Language selection

Search

Patent 2795358 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2795358
(54) English Title: APPARATUS AND METHOD FOR SIGNALING ENHANCED SECURITY CONTEXT FOR SESSION ENCRYPTION AND INTEGRITY KEYS
(54) French Title: APPAREIL ET PROCEDE POUR LA SIGNALISATION D'UN CONTEXTE DE SECURITE AMELIORE POUR CLES DE CHIFFREMENT ET D'INTEGRITE DE SESSION
Status: Granted
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04W 12/04 (2009.01)
(72) Inventors :
  • ESCOTT, ADRIAN EDWARD (United States of America)
  • PALANIGOUNDER, ANAND (United States of America)
(73) Owners :
  • QUALCOMM INCORPORATED (United States of America)
(71) Applicants :
  • QUALCOMM INCORPORATED (United States of America)
(74) Agent: SMART & BIGGAR LP
(74) Associate agent:
(45) Issued: 2017-12-19
(86) PCT Filing Date: 2011-04-15
(87) Open to Public Inspection: 2011-10-20
Examination requested: 2012-10-02
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2011/032755
(87) International Publication Number: WO2011/130682
(85) National Entry: 2012-10-02

(30) Application Priority Data:
Application No. Country/Territory Date
61/324,646 United States of America 2010-04-15
13/084,378 United States of America 2011-04-11

Abstracts

English Abstract

Disclosed is a method for establishing an enhanced security context between a remote station and a serving network. In the method, the remote station forwards a first message to the serving network, wherein the first message includes an information element signaling that the remote station supports an enhanced security context. The remote station generates at least one session key, in accordance with the enhanced security context, using the information element. The remote station receives, in response to the first message, a second message having an indication that the serving network supports the enhanced security context. The remote station, in response to the second message, has wireless communications protected by the at least one session key.


French Abstract

L'invention porte sur un procédé pour l'établissement d'un contexte de sécurité amélioré entre une station distante et un réseau de service. Dans le procédé, la station distante envoie un premier message au réseau de service, le premier message comprenant une information signalant que la station distante supporte un contexte de sécurité amélioré. La station distante génère au moins une clé de session, conformément au contexte de sécurité amélioré, à l'aide de l'information. La station distante reçoit, en réponse au premier message, un second message ayant une indication selon laquelle le réseau de service supporte le contexte de sécurité amélioré. La station distante, en réponse au second message, a des communications sans fil protégées par la ou les clés de session.

Claims

Note: Claims are shown in the official language in which they were submitted.


13
CLAIMS:
1. A method for establishing a first security context between a remote
station and
a serving network, the first security context having a security property that
is not supported by
a second security context, the method comprising:
forwarding, by the remote station, a first message to the serving network,
wherein the remote station supports secure wireless communications using
either the first
security context or the second security context, the first message includes an
information
element signaling that the remote station supports the first security context,
and the second
security context provides secure wireless communications without supporting
use of the
information element;
generating, by the remote station, a session integrity key and a session
cipher
key, in accordance with the first security context, using the information
element;
receiving, by the remote station in response to the first message, a second
message having a message authentication code that indicates the serving
network supports the
first security context for secure wireless communications with the remote
station, which first
security context includes use of the information element not supported by the
second security
context;
checking, by the remote station, the message authentication code using the
session integrity key; and
in response to successfully checking the message authentication code, having,
by the remote station, wireless communications protected by the session cipher
key.
2. The method of claim 1, wherein the information element comprises a count

value updated for a session.
3. The method of claim 1, wherein the serving network is a Universal Mobile

Telecommunications System (UMTS) serving network.

14
4. The method of claim 3, wherein the first security context is an enhanced

UMTS security context, and the second security context is a legacy Universal
Terrestrial
Radio Access Network (UTRAN) security context.
5. The method of claim 1, wherein the serving network is a GSM EDGE Radio
Access Network (GERAN) serving network.
6. The method of claim 1, wherein an indication that the serving network
supports
the first security context comprises the authentication code generated based
on a
corresponding session integrity key generated by the serving network using the
information
element received from the remote station.
7. The method of claim 1, wherein the remote station comprises a mobile
user
equipment.
8. A remote station, comprising:
means for forwarding a first message to a serving network, wherein the remote
station supports secure wireless communications using either a first security
context or a
second security context, the first message includes an information element
signaling that the
remote station supports the first security context, and the second security
context provides
secure wireless communications without supporting use of the information
element;
means for generating a session integrity key and a session cipher key, in
accordance with the first security context, using the information element;
means for receiving, in response to the first message, a second message having

a message authentication code that indicates the serving network supports the
first security
context for secure wireless communications with the remote station, which
first security
context includes use of the information element not supported by the second
security context;
means for checking the message authentication code using the session integrity
key; and


15

means for having wireless communications, in response to successfully
checking the message authentication code, protected by the session cipher key.
9. The remote station of claim 8, wherein the information element comprises
a
count value updated for a session.
10. The remote station of claim 8, wherein the serving network is a
Universal
Mobile Telecommunications System (UMTS) serving network.
11. The remote station of claim 10, wherein the first security context is
an
enhanced UMTS security context, and the second security context is a legacy
Universal
Terrestrial Radio Access Network (UTRAN) security context.
12. The remote station of claim 8, wherein the serving network is a GSM
EDGE
Radio Access Network (GERAN) serving network.
13. The remote station of claim 8, wherein an indication that the serving
network
supports the first security context comprises the authentication code
generated based on a
corresponding session integrity key generated by the serving network using the
information
element received from the remote station.
14. The remote station of claim 8, wherein the remote station comprises a
mobile
user equipment.
15. A remote station, comprising:
a processor configured to:
forward a first message to a serving network, wherein the remote station
supports secure wireless communications using either a first security context
or a second
security context, the first message includes an information element signaling
that the remote
station supports a first security context, and the second security context
provides secure
wireless communications without supporting use of the information element;


16

generate a session integrity key and a session cipher key, in accordance with
the first security context, using the information element;
receive, in response to the first message, a second message having a message
authentication code that indicates the serving network supports the first
security context for
secure wireless communications with the remote station, which first security
context includes
use of the information element not supported by the second security context;
check the message authentication code using the session integrity key; and
have wireless communications, in response to a successful check of the
message authentication code, protected by the session cipher key.
16. The remote station of claim 15, wherein the information element
comprises a
count value updated for a session.
17. The remote station of claim 15, wherein the serving network is a
Universal
Mobile Telecommunications System (UMTS) serving network.
18. The remote station of claim 17, wherein the first security context is
an
enhanced UMTS security context, and the second security context is a legacy
Universal
Terrestrial Radio Access Network (UTRAN) security context.
19. The remote station of claim 15, wherein the serving network is a GSM
EDGE
Radio Access Network (GERAN) serving network.
20. The remote station of claim 15, wherein an indication that the serving
network
supports the first security context comprises the authentication code
generated based on a
corresponding session integrity key generated by the serving network using the
information
element received from the remote station.
21. The remote station of claim 15, wherein the remote station comprises a
mobile
user equipment.


17

22. A computer program product, comprising:
non-transitory computer-readable medium, comprising:
code for causing a computer to forward a first message to a serving network,
wherein the computer supports secure wireless communications using either a
first security
context or a second security context, the first message includes an
information element
signaling that the computer supports a first security context, and the second
security context
provides secure wireless communications without supporting use of the
information element;
code for causing a computer to generate a session integrity key and a session
cipher key, in accordance with the first security context, using the
information element;
code for causing a computer to receive, in response to the first message, a
second message having a message authentication code that indicates the serving
network
supports the first security context for secure wireless communications with
the computer,
which first security context includes use of the information element not
supported by the
second security context;
code for causing a computer to check the message authentication code using
the session integrity key; and
code for causing a computer to have wireless communications, in response to a
successful check of the message authentication code, protected by the session
cipher key.
23. The computer program product of claim 22, wherein the information
element
comprises a count value updated for a session.
24. The computer program product of claim 22, wherein the serving network
is a
Universal Mobile Telecommunications System (UMTS) serving network.
25. The computer program product of claim 24, wherein the first security
context
is an enhanced UMTS security context, and the second security context is a
legacy Universal
Terrestrial Radio Access Network (UTRAN) security context.


18

26. The computer program product of claim 22, wherein the serving network
is a
GSM EDGE Radio Access Network (GERAN) serving network.
27. The computer program product of claim 22, wherein an indication that
the
serving network supports the first security context comprises the
authentication code
generated based on a corresponding session integrity key generated by the
serving network
using the information element received from the computer.
28. The computer program product of claim 22, wherein the session integrity
key
and the session cipher key are calculated from the information element and a
root key.
29. The method of claim 1, wherein the session integrity key and the
session cipher
key are calculated from the information element and a root key.
30. The remote station of claim 8, wherein the session integrity key and
the session
cipher key are calculated from the information element and a root key.
31. The remote station of claim 15, wherein the session integrity key and
the
session cipher key are calculated from the information element and a root key.

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02795358 2015-03-10
74769-3481
1
APPARATUS AND METHOD FOR SIGNALING ENHANCED SECURITY
CONTEXT FOR SESSION ENCRYPTION AND INTEGRITY KEYS
BACKGROUND
[0001]
Field
[0002] The present invention relates generally to an enhanced security context
signaling for
user equipment operating in a Universal Mobile Telecommunications Service
(UMTS)
and/or GSM Edge Radio Access Network (GERAN).
Background
[0003] A successful AKA (Authentication and Key Agreement) authentication in a
UMTS
third generation (3G) radio access network or in a GERAN networks using 3G AKA

authentication results in a pair of shared keys, a cipher key (CK) and an
integrity key
(IK), for securing communications between a user equipment (UE) and the
network.
The shared keys may be used directly to secure the traffic between the UE and
the
network as in the case of UTRAN (UMTS Terrestrial Radio Access Network), or
may
be used to statically derive keys, e.g. Kc or Kc128, in the case of GERAN (GSM
Edge
Radio Access Network).
[0004] A compromised key may result in serious security problems until the
keys are changed
at a next AKA authentication. Typically, the AKA authentication is not run
often due to
the significant overhead required. Also, if both keys (CK and IK) are
compromised,
then the GERAN keys are compromised.
[0005] In UMTS/HSPA (High Speed Packet Access) deployments, some or all of
functionalities of a radio network controller (RNC) and a Node B may be
collapsed
together into one node at the edge of the network. The RNC needs the keys for
functionalities such as user plane ciphering and signaling plane ciphering and
integrity
protection. However, the RNC functionality may be deployed in an exposed
location

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
2
such as in a Home Node B in a UMTS Femtocell. Accordingly, RNC functionality
deployed in possibly insecure locations providing access (including physical
access)
may allow the keys, CK and IK, to be compromised.
[0006] Session keys (modified version of CK and IK) may be used to lower the
security risks
associated with exposed RNC functionality. Techniques for providing such
session
keys are disclosed in U.S. Patent Application Publication No. US 2007/0230707
A1.
[0007] Unfortunately, the use of such session keys require upgrade
modifications to the serving
networks. However, networks operators are likely to upgrade serving networks
in a
staged manner.
[0008] There is therefore a need for a technique for signaling enhanced
security context support
which is compatible with legacy serving networks.
SUMMARY
[0009] An aspect of the present invention may reside in a method for
establishing a first
security context between a remote station and a serving network. The first
security
context has a security property that is not supported by a second security
context. In the
method, the remote station forwards a first message to the serving network,
wherein the
first message includes an information element signaling that the remote
station supports
the first security context. The remote station generates at least one session
key, in
accordance with the first security context, using the information element. The
remote
station receives, in response to the first message, a second message having an
indication
that the serving network supports the first security context. The remote
station, in
response to the second message, has wireless communications protected by the
at least
one session key.
[0010] In more detailed aspects of the invention, the information element may
comprise a count
value updated for a session. Further, the indication that the serving network
supports
the first security context may comprise an authentication code generated based
on a
corresponding at least one session key generated by the serving network using
the
information element received from the remote station. Also, the remote station
may
comprise a mobile user equipment.
[0011] In other more detailed aspects of the invention, the serving network
may be a UMTS
serving network. The first security context may be an enhanced UMTS security

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
3
context, and the second security context may be a legacy UTRAN security
context.
Alternatively, the serving network may be a GERAN serving network.
[0012] Another aspect of the invention may reside in a remote station which
may include
means for forwarding a first message to a serving network, wherein the first
message
includes an information element signaling that the remote station supports a
first
security context, and wherein the first security context has a security
property that is not
supported by a second security context; means for generating at least one
session key, in
accordance with the first security context, using the information element;
means for
receiving, in response to the first message, a second message having an
indication that
the serving network supports the first security context; and means for having
wireless
communications, in response to the second message, protected by the at least
one
session key.
[0013] Another aspect of the invention may reside in a remote station which
may include a
processor configured to: forward a first message to a serving network, wherein
the first
message includes an information element signaling that the remote station
supports a
first security context, and wherein the first security context has a security
property that
is not supported by a second security context; generate at least one session
key, in
accordance with the first security context, using the information element;
receive, in
response to the first message, a second message having an indication that the
serving
network supports the first security context; and have wireless communications,
in
response to the second message, protected by the at least one session key.
[0014] Another aspect of the invention may reside in a computer program
product, comprising
computer-readable storage medium, comprising code for causing a computer to
forward
a first message to a serving network, wherein the first message includes an
information
element signaling that the computer supports a first security context, and
wherein the
first security context has a security property that is not supported by a
second security
context; code for causing a computer to generate at least one session key, in
accordance
with the first security context, using the information element; code for
causing a
computer to receive, in response to the first message, a second message having
an
indication that the serving network supports the first security context; and
code for
causing a computer to have wireless communications, in response to the second
message, protected by the at least one session key.

CA 02795358 2015-12-18
74769-3481
3a
[0014a1 According to one aspect of the present invention, there is
provided a method
for establishing a first security context between a remote station and a
serving network, the
first security context having a security property that is not supported by a
second security
context, the method comprising: forwarding, by the remote station, a first
message to the
serving network, wherein the remote station supports secure wireless
communications using
either the first security context or the second security context, the first
message includes an
information element signaling that the remote station supports the first
security context, and
the second security context provides secure wireless communications without
supporting use
of the information element; generating, by the remote station, a session
integrity key and a
session cipher key, in accordance with the first security context, using the
information
element; receiving, by the remote station in response to the first message, a
second message
having a message authentication code that indicates the serving network
supports the first
security context for secure wireless communications with the remote station,
which first
security context includes use of the information element not supported by the
second security
context; checking, by the remote station, the message authentication code
using the session
integrity key; and in response to successfully checking the message
authentication code,
having, by the remote station, wireless communications protected by the
session cipher key.
[0014b] According to another aspect of the present invention, there is
provided a
remote station, comprising: means for forwarding a first message to a serving
network,
wherein the remote station supports secure wireless communications using
either a first
security context or a second security context, the first message includes an
information
element signaling that the remote station supports the first security context,
and the second
security context provides secure wireless communications without supporting
use of the
information element; means for generating a session integrity key and a
session cipher key, in
accordance with the first security context, using the information element;
means for receiving,
in response to the first message, a second message having a message
authentication code that
indicates the serving network supports the first security context for secure
wireless
communications with the remote station, which first security context includes
use of the
information element not supported by the second security context; means for
checking the
message authentication code using the session integrity key; and means for
having wireless

CA 02795358 2016-10-28
74769-3481
3b
communications, in response to successfully checking the message
authentication code,
protected by the session cipher key.
[0014c] According to still another aspect of the present invention,
there is provided a
remote station, comprising: a processor configured to: forward a first message
to a serving
network, wherein the remote station supports secure wireless communications
using either a
first security context or a second security context, the first message
includes an information
element signaling that the remote station supports a first security context,
and the second
security context provides secure wireless communications without supporting
use of the
information element; generate a session integrity key and a session cipher
key, in accordance
with the first security context, using the information element; receive, in
response to the first
message, a second message having a message authentication code that indicates
the serving
network supports the first security context for secure wireless communications
with the
remote station, which first security context includes use of the information
element not
supported by the second security context; check the message authentication
code using the
session integrity key; and have wireless communications, in response to a
successful check of
the message authentication code, protected by the session cipher key.
[0014d] According to yet another aspect of the present invention,
there is provided a
computer program product, comprising: non-transitory computer-readable medium,
comprising: code for causing a computer to forward a first message to a
serving network,
wherein the computer supports secure wireless communications using either a
first security
context or a second security context, the first message includes an
information element
signaling that the computer supports a first security context, and the second
security context
provides secure wireless communications without supporting use of the
information element;
code for causing a computer to generate a session integrity key and a session
cipher key, in
accordance with the first security context, using the information element;
code for causing a
computer to receive, in response to the first message, a second message having
a message
authentication code that indicates the serving network supports the first
security context for
secure wireless communications with the computer, which first security context
includes use
of the information element not supported by the second security context; code
for causing

CA 02795358 2015-12-18
74769-3481
3c
a computer to check the message authentication code using the session
integrity key; and code
for causing a computer to have wireless communications, in response to a
successful check of
the message authentication code, protected by the session cipher key.

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
4
BRIEF DESCRIPTION OF THE DRAWINGS
[0015] FIG. 1 is a block diagram of an example of a wireless communication
system.
[0016] FIG. 2 is a block diagram of an example of a wireless communication
system in
accordance with a UMTS/UTRAN architecture.
[0017] FIG. 3 is a block diagram of an example of a wireless communication
system in
accordance with a GERAN architecture.
[0018] FIG. 4 is a flow diagram of a method for establishing an enhanced
security context
between a remote station and a serving network.
[0019] FIG. 5 is a flow diagram of a method for establishing an enhanced
security context
between a remote station and a serving network based on an attach request
message.
[0020] FIG. 6 is a flow diagram of a method for establishing at least one
session key from an
enhanced security context between a remote station and a serving network based
on a
service request message.
[0021] FIG. 7 is a flow diagram of a method for establishing at least one
session key from an
enhanced security context between a remote station and a serving network based
on a
routing area update request message.
[0022] FIG. 8 is a block diagram of a computer including a processor and a
memory.
DETAILED DESCRIPTION
[0023] The word "exemplary" is used herein to mean "serving as an example,
instance, or
illustration." Any embodiment described herein as "exemplary" is not
necessarily to be
construed as preferred or advantageous over other embodiments.
[0024] With reference to FIGS. 2 though 4, an aspect of the present invention
may reside in a
method 400 for establishing an enhanced security context between a remote
station 210
and a serving network 230. In the method, the remote station forwards a first
message
to the serving network (step 410), wherein the first message includes an
information
element signaling that the remote station supports an enhanced security
context. The
remote station generates at least one session key, CKs and IKs, in accordance
with the
enhanced security context, using the information element (step 420). The
remote station
receives, in response to the first message, a second message having an
indication that
the serving network supports the enhanced security context (step 430). The
remote

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
station, in response to the second message, has wireless communications
protected by
the at least one session key (step 440).
[0025] The information element may comprise a count. Further, the indication
that the serving
network supports the enhanced security context may comprise an authentication
code
(MAC) generated based on a corresponding at least one session key generated by
the
serving network 230 using the information element received from the remote
station
210. Also, the remote station may comprise a mobile user equipment (UE) such
as a
wireless device.
[0026] With further reference to FIG. 8, another aspect of the invention may
reside in a remote
station 210 which may include means (processor 810) for forwarding a first
message to
a serving network 230, wherein the first message includes an information
element
signaling that the remote station supports an enhanced security context; means
for
generating at least one session key, in accordance with the enhanced security
context,
using the information element; means for receiving, in response to the first
message, a
second message having an indication that the serving network supports the
enhanced
security context; and means for having wireless communications, in response to
the
second message, protected by at least one session key.
[0027] Another aspect of the invention may reside in a remote station 210
which may include a
processor 810 configured to: forward a first message to a serving network 230,
wherein
the first message includes an information element signaling that the remote
station
supports an enhanced security context; generate at least one session key, in
accordance
with the enhanced security context, using the information element; receive, in
response
to the first message, a second message having an indication that the serving
network
supports the enhanced security context; and have wireless communications, in
response
to the second message, protected by the at least one session key.
[0028] Another aspect of the invention may reside in a computer program
product, comprising
computer-readable storage medium 820, comprising code for causing a computer
800 to
forward a first message to a serving network 230, wherein the first message
includes an
information element signaling that the computer supports an enhanced security
context;
code for causing a computer to generate at least one session key, in
accordance with the
enhanced security context, using the information element; code for causing a
computer
to receive, in response to the first message, a second message having an
indication that
the serving network supports the enhanced security context; and code for
causing a

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
6
computer to have wireless communications, in response to the second message,
protected by the at least one session key.
[0029] The serving core network 230 is connected to a serving RAN (Radio
Access Network)
220 which provides wireless communications to the remote station 210. In a
UMTS/UTRAN architecture, the serving RAN includes a Node B and a RNC (Radio
Network Controller). In a GERAN architecture, the serving RAN includes a BTS
(Base
Transceiver Station) and a BSC (Base Station Controller). The serving core
network
includes an MSCNLR (Mobile Switching Center/Visitor Location Register) for
providing circuit-switched (CS) service, and an SGSN (Serving GPRS Support
Node)
for providing packet-switched (PS) services. The home network includes an HLR
(Home Location Register) and an AuC (Authentication Center).
[0030] The UE 210 and the serving core network 230 may be enhanced with new
security
properties to create an enhanced UMTS security context (ESC) using a COUNT
(counter value). A 256-bit root key (KAsmEu) for the ESC may be derived from
the CK
and IK when AKA authentication is performed. The root key may be set equal to
CK IK, or it may be derived using a more complex derivation resulting in
additional
useful security properties (e.g., CK and IK do not need to be kept). The COUNT
may
be a 16-bit counter value that is maintained between the UE and the serving
core
network. (Note: a legacy UTRAN security context consists of KSI (a 3-bit Key
Set
Identifier), CK (a 128-bit encryption key), and IK (a 128-bit integrity key)).
[0031] With reference to FIG. 5, in a method 500 related to UMTS attach
procedures, the UE
210 may signal that it supports ESC in a UMTS attach request message (step
510). The
ESC is an example of the first security context. The support signal may be the
presence
of a new information element (IE) in the message. The IE may comprise the
COUNT
value. A serving network SN 230 that does not support ESC will ignore the new
IE.
Not supporting the ESC is an example of the second security context.
Authentication
data (RAND, XRES, CK, IK, AUTN) is obtained from the HLR/AuC 240 (step 515).
The SN may indicate ESC support in the AKA challenge (Authentication Request)
to
the UE (step 520). The UE performs the authentication procedures (step 525)
and
returns a response RES to the SN (step 530). Upon successful authentication
(step 530),
the UE and SN derive the root key KAsmEu and the session keys CKs and IKs
(step
535). The SN forwards the session keys to the RAN 220 in an SMC (Security Mode

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
7
Command) message (step 540). The RAN generates a message authentication code
(MAC) using the session key IKs, which is forwarded to the UE in an SMC
message
(step 545). The UE checks the MAC (step 550) using the session key IKs that
the UE
derived (step 535), and returns a complete indication to the RAN (step 555),
which
forwards it to the SN (step 560). The UE is then able to protect
communications using
the session keys (step 565).
[0032] With reference to FIG. 6, in a method 600 related to an Idle to Active
Mode procedure
600, the UE 210 forwards a service request message which includes the COUNT
value
to the SN 230 (step 610). The UE and SN derive new the session keys CKs and
IKs
from the root key KAsmEu (step 620). The SN forwards the session keys to the
RAN
220 in an SMC message (step 630). The RAN generates a MAC, which is forwarded
to
the UE in an SMC message (step 640). The UE checks the MAC (step 650), and
returns
a complete indication to the RAN (step 660), which forwards it to the SN (step
670).
The UE is then able to protect communications using the session keys (step
680).
[0033] With reference to FIG. 7, in a method 700 related to mobility
management procedures
700 (such as a Routing Area Update (RAU) or Location Area Update (LAU), the UE

210 forwards a RAU (or LAU) request message which includes the COUNT value to
the SN 230 (step 710). Optionally, the UE and SN may derive new the session
keys
CKs and IKs from the root key KAsmEu (step 720) The SN may forward the session

keys to the RAN 220 in an SMC message (step 730). The RAN may generate a MAC,
which may be forwarded to the UE in an SMC message (step 740). The UE may
check
the MAC (step 750), and may return a complete indication to the RAN (step
760),
which forwards it to the SN (step 770). The SN then sends a RAU accept message
to
the UE (step 780). The UE is then able to protect communications using the
session
keys.
[0034] New access stratum (AS) keys may be generated for each transition from
Idle to Active
State. Similarly, keys may be generated at other events. The COUNT value may
be
sent in idle mobility messages and in initial layer 3 messages, e.g.,
Attaches, RAUs,
LAUs, for idle, mobility, or service request. The SN may check that the sent
COUNT
value has not been used before, and updates the stored COUNT value in the
process. If
the COUNT value is new (e.g., received COUNT value > stored COUNT value), the
UE
and the SN proceed to calculate the new key CKs and IKs, using a Key
Derivation

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
8
Function (KDF) such as HMAC-SHA256, from the root key KAsmEu and the sent
COUNT value. The KDF may include additional information, such as RAN node
identity, for the new key calculation. If the check fails (the COUNT value is
not new),
the SN rejects the message. For GERAN usage, when Kc and Kci28 are calculated
from CKs and IKs , it may be done in the same manner as when calculated from
CK
and IK.
100351 The session keys (CKs and IKs) may have a lifetime such that the UE and
the serving
network keep and use the session keys until either it is no longer necessary
to store the
keys to send traffic securely between the UE and the network (UE moves to Idle
mode),
or a new context is created at a subsequent event (e.g., AKA authentication or
a
mobility event).
[0036] The remote station 210 may comprise a computer 800 that includes a
storage medium
820 such as memory, a display 830, and an input device 840 such as a keyboard.
The
apparatus may include a wireless connection 850.
[0037] With reference to FIG. 1, a wireless remote station (RS) 102 (or UE)
may communicate
with one or more base stations (BS) 104 of a wireless communication system
100. The
wireless communication system 100 may further include one or more base station

controllers (BSC) 106, and a core network 108. Core network may be connected
to an
Internet 110 and a Public Switched Telephone Network (PSTN) 112 via suitable
backhauls. A typical wireless mobile station may include a handheld phone, or
a laptop
computer. The wireless communication system 100 may employ any one of a number

of multiple access techniques such as code division multiple access (CDMA),
time
division multiple access (TDMA), frequency division multiple access (FDMA),
space
division multiple access (SDMA), polarization division multiple access (PDMA),
or
other modulation techniques known in the art.
[0038] A wireless device 102 may include various components that perform
functions based on
signals that are transmitted by or received at the wireless device. For
example, a
wireless headset may include a transducer adapted to provide an audio output
based on a
signal received via the receiver. A wireless watch may include a user
interface adapted
to provide an indication based on a signal received via the receiver. A
wireless sensing
device may include a sensor adapted to provide data to be transmitted to
another device.

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
9
[0039] A wireless device may communicate via one or more wireless
communication links that
are based on or otherwise support any suitable wireless communication
technology. For
example, in some aspects a wireless device may associate with a network. In
some
aspects the network may comprise a body area network or a personal area
network (e.g.,
an ultra-wideband network). In some aspects the network may comprise a local
area
network or a wide area network. A wireless device may support or otherwise use
one or
more of a variety of wireless communication technologies, protocols, or
standards such
as, for example, CDMA, TDMA, OFDM, OFDMA, WiMAX, and Wi-Fi. Similarly, a
wireless device may support or otherwise use one or more of a variety of
corresponding
modulation or multiplexing schemes. A wireless device may thus include
appropriate
components (e.g., air interfaces) to establish and communicate via one or more
wireless
communication links using the above or other wireless communication
technologies.
For example, a device may comprise a wireless transceiver with associated
transmitter
and receiver components (e.g., a transmitter and a receiver) that may include
various
components (e.g., signal generators and signal processors) that facilitate
communication
over a wireless medium.
[0040] The teachings herein may be incorporated into (e.g., implemented within
or performed
by) a variety of apparatuses (e.g., devices). For example, one or more aspects
taught
herein may be incorporated into a phone (e.g., a cellular phone), a personal
data
assistant ("PDA"), an entertainment device (e.g., a music or video device), a
headset
(e.g., headphones, an earpiece, etc.), a microphone, a medical device (e.g., a
biometric
sensor, a heart rate monitor, a pedometer, an EKG device, etc.), a user I/0
device (e.g., a
watch, a remote control, a light switch, a keyboard, a mouse, etc.), a tire
pressure
monitor, a computer, a point-of-sale device, an entertainment device, a
hearing aid, a
set-top box, or any other suitable device.
[0041] These devices may have different power and data requirements. In some
aspects, the
teachings herein may be adapted for use in low power applications (e.g.,
through the use
of an impulse-based signaling scheme and low duty cycle modes) and may support
a
variety of data rates including relatively high data rates (e.g., through the
use of high-
bandwidth pulses).
[0042] In some aspects a wireless device may comprise an access device (e.g.,
a Wi-Fi access
point) for a communication system. Such an access device may provide, for
example,
connectivity to another network (e.g., a wide area network such as the
Internet or a

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
cellular network) via a wired or wireless communication link. Accordingly, the
access
device may enable another device (e.g., a Wi-Fi station) to access the other
network or
some other functionality. In addition, it should be appreciated that one or
both of the
devices may be portable or, in some cases, relatively non-portable.
[0043] Those of skill in the art would understand that information and signals
may be
represented using any of a variety of different technologies and techniques.
For
example, data, instructions, commands, information, signals, bits, symbols,
and chips
that may be referenced throughout the above description may be represented by
voltages, currents, electromagnetic waves, magnetic fields or particles,
optical fields or
particles, or any combination thereof.
[0044] Those of skill would further appreciate that the various illustrative
logical blocks,
modules, circuits, and algorithm steps described in connection with the
embodiments
disclosed herein may be implemented as electronic hardware, computer software,
or
combinations of both. To clearly illustrate this interchangeability of
hardware and
software, various illustrative components, blocks, modules, circuits, and
steps have been
described above generally in terms of their functionality. Whether such
functionality is
implemented as hardware or software depends upon the particular application
and
design constraints imposed on the overall system. Skilled artisans may
implement the
described functionality in varying ways for each particular application, but
such
implementation decisions should not be interpreted as causing a departure from
the
scope of the present invention.
[0045] The various illustrative logical blocks, modules, and circuits
described in connection
with the embodiments disclosed herein may be implemented or performed with a
general purpose processor, a digital signal processor (DSP), an application
specific
integrated circuit (ASIC), a field programmable gate array (FPGA) or other
programmable logic device, discrete gate or transistor logic, discrete
hardware
components, or any combination thereof designed to perform the functions
described
herein. A general purpose processor may be a microprocessor, but in the
alternative, the
processor may be any conventional processor, controller, microcontroller, or
state
machine. A processor may also be implemented as a combination of computing
devices, e.g., a combination of a DSP and a microprocessor, a plurality of
microprocessors, one or more microprocessors in conjunction with a DSP core,
or any
other such configuration.

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
11
[0046] The steps of a method or algorithm described in connection with the
embodiments
disclosed herein may be embodied directly in hardware, in a software module
executed
by a processor, or in a combination of the two. A software module may reside
in
RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory,
registers, hard disk, a removable disk, a CD-ROM, or any other form of storage
medium
known in the art. An exemplary storage medium is coupled to the processor such
the
processor can read information from, and write information to, the storage
medium. In
the alternative, the storage medium may be integral to the processor. The
processor and
the storage medium may reside in an ASIC. The ASIC may reside in a user
terminal.
In the alternative, the processor and the storage medium may reside as
discrete
components in a user terminal.
[0047] In one or more exemplary embodiments, the functions described may be
implemented in
hardware, software, firmware, or any combination thereof If implemented in
software
as a computer program product, the functions may be stored on or transmitted
over as
one or more instructions or code on a computer-readable medium. Computer-
readable
media includes both computer storage media and communication media including
any
medium that facilitates transfer of a computer program from one place to
another. A
storage media may be any available media that can be accessed by a computer.
By way
of example, and not limitation, such computer-readable media can comprise RAM,

ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or
other
magnetic storage devices, or any other medium that can be used to carry or
store desired
program code in the form of instructions or data structures and that can be
accessed by a
computer. Also, any connection is properly termed a computer-readable medium.
For
example, if the software is transmitted from a website, server, or other
remote source
using a coaxial cable, fiber optic cable, twisted pair, digital subscriber
line (DSL), or
wireless technologies such as infrared, radio, and microwave, then the coaxial
cable,
fiber optic cable, twisted pair, DSL, or wireless technologies such as
infrared, radio, and
microwave are included in the definition of medium. Disk and disc, as used
herein,
includes compact disc (CD), laser disc, optical disc, digital versatile disc
(DVD), floppy
disk and blu-ray disc where disks usually reproduce data magnetically, while
discs
reproduce data optically with lasers. Combinations of the above should also be
included
within the scope of computer-readable media.

CA 02795358 2012-10-02
WO 2011/130682 PCT/US2011/032755
12
[0048] The previous description of the disclosed embodiments is provided to
enable any person
skilled in the art to make or use the present invention. Various modifications
to these
embodiments will be readily apparent to those skilled in the art, and the
generic
principles defined herein may be applied to other embodiments without
departing from
the spirit or scope of the invention. Thus, the present invention is not
intended to be
limited to the embodiments shown herein but is to be accorded the widest scope

consistent with the principles and novel features disclosed herein.

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date 2017-12-19
(86) PCT Filing Date 2011-04-15
(87) PCT Publication Date 2011-10-20
(85) National Entry 2012-10-02
Examination Requested 2012-10-02
(45) Issued 2017-12-19

Abandonment History

There is no abandonment history.

Maintenance Fee

Last Payment of $263.14 was received on 2023-12-22


 Upcoming maintenance fee amounts

Description Date Amount
Next Payment if small entity fee 2025-04-15 $125.00
Next Payment if standard fee 2025-04-15 $347.00

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Request for Examination $800.00 2012-10-02
Application Fee $400.00 2012-10-02
Maintenance Fee - Application - New Act 2 2013-04-15 $100.00 2013-03-26
Maintenance Fee - Application - New Act 3 2014-04-15 $100.00 2014-03-20
Maintenance Fee - Application - New Act 4 2015-04-15 $100.00 2015-03-16
Maintenance Fee - Application - New Act 5 2016-04-15 $200.00 2016-03-17
Maintenance Fee - Application - New Act 6 2017-04-18 $200.00 2017-03-17
Final Fee $300.00 2017-11-02
Maintenance Fee - Application - New Act 7 2018-04-16 $200.00 2017-11-02
Maintenance Fee - Patent - New Act 8 2019-04-15 $200.00 2019-03-18
Maintenance Fee - Patent - New Act 9 2020-04-15 $200.00 2020-04-01
Maintenance Fee - Patent - New Act 10 2021-04-15 $255.00 2021-03-22
Maintenance Fee - Patent - New Act 11 2022-04-19 $254.49 2022-03-21
Maintenance Fee - Patent - New Act 12 2023-04-17 $263.14 2023-03-21
Maintenance Fee - Patent - New Act 13 2024-04-15 $263.14 2023-12-22
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
QUALCOMM INCORPORATED
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Abstract 2012-10-02 2 82
Claims 2012-10-02 5 166
Drawings 2012-10-02 6 80
Description 2012-10-02 12 646
Representative Drawing 2012-11-28 1 10
Cover Page 2012-11-30 2 50
Description 2015-03-10 15 817
Claims 2015-03-10 10 352
Description 2015-12-18 15 769
Claims 2015-12-18 6 228
Claims 2016-10-28 6 229
Description 2016-10-28 15 769
Maintenance Fee Payment 2017-11-02 2 79
Final Fee 2017-11-02 2 64
Representative Drawing 2017-11-24 1 9
Cover Page 2017-11-24 1 46
Amendment 2016-10-28 5 209
PCT 2012-10-02 10 308
Assignment 2012-10-02 2 80
Correspondence 2014-04-08 2 58
Prosecution-Amendment 2014-09-11 3 90
Prosecution-Amendment 2015-03-10 21 941
Examiner Requisition 2015-09-03 4 240
Amendment 2015-12-18 13 571
Examiner Requisition 2016-08-09 3 176