Tech-invite   World Map
3GPPspecs     Glossaries     T+       IETF     RFCs     Groups     SIP     ABNFs

click  here  to see the ToC for advanced Rel-15 Word version


Here        Top        Up        Prev        Next
part:    1     2     3     4     5     6     7     8     9     10
   11     12     13     14     15     16     17     18



4.2   Behaviour of the MS in MM Idle state, GMM-DEREGISTERED state and GMM-REGISTERED state   PDF-p. 75
4.2.1   Primary Service State selection
4.2.2   Detailed Description of the MS behaviour in MM IDLE State.      Up
4.2.3   Service state when back to state MM IDLE from another state      Up
4.2.4   Behaviour in state GMM-DEREGISTERED   PDF-p. 81
4.2.5   Behaviour in state GMM-REGISTERED   PDF-p. 84
4.3   MM common procedures
4.3.1   TMSI reallocation procedure
4.3.2   Authentication procedure   PDF-p. 88
4.3.2a   Authentication procedure used for a UMTS authentication challenge
4.3.2b   Authentication Procedure used for a GSM authentication challenge   Authentication request by the network   PDF-p. 89   Authentication response by the mobile station   Authentication processing in the network   PDF-p. 90   128-bit circuit-switched GSM ciphering key [R9]   Ciphering key sequence number      Up   Authentication not accepted by the network   PDF-p. 91   Abnormal cases   Handling of keys at intersystem change from Iu mode to A/Gb mode   Use of established security contexts   PDF-p. 96   Handling of keys at intersystem change from A/Gb mode to Iu mode   PDF-p. 97   Void   Derivation of keys at SRVCC or vSRVCC handover from S1 mode [R8]   PDF-p. 98   Derivation of keys at SRVCC handover from Iu mode to Iu mode [R8]   Derivation of keys at SRVCC handover from Iu mode to A/Gb mode [R8]   PDF-p. 100   Derivation of keys at CS to PS SRVCC handover from A/Gb mode to Iu mode [R11]
4.3.3   Identification procedure   PDF-p. 103
4.3.4   IMSI detach procedure   PDF-p. 104
4.3.5   Abort procedure
4.3.6   MM information procedure

Up        Top        ToC