Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   Next
1…   4…   4.2…   4.3…   4.4…   4.7…   4.7.5…   5…   5.3…   6…   8…   9.3…   9.3.18…   9.4…   9.4.9…   9.5…   9.5.10…   10…   10.5.4   10.5.5…   A…   E…   I…

 

 

4.3  MM common procedures
4.3.1  TMSI reallocation procedure
4.3.2  Authentication procedurePDF-p. 87
4.3.2a  Authentication procedure used for a UMTS authentication challenge
4.3.2b  Authentication Procedure used for a GSM authentication challenge
4.3.2.1  Authentication request by the network
4.3.2.2  Authentication response by the mobile stationPDF-p. 88
4.3.2.3  Authentication processing in the network
4.3.2.3a  128-bit circuit-switched GSM ciphering key [R9]PDF-p. 89
4.3.2.4  Ciphering key sequence numberUp
4.3.2.5  Authentication not accepted by the networkPDF-p. 90
4.3.2.6  Abnormal cases
4.3.2.7  Handling of keys at intersystem change from Iu mode to A/Gb modePDF-p. 94
4.3.2.7a  Use of established security contexts
4.3.2.8  Handling of keys at intersystem change from A/Gb mode to Iu modePDF-p. 95
4.3.2.9Void
4.3.2.10  Derivation of keys at SRVCC or vSRVCC handover from S1 mode [R8]PDF-p. 96
4.3.2.11  Derivation of keys at SRVCC handover from Iu mode to Iu mode [R8]
4.3.2.12  Derivation of keys at SRVCC handover from Iu mode to A/Gb mode [R8]PDF-p. 98
4.3.2.13  Derivation of keys at CS to PS SRVCC handover from A/Gb mode to Iu mode [R11]
4.3.3  Identification procedurePDF-p. 101
4.3.4  IMSI detach procedurePDF-p. 102
4.3.5  Abort procedure
4.3.6  MM information procedurePDF-p. 104

Up   Top   ToC