Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 24.008  Word version:  18.6.0

Top   Top   Up   Prev   Next
0…   2…   4…   4.2…   4.3…   4.4…   4.7…   4.7.5…   5…   5.3…   6…   9…   9.3…   9.3.18…   9.4…   9.4.9…   9.5…   9.5.10…   10…   10.5.4   10.5.5…   A…   E…   I…

 

4.3  MM common proceduresp. 88

4.3.1  TMSI reallocation procedurep. 88

4.3.2  Authentication procedurep. 90

4.3.2a  Authentication procedure used for a UMTS authentication challengep. 90

4.3.2b  Authentication Procedure used for a GSM authentication challengep. 91

4.3.2.1  Authentication request by the networkp. 91

4.3.2.2  Authentication response by the mobile stationp. 91

4.3.2.3  Authentication processing in the networkp. 92

4.3.2.3a  128-bit circuit-switched GSM ciphering key |R9|p. 92

4.3.2.4  Ciphering key sequence numberp. 92

4.3.2.5  Authentication not accepted by the networkp. 93

4.3.2.6  Abnormal casesp. 95

4.3.2.7  Handling of keys at intersystem change from Iu mode to A/Gb modep. 97

4.3.2.7a  Use of established security contextsp. 98

4.3.2.8  Handling of keys at intersystem change from A/Gb mode to Iu modep. 99

4.3.2.9Void

4.3.2.10  Derivation of keys at SRVCC or vSRVCC handover from S1 mode |R8|p. 100

4.3.2.11  Derivation of keys at SRVCC handover from Iu mode to Iu mode |R8|p. 100

4.3.2.12  Derivation of keys at SRVCC handover from Iu mode to A/Gb mode |R8|p. 102

4.3.2.13  Derivation of keys at CS to PS SRVCC handover from A/Gb mode to Iu mode |R11|p. 103

4.3.2.14  Derivation of keys at 5G-SRVCC from NG-RAN to UTRAN |R16|p. 105

4.3.3  Identification procedurep. 105

4.3.4  IMSI detach procedurep. 106

4.3.5  Abort procedurep. 108

4.3.6  MM information procedurep. 108


Up   Top   ToC