Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TS 24.008  Word version:  17.4.0

Top   Top   Up   Prev   Next
0…   2…   4…   4.2…   4.3…   4.4…   4.7…   4.7.5…   5…   5.3…   6…   9…   9.3…   9.3.18…   9.4…   9.4.9…   9.5…   9.5.10…   10…   10.5.4   10.5.5…   A…   E…   I…

 

4.3  MM common proceduresWord‑p. 89

4.3.1  TMSI reallocation procedureWord‑p. 89

4.3.2  Authentication procedureWord‑p. 91

4.3.2a  Authentication procedure used for a UMTS authentication challengeWord‑p. 91

4.3.2b  Authentication Procedure used for a GSM authentication challengeWord‑p. 92

4.3.2.1  Authentication request by the networkWord‑p. 92

4.3.2.2  Authentication response by the mobile stationWord‑p. 92

4.3.2.3  Authentication processing in the networkWord‑p. 93

4.3.2.3a  128-bit circuit-switched GSM ciphering key |R9|Word‑p. 93

4.3.2.4  Ciphering key sequence numberWord‑p. 93

4.3.2.5  Authentication not accepted by the networkWord‑p. 94

4.3.2.6  Abnormal casesWord‑p. 96

4.3.2.7  Handling of keys at intersystem change from Iu mode to A/Gb modeWord‑p. 98

4.3.2.7a  Use of established security contextsWord‑p. 99

4.3.2.8  Handling of keys at intersystem change from A/Gb mode to Iu modeWord‑p. 100

4.3.2.9Void

4.3.2.10  Derivation of keys at SRVCC or vSRVCC handover from S1 mode |R8|Word‑p. 101

4.3.2.11  Derivation of keys at SRVCC handover from Iu mode to Iu mode |R8|Word‑p. 101

4.3.2.12  Derivation of keys at SRVCC handover from Iu mode to A/Gb mode |R8|Word‑p. 103

4.3.2.13  Derivation of keys at CS to PS SRVCC handover from A/Gb mode to Iu mode |R11|Word‑p. 104

4.3.2.14  Derivation of keys at 5G-SRVCC from NG-RAN to UTRAN |R16|Word‑p. 106

4.3.3  Identification procedureWord‑p. 106

4.3.4  IMSI detach procedureWord‑p. 107

4.3.5  Abort procedureWord‑p. 109

4.3.6  MM information procedureWord‑p. 109


Up   Top   ToC