tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search



Here          Top          Up          Prev          Next
part:    1     2     3     4     5     6     7     8     9     10
   11     12     13     14     15     16     17



4.2   Behaviour of the MS in MM Idle state, GMM-DEREGISTERED state and GMM-REGISTERED state   Word-p. 76
4.2.1   Primary Service State selection
4.2.2   Detailed Description of the MS behaviour in MM IDLE State.      Up
4.2.3   Service state when back to state MM IDLE from another state      Up
4.2.4   Behaviour in state GMM-DEREGISTERED   Word-p. 82
4.2.5   Behaviour in state GMM-REGISTERED   Word-p. 85
4.3   MM common procedures
4.3.1   TMSI reallocation procedure
4.3.2   Authentication procedure   Word-p. 89
4.3.2a   Authentication procedure used for a UMTS authentication challenge
4.3.2b   Authentication Procedure used for a GSM authentication challenge   Authentication request by the network   Word-p. 90   Authentication response by the mobile station   Authentication processing in the network   Word-p. 91   128-bit circuit-switched GSM ciphering key [R9]   Ciphering key sequence number      Up   Authentication not accepted by the network   Word-p. 92   Abnormal cases   Handling of keys at intersystem change from Iu mode to A/Gb mode   Use of established security contexts   Word-p. 97   Handling of keys at intersystem change from A/Gb mode to Iu mode   Word-p. 98   Void   Derivation of keys at SRVCC or vSRVCC handover from S1 mode [R8]   Word-p. 99   Derivation of keys at SRVCC handover from Iu mode to Iu mode [R8]   Derivation of keys at SRVCC handover from Iu mode to A/Gb mode [R8]   Word-p. 101   Derivation of keys at CS to PS SRVCC handover from A/Gb mode to Iu mode [R11]
4.3.3   Identification procedure   Word-p. 104
4.3.4   IMSI detach procedure   Word-p. 105
4.3.5   Abort procedure
4.3.6   MM information procedure

Up          Top          ToC