Tech-invite3GPPspecsSIPRFCs
Overview21222324252627282931323334353637384‑5x

Content for  TS 24.008  Word version:  17.1.0

Top   Top   Up   Prev   Next
0…   2…   4…   4.2…   4.3…   4.4…   4.7…   4.7.5…   5…   5.3…   6…   9…   9.3…   9.3.18…   9.4…   9.4.9…   9.5…   9.5.10…   10…   10.5.4   10.5.5…   A…   E…   I…

 

4.3  MM common procedures

4.3.1  TMSI reallocation procedure

4.3.2  Authentication procedure

4.3.2a  Authentication procedure used for a UMTS authentication challenge

4.3.2b  Authentication Procedure used for a GSM authentication challengeWord‑p. 92

4.3.2.1  Authentication request by the network

4.3.2.2  Authentication response by the mobile station

4.3.2.3  Authentication processing in the networkWord‑p. 93

4.3.2.3a  128-bit circuit-switched GSM ciphering key |R9|

4.3.2.4  Ciphering key sequence number

4.3.2.5  Authentication not accepted by the networkWord‑p. 94

4.3.2.6  Abnormal casesWord‑p. 96

4.3.2.7  Handling of keys at intersystem change from Iu mode to A/Gb mode

4.3.2.7a  Use of established security contextsWord‑p. 99

4.3.2.8  Handling of keys at intersystem change from A/Gb mode to Iu modeWord‑p. 100

4.3.2.9Void

4.3.2.10  Derivation of keys at SRVCC or vSRVCC handover from S1 mode |R8|Word‑p. 101

4.3.2.11  Derivation of keys at SRVCC handover from Iu mode to Iu mode |R8|

4.3.2.12  Derivation of keys at SRVCC handover from Iu mode to A/Gb mode |R8|Word‑p. 103

4.3.2.13  Derivation of keys at CS to PS SRVCC handover from A/Gb mode to Iu mode |R11|

4.3.2.14  Derivation of keys at 5G-SRVCC from NG-RAN to UTRAN |R16|Word‑p. 106

4.3.3  Identification procedure

4.3.4  IMSI detach procedure

4.3.5  Abort procedureWord‑p. 109

4.3.6  MM information procedure


Up   Top   ToC