAN, and the XMAC-I is an integrity check authentication value generated from the terminal. If all input values of the UTRAN and terminal are equal to each other, the values of the MAC-I and XMAC-I generated from the procedure of FIG. 3 will be equal to each other. Yet, if the message is changed in the middle of processing, input values of MESSAGE of receiving and transmitting parties are different from each other so that the value of the XMAC-I is not equal to that of the MAC-I. [0053]
  • Hence, if the values of the MAC-I and XMAC-I are not equal to each other as a result of comparison, the terminal judges that contents of the received security setup control message are intentionally changed during transmission or that the received security setup control message is transmitted from an unauthenticated party. In such a case the security setup control message is judged as invalid, thereby failing to pass the integrity check. UTRAN changes a portion of the input values used for the procedure in FIG. 3 whenever sending a new message. And, the UTRAN generates a new MAC-I each time using the partial change of input values. This is performed to prevent that an unauthorized party reuses the value of the MAC-I to pass the integrity check. [0054]
  • For this, the UTRAN increases the SN value of the COUNT-I by increment of ‘1’ whenever sending a message. As mentioned in the foregoing description, the SN value constructs lower 4 bits of the COUNT-[0055] I. Being 4 bits, the SN value can have values ranging between 0˜15 and sequentially increases by ‘1’ from ‘0’. Once the SN value becomes ‘15’, the next SN value becomes ‘0’ and then increases by the increment of ‘1’ again. Thus, HFN corresponding to upper value of the COUNT-I value is increased by ‘1’ whenever the SN becomes back to ‘0’ from 15.
  • Hence, such a method brings about the effect that the COUNT-I increases by ‘1’ each time, whereby the input values are changed in part in a ciphering authentication value calculation procedure. [0056]
  • Meanwhile, if the terminal recognizes the SN value of the received message and judges that the SN value has completed one cycle, the terminal increases its HFN value by ‘1’. Thus, the COUNT-I can coincide with that of the transmitting party. If such a method is used, the terminal and UTRAN can have the same COUNT-I information even if SN information is sent only. Besides, security information leakage, which may occur when the entire COUNT-I is sent, to a third party can be prevented. Hence, UTRAN enables the receiving party to accurately calculate the XMAC-I value as well as adds the SN value as lower value of the COUNT-I to the message of each message transmission to prevent the unauthorized third party from passing the integrity check. And, the LMAC-I value, which will be used as a reference for the terminal to perform the integrity check, is added to the message to transmit. [0057]
  • Once UE receives the security setup control message, it is necessary to perform the security check of the SN value. For this, UE manages its local parameter SN only using the SN values received so far. If the SN value transmitted together with the security setup control message is equal to the local parameter SN value of the terminal, it can be assumed that a third party sends the message using the same security information of the transmitting party or that the same message is transmitted again from the authenticated UTRAN. In such a case, the terminal immediately discards the security setup control message. [0058]
  • The terminal configures COUNT-I using the SN value received together with the security setup control message and calculates XMAC-I using the parameters set previously in COUNT-I and UE. The parameters set previously in UE include MESSAGE, DIRECTION, FRESH. [0059]
  • By comparing the MAC-I value transmitted together with the security setup control message to the XMAC-[0060] 1 value calculated by UE, the UE performs the integrity check of the security setup control message.
  • Once the received security setup control message passes the integrity check, the receiving party stores the SN value included in the message in the local parameter SN and uses it for the SN value check of the next message. [0061]
  • Accordingly, the method according to the present invention is implemented as a program and can be stored in recording media (CD ROM, floppy disk, hard disk, optical magnetic disk, etc.) as a form that can be read by computer. Such a process is apparent to those skilled in the art, whereby its explanation is skipped in this description. [0062]
  • It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention. Thus, it is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. [0063]

Claims (7)

What is claimed is:
1. A method for processing security message in mobile communication system, comprising the steps of:
receiving the security message;
storing previous security-relating variables;
carrying out security check on the security message;
discarding or processing the security message according to a result of the security check; and
updating the security-relating variables.
2. The method of claim 1, wherein the security check is integrity check.
3. The method of claim 2, the integrity check comprising the steps of:
performing an integrity check algorithm by receiving the security-relating variables; and
comparing an authentication code calculated by performing the integrity check algorithm to a received authentication code transmitted from a transmitting party.
4. The method of claim 3, the step of discarding or processing the security message is carried out in a manner that the security message is processed if the received authentication code is equal to a message authentication code transmitted from the transmitting party or that the security message is discarded if the received authentication code is not equal to the message authentication code.
5. The method of claim 1, wherein the step of updating the security-relating variables is carried out in a manner that the stored security-relating variables are restored if the security message is discarded or that the security-relating variables included in the received security message are updated into new security-relating variables if the security message is processed.
6. The method of claim 1, wherein the security message is an RRC (radio resource control) message.
7. The method of claim 1, wherein the security message is a signaling message.
US10/746,985 2003-02-11 2003-12-23 Method for processing security message in mobile communication system Abandoned US20040242195A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/777,843 US7471943B2 (en) 2003-02-11 2004-02-11 Method for processing a security setup control message in mobile communication system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR2003-8512 2003-02-11
KR1020030008512A KR100956823B1 (en) 2003-02-11 2003-02-11 Method of processing a security mode message in a mobile communication system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/777,843 Continuation-In-Part US7471943B2 (en) 2003-02-11 2004-02-11 Method for processing a security setup control message in mobile communication system

Publications (1)

Publication Number Publication Date
US20040242195A1 true US20040242195A1 (en) 2004-12-02

Family

ID=36167036

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/746,985 Abandoned US20040242195A1 (en) 2003-02-11 2003-12-23 Method for processing security message in mobile communication system
US10/777,843 Active 2025-02-18 US7471943B2 (en) 2003-02-11 2004-02-11 Method for processing a security setup control message in mobile communication system

Family Applications After (1)

Application Number Title Priority Date Filing Date
US10/777,843 Active 2025-02-18 US7471943B2 (en) 2003-02-11 2004-02-11 Method for processing a security setup control message in mobile communication system

Country Status (11)

Country Link
US (2) US20040242195A1 (en)
EP (1) EP1593278B1 (en)
JP (1) JP4397818B2 (en)
KR (1) KR100956823B1 (en)
CN (1) CN100544478C (en)
AU (1) AU2003288764B2 (en)
MX (1) MXPA05008418A (en)
RU (1) RU2336665C2 (en)
UA (1) UA85178C2 (en)
WO (1) WO2004073347A1 (en)
ZA (1) ZA200506363B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050170813A1 (en) * 2004-02-04 2005-08-04 Choi Won S. Apparatus and method for setting use restriction of mobile communication terminal
US20060230274A1 (en) * 2005-04-12 2006-10-12 Srinivasan Surendran Method and system for hardware accelerator for implementing F9 integrity algorithm in WCDMA compliant handsets
US20080182592A1 (en) * 2007-01-26 2008-07-31 Interdigital Technology Corporation Method and apparatus for securing location information and access control using the location information
US20080273503A1 (en) * 2007-05-02 2008-11-06 Lg Electronics Inc. Method and terminal for performing handover in mobile communications system of point-to-multipoint service
US20080273482A1 (en) * 2007-05-02 2008-11-06 Lg Electronics Inc. Uplink access method for receiving a point-to-multipoint service
US20100144313A1 (en) * 2007-04-30 2010-06-10 Sung-Duck Chun Method for performing an authentication of entities during establishment of wireless call connection
US20100178941A1 (en) * 2007-06-18 2010-07-15 Sung-Duck Chun Paging information transmission method for effective call setup
US20100191965A1 (en) * 2007-02-06 2010-07-29 Patrick Fischer Verification of system information in wireless communication system
US20100208650A1 (en) * 2007-04-30 2010-08-19 Sung-Duck Chun Method for transmitting or receiving data unit using header field existence indicator
US20100325504A1 (en) * 2007-06-18 2010-12-23 Lee Young-Dae Method for transmitting/receiving broadcast or multicast service and terminal thereof
US20110190033A1 (en) * 2007-10-17 2011-08-04 Gemalto Sa method for masking mobile phone messages from the sight of other people
US8184570B2 (en) 2007-04-30 2012-05-22 Lg Electronics Inc. Method of transmitting data in wireless communication system supporting multimedia broadcast/multicast service
US8229517B2 (en) 2007-05-01 2012-07-24 Lg Electronics Inc. Data transmission/reception method
US8428013B2 (en) 2006-10-30 2013-04-23 Lg Electronics Inc. Method of performing random access in a wireless communcation system
US8442017B2 (en) 2006-10-30 2013-05-14 Lg Electronics Inc. Method for transmitting random access channel message and response message, and mobile communication terminal
US8493911B2 (en) 2007-09-20 2013-07-23 Lg Electronics Inc. Method of restricting scheduling request for effective data transmission
US20130235724A1 (en) * 2012-03-09 2013-09-12 Sevis Systems, Inc. System and Method for Optimizing and Eliminating Congestion for WAN Interfaces within the Access Domain
US8576741B2 (en) 2006-10-30 2013-11-05 Lg Electronics Inc. Method for transitioning between multiple reception levels
US8619685B2 (en) 2006-10-02 2013-12-31 Lg Electronics Inc. Method for transmitting and receiving paging message in wireless communication system
US8649366B2 (en) 2007-06-18 2014-02-11 Lg Electronics Inc. Method of performing uplink synchronization in wireless communication system
US8798070B2 (en) 2007-05-02 2014-08-05 Lg Electronics Inc. Method of transmitting data in a wireless communication system
US8811336B2 (en) 2006-08-22 2014-08-19 Lg Electronics Inc. Method of performing handover and controlling thereof in a mobile communication system
USRE45347E1 (en) 2007-04-30 2015-01-20 Lg Electronics Inc. Methods of transmitting data blocks in wireless communication system
US8990916B2 (en) * 2012-07-20 2015-03-24 Cisco Technology, Inc. System and method for supporting web authentication
US9100940B2 (en) 2011-11-28 2015-08-04 Cisco Technology, Inc. System and method for extended wireless access gateway service provider Wi-Fi offload

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100956823B1 (en) * 2003-02-11 2010-05-11 엘지전자 주식회사 Method of processing a security mode message in a mobile communication system
JP4671776B2 (en) * 2005-06-15 2011-04-20 株式会社エヌ・ティ・ティ・ドコモ Confidential processing apparatus and confidential processing method
DE102005039366B4 (en) * 2005-06-24 2008-10-09 Infineon Technologies Ag Telecommunication terminal, telecommunication system, telecommunication session server unit, method for generating and transmitting a telecommunication session message, method for managing a telecommunication session message, computer readable storage media and computer program elements
GB2429607B (en) * 2005-08-26 2010-02-10 Samsung Electronics Co Ltd Improvements in mobile telecommunication security
US8832449B2 (en) * 2006-03-22 2014-09-09 Lg Electronics Inc. Security considerations for the LTE of UMTS
US8627092B2 (en) * 2006-03-22 2014-01-07 Lg Electronics Inc. Asymmetric cryptography for wireless systems
KR101252812B1 (en) * 2006-04-25 2013-04-12 주식회사 엘지씨엔에스 Network security device and method for controlling of packet data using the same
JP4960446B2 (en) * 2006-06-19 2012-06-27 インターデイジタル テクノロジー コーポレーション Method and apparatus for protecting the security of initial user identification information in an initial signaling message
CN101202936B (en) * 2006-12-11 2010-12-08 大唐移动通信设备有限公司 Method, system realizing RRC signal order integrality protection referring to SRNS relocation and wireless network controller
US7817595B2 (en) * 2007-05-17 2010-10-19 Htc Corporation Communication system, user device thereof and synchronization method thereof
US8068451B2 (en) * 2007-05-17 2011-11-29 Htc Corporation Communication system, user device thereof and synchronization method thereof
KR101470638B1 (en) 2007-06-18 2014-12-08 엘지전자 주식회사 Method for enhancing radio resource and informing status report in mobile telecommunications system and receiver of mobile telecommunications
KR101486352B1 (en) 2007-06-18 2015-01-26 엘지전자 주식회사 Method of controlling uplink synchronization state at a user equipment in a mobile communication system
WO2008156314A2 (en) 2007-06-20 2008-12-24 Lg Electronics Inc. Effective system information reception method
US9008006B2 (en) 2007-08-10 2015-04-14 Lg Electronics Inc. Random access method for multimedia broadcast multicast service(MBMS)
KR101490253B1 (en) 2007-08-10 2015-02-05 엘지전자 주식회사 Method of transmitting and receiving control information in a wireless communication system
KR101514841B1 (en) 2007-08-10 2015-04-23 엘지전자 주식회사 Method for re-attempting a random access effectively
KR101467789B1 (en) 2007-08-10 2014-12-03 엘지전자 주식회사 A control method for uplink connection of idle terminal
KR101392697B1 (en) 2007-08-10 2014-05-19 엘지전자 주식회사 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
US8488523B2 (en) 2007-08-14 2013-07-16 Lg Electronics Inc. Method of transmitting and processing data block of specific protocol layer in wireless communication system
KR101397003B1 (en) * 2007-09-05 2014-05-20 엘지전자 주식회사 Methods of data communication in mobile communication system
KR100937432B1 (en) 2007-09-13 2010-01-18 엘지전자 주식회사 Method of allocating radio resources in a wireless communication system
KR101461970B1 (en) 2007-09-13 2014-11-14 엘지전자 주식회사 Method of performing polling procedure in a wireless communication system
KR101591824B1 (en) 2007-09-18 2016-02-04 엘지전자 주식회사 Method of performing polling procedure in a wireless communication system
KR101513033B1 (en) 2007-09-18 2015-04-17 엘지전자 주식회사 A method for qos guarantees in a multilayer structure
KR101435844B1 (en) 2007-09-18 2014-08-29 엘지전자 주식회사 Method of transmitting a data block in a wireless communication system
WO2009038377A2 (en) 2007-09-20 2009-03-26 Lg Electronics Inc. Method of effectively transmitting radio resource allocation request in mobile communication system
KR20090041323A (en) 2007-10-23 2009-04-28 엘지전자 주식회사 Method of effectively transmitting identification information of terminal during the generation of data block
KR20090043465A (en) 2007-10-29 2009-05-06 엘지전자 주식회사 A method for repairing an error depending on a radio bearer type
KR101163275B1 (en) 2008-03-17 2012-07-05 엘지전자 주식회사 Method for transmitting pdcp status report
EP2266224B1 (en) 2008-03-17 2017-06-14 LG Electronics Inc. Method of transmitting rlc data
KR101674947B1 (en) * 2009-04-21 2016-11-10 엘지전자 주식회사 Efficient Security Related Procedure
US8566593B2 (en) * 2009-07-06 2013-10-22 Intel Corporation Method and apparatus of deriving security key(s)
WO2013061614A2 (en) * 2011-10-28 2013-05-02 Nec Corporation Secure method for mtc device triggering
CN102612028B (en) * 2012-03-28 2015-04-15 电信科学技术研究院 Method, system and device for configuration transmission and data transmission
RU2596935C2 (en) * 2014-07-01 2016-09-10 Федеральное государственное казенное учреждение "Войсковая часть 35533" Device for blocking unauthorised information tapping from cellular telephone
US9992670B2 (en) 2014-08-12 2018-06-05 Vodafone Ip Licensing Limited Machine-to-machine cellular communication security
GB2529194A (en) * 2014-08-12 2016-02-17 Vodafone Ip Licensing Ltd Machine-to-machine cellular communication security
KR102213885B1 (en) * 2014-11-28 2021-02-08 삼성전자주식회사 Apparatus and method for controlling security mode in wireless communication system
KR101756692B1 (en) 2015-03-13 2017-07-12 주식회사 에버스핀 Terminal Device for Dynamic Secure Module and Driving Method Thereof
WO2016148473A1 (en) * 2015-03-13 2016-09-22 주식회사 에버스핀 Method and apparatus for generating dynamic security module
US20160316373A1 (en) * 2015-04-27 2016-10-27 Qualcomm Incorporated Techniques for managing security mode command (smc) integrity failures at a user equipment (ue)
CN109691159B (en) * 2016-09-13 2024-01-12 诺基亚技术有限公司 PDCP COUNT handling in RRC connection recovery
US10171993B2 (en) * 2017-05-05 2019-01-01 Nokia Technologies Oy Identity request control for user equipment
KR20230062197A (en) * 2021-10-29 2023-05-09 삼성전자주식회사 Method and apparatus for security enhancement in AS layer in next-generation mobile communication systems

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040162065A1 (en) * 2003-02-11 2004-08-19 Lg Electronics Inc. Method for processing a security setup control message in mobile communication system
US7009940B2 (en) * 2000-02-22 2006-03-07 Nokia Corporation Integrity check in a communication system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI113119B (en) * 1997-09-15 2004-02-27 Nokia Corp A method for securing communications over telecommunications networks
RU2132597C1 (en) 1998-03-25 1999-06-27 Войсковая часть 43753 Method for encryption and transmission of encrypted voice data in gsm-900 and dcs-1800 cellular mobile communication networks
US6243811B1 (en) 1998-07-31 2001-06-05 Lucent Technologies Inc. Method for updating secret shared data in a wireless communication system
DE10025271A1 (en) * 2000-05-22 2001-11-29 Siemens Ag Method for establishing a connection between a terminal and a serving cellular network, cellular network and terminal therefor
US6733576B2 (en) * 2000-09-20 2004-05-11 Pgi International, Ltd. Gas sampling separator
FI111423B (en) * 2000-11-28 2003-07-15 Nokia Corp A system for securing post-handover communications
AU2001221632A1 (en) * 2000-11-28 2002-06-11 Nokia Corporation System and method for authentication of a roaming subscriber
KR100789565B1 (en) * 2001-04-07 2007-12-28 엘지전자 주식회사 Method for setting up radio bearer and Method for ciphering perform of each radio bearer and Method for ciphering data thereof
US7088988B2 (en) * 2002-11-12 2006-08-08 Motorola Inc. Over-the-air subsidy lock resolution

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7009940B2 (en) * 2000-02-22 2006-03-07 Nokia Corporation Integrity check in a communication system
US20040162065A1 (en) * 2003-02-11 2004-08-19 Lg Electronics Inc. Method for processing a security setup control message in mobile communication system

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7505758B2 (en) * 2004-02-04 2009-03-17 Lg Electronics Inc. Apparatus and method for setting use restriction of mobile communication terminal
US20050170813A1 (en) * 2004-02-04 2005-08-04 Choi Won S. Apparatus and method for setting use restriction of mobile communication terminal
US20060230274A1 (en) * 2005-04-12 2006-10-12 Srinivasan Surendran Method and system for hardware accelerator for implementing F9 integrity algorithm in WCDMA compliant handsets
US7869590B2 (en) * 2005-04-12 2011-01-11 Broadcom Corporation Method and system for hardware accelerator for implementing f9 integrity algorithm in WCDMA compliant handsets
US8811336B2 (en) 2006-08-22 2014-08-19 Lg Electronics Inc. Method of performing handover and controlling thereof in a mobile communication system
US8619685B2 (en) 2006-10-02 2013-12-31 Lg Electronics Inc. Method for transmitting and receiving paging message in wireless communication system
US9516695B2 (en) 2006-10-30 2016-12-06 Lg Electronics Inc. Method for transitioning between multiple reception levels
US8576741B2 (en) 2006-10-30 2013-11-05 Lg Electronics Inc. Method for transitioning between multiple reception levels
US9161306B2 (en) 2006-10-30 2015-10-13 Lg Electronics Inc. Method for transitioning between multiple reception levels
US8442017B2 (en) 2006-10-30 2013-05-14 Lg Electronics Inc. Method for transmitting random access channel message and response message, and mobile communication terminal
US8428013B2 (en) 2006-10-30 2013-04-23 Lg Electronics Inc. Method of performing random access in a wireless communcation system
US8630620B2 (en) * 2007-01-26 2014-01-14 Interdigital Technology Corporation Method and apparatus for securing location information and access control using the location information
US20080182592A1 (en) * 2007-01-26 2008-07-31 Interdigital Technology Corporation Method and apparatus for securing location information and access control using the location information
US20100191965A1 (en) * 2007-02-06 2010-07-29 Patrick Fischer Verification of system information in wireless communication system
US8275988B2 (en) * 2007-02-06 2012-09-25 Lg Electronics Inc. Verification of system information in wireless communication system
US20100144313A1 (en) * 2007-04-30 2010-06-10 Sung-Duck Chun Method for performing an authentication of entities during establishment of wireless call connection
US8218524B2 (en) 2007-04-30 2012-07-10 Lg Electronics Inc. Method for transmitting or receiving data unit using header field existence indicator
US8184570B2 (en) 2007-04-30 2012-05-22 Lg Electronics Inc. Method of transmitting data in wireless communication system supporting multimedia broadcast/multicast service
USRE45347E1 (en) 2007-04-30 2015-01-20 Lg Electronics Inc. Methods of transmitting data blocks in wireless communication system
US20100208650A1 (en) * 2007-04-30 2010-08-19 Sung-Duck Chun Method for transmitting or receiving data unit using header field existence indicator
US8543089B2 (en) * 2007-04-30 2013-09-24 Lg Electronics Inc. Method for performing an authentication of entities during establishment of wireless call connection
US8229517B2 (en) 2007-05-01 2012-07-24 Lg Electronics Inc. Data transmission/reception method
US9131003B2 (en) 2007-05-02 2015-09-08 Lg Electronics Inc. Method of transmitting data in a wireless communication system
US8798070B2 (en) 2007-05-02 2014-08-05 Lg Electronics Inc. Method of transmitting data in a wireless communication system
US20080273482A1 (en) * 2007-05-02 2008-11-06 Lg Electronics Inc. Uplink access method for receiving a point-to-multipoint service
US20080273503A1 (en) * 2007-05-02 2008-11-06 Lg Electronics Inc. Method and terminal for performing handover in mobile communications system of point-to-multipoint service
US8438446B2 (en) 2007-06-18 2013-05-07 Lg Electronics Inc. Method for transmitting/receiving broadcast or multicast service and terminal thereof
US8649366B2 (en) 2007-06-18 2014-02-11 Lg Electronics Inc. Method of performing uplink synchronization in wireless communication system
US8463300B2 (en) 2007-06-18 2013-06-11 Lg Electronics Inc. Paging information transmission method for effective call setup
US9049655B2 (en) 2007-06-18 2015-06-02 Lg Electronics Inc. Method of performing uplink synchronization in wireless communication system
US20100325504A1 (en) * 2007-06-18 2010-12-23 Lee Young-Dae Method for transmitting/receiving broadcast or multicast service and terminal thereof
US20100178941A1 (en) * 2007-06-18 2010-07-15 Sung-Duck Chun Paging information transmission method for effective call setup
US9538490B2 (en) 2007-06-18 2017-01-03 Lg Electronics Inc. Method of performing uplink synchronization in wireless communication system
US8493911B2 (en) 2007-09-20 2013-07-23 Lg Electronics Inc. Method of restricting scheduling request for effective data transmission
US20110190033A1 (en) * 2007-10-17 2011-08-04 Gemalto Sa method for masking mobile phone messages from the sight of other people
US9100940B2 (en) 2011-11-28 2015-08-04 Cisco Technology, Inc. System and method for extended wireless access gateway service provider Wi-Fi offload
US9973581B2 (en) 2011-11-28 2018-05-15 Cisco Technology, Inc. System and method for extended wireless access gateway service provider Wi-Fi offload
US20130235724A1 (en) * 2012-03-09 2013-09-12 Sevis Systems, Inc. System and Method for Optimizing and Eliminating Congestion for WAN Interfaces within the Access Domain
US8990916B2 (en) * 2012-07-20 2015-03-24 Cisco Technology, Inc. System and method for supporting web authentication

Also Published As

Publication number Publication date
EP1593278A1 (en) 2005-11-09
AU2003288764A1 (en) 2004-09-06
RU2005128294A (en) 2006-01-27
CN1748438A (en) 2006-03-15
US7471943B2 (en) 2008-12-30
JP2006514466A (en) 2006-04-27
CN100544478C (en) 2009-09-23
ZA200506363B (en) 2006-07-26
KR100956823B1 (en) 2010-05-11
UA85178C2 (en) 2009-01-12
WO2004073347A1 (en) 2004-08-26
AU2003288764B2 (en) 2008-10-30
JP4397818B2 (en) 2010-01-13
KR20040072858A (en) 2004-08-19
MXPA05008418A (en) 2006-02-03
RU2336665C2 (en) 2008-10-20
US20040162065A1 (en) 2004-08-19
EP1593278B1 (en) 2012-08-01

Similar Documents

Publication Publication Date Title
AU2003288764B2 (en) Method for processing security message in mobile communication system
US11695742B2 (en) Security implementation method, device, and system
JP2006514466A5 (en)
EP1169880B1 (en) Integrity check in a communication system
US8543089B2 (en) Method for performing an authentication of entities during establishment of wireless call connection
JP2022502908A (en) Systems and methods for securing NAS messages
KR20070073642A (en) Method and apparatus of modifying integrity protection configuration in a mobile user equipment of a wireless communications system
MXPA04007854A (en) Method for relocating srns.
US20230239686A1 (en) Secure communication method, apparatus, and system
US20070155339A1 (en) Method and apparatus for initialization of integrity protection
WO2022025566A1 (en) Methods and systems for deriving cu-up security keys for disaggregated gnb architecture
WO2022236543A1 (en) Systems and methods for authorization of proximity based services
CN116530119A (en) Method, device and system for protecting serial numbers in wireless network
NZ755869B2 (en) Security implementation method, device and system
CN117376900A (en) Communication method and device

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION