Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



click  here  to see the ToC for advanced Rel-15 Word version

 

Here   Top   Up   Prev   Next
1…      4…   4.2…   4.3…   4.4…   4.7…   4.7.5…   5…   5.3…   6…   8…   9.3…   9.3.18…   9.4…   9.4.9…   9.5…   9.5.10…   10…   10.5.4   10.5.5…   A…   E…   I…     

 

 

4.3  MM common procedures
4.3.1  TMSI reallocation procedure
4.3.2  Authentication procedurePDF-p. 88
4.3.2a  Authentication procedure used for a UMTS authentication challenge
4.3.2b  Authentication Procedure used for a GSM authentication challenge
4.3.2.1  Authentication request by the networkPDF-p. 89
4.3.2.2  Authentication response by the mobile station
4.3.2.3  Authentication processing in the networkPDF-p. 90
4.3.2.3a  128-bit circuit-switched GSM ciphering key [R9]
4.3.2.4  Ciphering key sequence numberUp
4.3.2.5  Authentication not accepted by the networkPDF-p. 91
4.3.2.6  Abnormal cases
4.3.2.7  Handling of keys at intersystem change from Iu mode to A/Gb mode
4.3.2.7a  Use of established security contextsPDF-p. 96
4.3.2.8  Handling of keys at intersystem change from A/Gb mode to Iu modePDF-p. 97
4.3.2.9Void
4.3.2.10  Derivation of keys at SRVCC or vSRVCC handover from S1 mode [R8]PDF-p. 98
4.3.2.11  Derivation of keys at SRVCC handover from Iu mode to Iu mode [R8]
4.3.2.12  Derivation of keys at SRVCC handover from Iu mode to A/Gb mode [R8]PDF-p. 100
4.3.2.13  Derivation of keys at CS to PS SRVCC handover from A/Gb mode to Iu mode [R11]
4.3.3  Identification procedurePDF-p. 103
4.3.4  IMSI detach procedurePDF-p. 104
4.3.5  Abort procedure
4.3.6  MM information procedure

Up   Top   ToC