[go: up one dir, main page]

WO2012032218A1 - Methods and apparatuses for handling an unavailable key - Google Patents

Methods and apparatuses for handling an unavailable key Download PDF

Info

Publication number
WO2012032218A1
WO2012032218A1 PCT/FI2011/050701 FI2011050701W WO2012032218A1 WO 2012032218 A1 WO2012032218 A1 WO 2012032218A1 FI 2011050701 W FI2011050701 W FI 2011050701W WO 2012032218 A1 WO2012032218 A1 WO 2012032218A1
Authority
WO
WIPO (PCT)
Prior art keywords
received message
key
connection
base key
handling
Prior art date
Application number
PCT/FI2011/050701
Other languages
French (fr)
Inventor
Marko Filppula
Antti-Eemeli Suronen
Original Assignee
Nokia Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Corporation filed Critical Nokia Corporation
Publication of WO2012032218A1 publication Critical patent/WO2012032218A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation

Definitions

  • Example embodiments of the present invention relate generally to
  • communications technology and, more particularly, relate to methods and apparatuses for handling an unavailable key.
  • E-UTRAN evolved universal mobile telecommunications system
  • UMTS evolved universal mobile telecommunications system
  • E-UTRAN terrestrial radio access network
  • LTE Long Term Evolution
  • 3.9G 3.9G
  • E-UTRAN which continues to be shared with other preceding telecommunication standards is the fact that users are enabled to access a network employing such standards while remaining mobile.
  • users having mobile terminals equipped to communicate in accordance with such standards may travel vast distances while maintaining communication with the network.
  • an access point or base station providing network coverage for a particular area (or cell) may pass off communication with a particular mobile terminal to a neighboring base station when the user of the particular mobile terminal exits the coverage area of the base station or can otherwise be more effectively served by the neighboring base station. This process is often referred to as a handover.
  • Methods, apparatuses, and computer program products are herein provided for handling an unavailable key.
  • Methods, apparatuses, and computer program products in accordance with various embodiments may provide several advantages to computing devices, computing device users, and network operators.
  • Some example embodiments provide for handling a missing base key needed for performing a key change attendant to a handover operation. More particularly, some example embodiments provide for determining an instance in which a message is received indicating that a handover is to be performed and one or more keys are to be changed on the basis of a fresh base key, but the fresh base key is missing.
  • some example embodiments provide for handling the received message as an exception responsive to the determination. Accordingly, the missing fresh base key may be recovered and errors in security key synchronization used in the network connection and/or a failure of cryptographic security that might have occurred if the handover was performed as instructed in the absence of the fresh base key may be avoided.
  • a method which comprises
  • determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the method of this example embodiment further comprises determining that the fresh base key is not available.
  • the method of this example embodiment additionally comprises handling the received message as an exception in response to the determination that the fresh base key is not available.
  • an apparatus comprising at least one processor and at least one memory storing computer program code.
  • the at least one memory and stored computer program code are configured, with the at least one processor, to cause the apparatus of this example embodiment to at least determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the at least one memory and stored computer program code are configured, with the at least one processor, to further cause the apparatus of this example embodiment to determine that the fresh base key is not available.
  • the at least one memory and stored computer program code are configured, with the at least one processor, to additionally cause the apparatus of this example embodiment to handle the received message as an exception in response to the determination that the fresh base key is not available.
  • a computer program product in another example embodiment, includes at least one non- transitory computer-readable storage medium having computer-readable program instructions stored therein.
  • the program instructions of this example embodiment comprise program instructions configured to determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the program instructions of this example embodiment further comprise program instructions configured to determine that the fresh base key is not available.
  • the program instructions of this example embodiment additionally comprise program instructions configured to handle the received message as an exception in response to the determination that the fresh base key is not available.
  • an apparatus which comprises means for determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the apparatus of this example embodiment further comprises means for determining that the fresh base key is not available.
  • the apparatus of this example embodiment additionally comprises means for handling the received message as an exception in response to the determination that the fresh base key is not available.
  • FIG. 1 illustrates a system for handling an unavailable key according to an example embodiment
  • FIG. 2 is a schematic block diagram of a mobile terminal according to an example embodiment
  • FIG. 3 illustrates a block diagram of a terminal apparatus according to an example embodiment
  • FIG. 4 illustrates a signaling diagram of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key
  • FIG. 5 illustrates a signaling diagram of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key
  • FIG. 6 illustrates a signaling diagram of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key
  • FIG. 7 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment
  • FIG. 8 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment
  • FIG. 9 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment
  • FIG. 10 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment.
  • the terms "data,” “content,” “information” and similar terms may be used interchangeably to refer to data capable of being transmitted, received, displayed and/or stored in accordance with various example embodiments. Thus, use of any such terms should not be taken to limit the spirit and scope of the disclosure.
  • a computing device is described herein to receive data from another computing device, it will be appreciated that the data may be received directly from the another computing device or may be received indirectly via one or more intermediary computing devices, such as, for example, one or more servers, relays, routers, network access points, base stations, and/or the like.
  • the term "computer-readable medium” as used herein refers to any medium configured to participate in providing information to a processor, including instructions for execution.
  • Such a medium may take many forms, including, but not limited to a non- transitory computer-readable storage medium (for example, non-volatile media, volatile media), and transmission media.
  • Transmission media include, for example, coaxial cables, copper wire, fiber optic cables, and carrier waves that travel through space without wires or cables, such as acoustic waves and electromagnetic waves, including radio, optical and infrared waves.
  • Signals include man-made transient variations in amplitude, frequency, phase, polarization or other physical properties transmitted through the transmission media.
  • Examples of computer-readable media include a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a compact disc read only memory (CD-ROM), compact disc compact disc-rewritable (CD-RW), digital versatile disc (DVD), Blu-Ray, any other optical medium, punch cards, paper tape, optical mark sheets, any other physical medium with patterns of holes or other optically recognizable indicia, a random access memory (RAM), a programmable read only memory (PROM), an erasable programmable read only memory (EPROM), a FLASH-EPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
  • CD-ROM compact disc read only memory
  • CD-RW compact disc compact disc-rewritable
  • DVD digital versatile disc
  • Blu-Ray any other optical medium, punch cards, paper tape, optical mark sheets, any other physical medium with patterns of holes or other optically recognizable indicia
  • RAM random access memory
  • PROM programmable read
  • computer- readable storage medium is used herein to refer to any computer-readable medium except transmission media. However, it will be appreciated that where embodiments are described to use a computer-readable storage medium, other types of computer-readable mediums may be substituted for or used in addition to the computer-readable storage medium in alternative embodiments.
  • circuitry refers to (a) hardware-only circuit implementations (for example, implementations in analog circuitry and/or digital circuitry); (b) combinations of circuits and computer program product(s) comprising software and/or firmware instructions stored on one or more computer readable memories that work together to cause an apparatus to perform one or more functions described herein; and (c) circuits, such as, for example, a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation even if the software or firmware is not physically present.
  • This definition of 'circuitry' applies to all uses of this term herein, including in any claims.
  • the term 'circuitry' also includes an implementation comprising one or more processors and/or portion(s) thereof and accompanying software and/or firmware.
  • the term 'circuitry' as used herein also includes, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, other network device, and/or other computing device.
  • a terminal apparatus such as a user equipment (UE) may be connected to a network access point, such as a base station, node B, evolved node B (eNB), router, or the like.
  • the access point may comprise an access point for a cellular network, such as a Long Term Evolution (LTE) cellular network, Long Term Evolution Advanced (LTE-A) network, or the like.
  • LTE Long Term Evolution
  • LTE-A Long Term Evolution Advanced
  • the terminal apparatus may receive a message from the access point or other network entity indicating that a handover, such as an intra-cell handover is to be performed and that one or more security keys used to facilitate secure communication between the terminal apparatus and the network is to be changed.
  • the one or more security keys may need to be changed on the basis of a fresh base key.
  • the terminal apparatus may not have the fresh base key.
  • the terminal apparatus may not be able to derive new security keys and, thus, if the terminal apparatus proceeds with the handover, errors in security key synchronization used in the network connection and/or a failure of cryptographic security may result.
  • various example embodiments disclosed herein may facilitate handling an unavailable key. More particularly, various example embodiments disclosed herein may facilitate handling an unavailable key in a situation where a handover is to be performed and at least one security key is to be changed, but a base key needed to derive a new security key is unavailable.
  • FIG. 1 illustrates a block diagram of a system 100 for handling an unavailable key according to an example embodiment.
  • the system 100 as well as the illustrations in other figures are each provided as an example of one embodiment and should not be construed to narrow the scope or spirit of the disclosure in any way.
  • the scope of the disclosure encompasses many potential embodiments in addition to those illustrated and described herein.
  • FIG. 1 illustrates one example of a configuration of a system for handling an unavailable key, numerous other configurations may also be used to implement embodiments of the present invention.
  • FIG. 1 represents a general block diagram of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-
  • E-UTRAN and LTE are merely examples of a network technology with which various example embodiments disclosed herein may be implemented.
  • various example embodiments may be implemented with other network technologies and, where reference is made herein to a specific network technology, elements thereof, and/or standards thereof, that reference is made for purposes of example and not by way of limitation. Accordingly, the system of FIG. 1 is provided merely by way of example and the terminal apparatus 102 as will be further described herein below is not limited to operation in the system of FIG. 1.
  • the system includes an E-UTRAN 76 which may include, among other things, a plurality of evolved node-Bs (eNBs) in communication with an evolved packet core (EPC) 78 which may include one or more mobility management entities (MMEs) 80 and one or more system architecture evolution (SAE) gateways.
  • An MME 80 may serve as an access security management entity (ASME).
  • One or more of the eNBs (including source evolved node-B 72 and target evolved node-B 74) may be in communication with the terminal apparatus 102. It will be appreciated that the eNB 72 and eNB 74 are provided for purposes of example access points that may be used in the system 100 in connection with various example embodiments.
  • eNB in the description and figures is by way of illustration and not by way of example.
  • Other types of access points such as node Bs, base stations, routers, and/or the like may be substituted for an eNB in various example embodiments.
  • the eNBs may provide E-UTRA user plane and control plane (radio resource control (RRC)) protocol terminations for the terminal apparatus 102.
  • RRC radio resource control
  • the eNBs may provide functionality hosting for such functions as radio resource management, radio bearer control, radio admission control, connection mobility control, dynamic allocation of resources to a terminal apparatus 102 in both uplink and downlink, selection of an MME 80 responsive to terminal apparatus attachment, Internet Protocol (IP) header compression and encryption, scheduling of paging and broadcast information, routing of data, measurement and measurement reporting for configuration mobility, and/or the like.
  • IP Internet Protocol
  • the MME 80 may host functions such as distribution of messages to respective evolved node-Bs, security control, idle state mobility control, system architecture evolution (SAE) bearer control, ciphering and integrity protection of non-access stratum (NAS) signaling, and the like.
  • SAE system architecture evolution
  • NAS non-access stratum
  • MME Mobility Management Entity
  • the MME 80 may, for example, be alternatively embodied as a serving General Packet Radio Service (GPRS) support node (SGSN).
  • GPRS General Packet Radio Service
  • SGSN General Packet Radio Service
  • the EPC 78 may provide connection to a network, such as the Internet.
  • an access point such as the source eNB 72 and/or the target eNB 74 may comprise a processor and/or other hardware configured to carry out various functions of the access point.
  • Such functions may be, for example, associated with stored instructions (e.g., instructions stored on a computer readable storage medium of the access point), which when executed by the processor carry out the corresponding functions associated with the instructions.
  • An access point such as the source eNB 72 may be configured to may determine whether to request a handover with another access point, such as the target eNB 74. This determination may, for example, be based on measurement reports received from the terminal apparatus 102. In this regard, for example, if measurement reports received at the source eNB 72 indicate the presence of a condition for which a handover is desirable (e.g., low signal strength), the source eNB 72 may send a handover request to the target eNB 74.
  • An encryption key which may be used to facilitate communication with the terminal apparatus 102, may be included with the handover request.
  • an access point such as the target eNB 74, may be configured to utilize encryption keys received from another network device, such as the source eNB 72 or an MME 80, to communicate with a terminal apparatus 102 and/or to use parameters received from another network device to derive or otherwise calculate encryption keys to use in communications with a terminal apparatus 102.
  • another network device such as the source eNB 72 or an MME 80
  • An access point such as the source eNB 72, may further be configured to exchange messages related to a handover with a terminal apparatus 102.
  • an access point may be configured to send a message triggering a handover of the terminal apparatus 102 to another access point, such as to the target eNB 74, to a terminal apparatus 102.
  • the message may comprise a handover command, a connection reconfiguration message, a radio resource control connection reconfiguration
  • the access point may, for example, be configured to send such a message in response to a handover decision made based at least in part on measurement reports received from the terminal apparatus 102, a radio link failure, and/or the like.
  • a terminal apparatus 102 may be configured to connect to a network by establishing a connection with an access point (e.g., with a source eNB 72, target eNB 74, and/or the like).
  • the terminal apparatus 102 may be configured to establish a radio resource control (R C) connection with an access point.
  • R C radio resource control
  • a terminal apparatus 102 may be embodied as any computing device, such as, for example, a desktop computer, laptop computer, mobile terminal, mobile computer, mobile phone, mobile communication device, game device, digital camera/camcorder, audio/video player, television device, radio receiver, digital video recorder, positioning device, wrist watch, portable digital assistant (PDA), any combination thereof, and/or the like.
  • a terminal apparatus 102 may be embodied as a mobile terminal, such as that illustrated in FIG. 2
  • FIG. 2 illustrates a block diagram of a mobile terminal 10 representative of one embodiment of a terminal apparatus 102.
  • the mobile terminal 10 illustrated and hereinafter described is merely illustrative of one type of terminal apparatus 102 that may implement and/or benefit from various embodiments and, therefore, should not be taken to limit the scope of the disclosure.
  • While several embodiments of the electronic device are illustrated and will be hereinafter described for purposes of example, other types of electronic devices, such as mobile telephones, mobile computers, portable digital assistants (PDAs), pagers, laptop computers, desktop computers, gaming devices, televisions, and other types of electronic systems, may employ various embodiments of the invention.
  • PDAs portable digital assistants
  • the mobile terminal 10 may include an antenna 12 (or multiple antennas 12) in communication with a transmitter 14 and a receiver 16.
  • the mobile terminal 10 may also include a processor 20 configured to provide signals to and receive signals from the transmitter and receiver, respectively.
  • the processor 20 may, for example, be embodied as various means including circuitry, one or more microprocessors with accompanying digital signal processor(s), one or more processor(s) without an accompanying digital signal processor, one or more coprocessors, one or more multi-core processors, one or more controllers, processing circuitry, one or more computers, various other processing elements including integrated circuits such as, for example, an ASIC (application specific integrated circuit) or FPGA (field programmable gate array), or some combination thereof. Accordingly, although illustrated in FIG.
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the processor 20 comprises a plurality of processors.
  • These signals sent and received by the processor 20 may include signaling information in accordance with an air interface standard of an applicable cellular system, and/or any number of different wireline or wireless networking techniques, comprising but not limited to Wi-Fi, wireless local access network (WLA ) techniques such as Institute of Electrical and Electronics Engineers (IEEE) 802.11, 802.16, and/or the like.
  • WLA wireless local access network
  • these signals may include speech data, user generated data, user requested data, and/or the like.
  • the mobile terminal may be capable of operating with one or more air interface standards, communication protocols, modulation types, access types, and/or the like.
  • the mobile terminal may be capable of operating in accordance with various first generation (1G), second generation (2G), 2.5G, third-generation (3G) communication protocols, fourth-generation (4G) communication protocols, Internet Protocol Multimedia Subsystem (IMS) communication protocols (for example, session initiation protocol (SIP)), and/or the like.
  • the mobile terminal may be capable of operating in accordance with 2G wireless communication protocols IS- 136 (Time Division Multiple Access (TDM A)), Global System for Mobile communications (GSM), IS-95 (Code Division Multiple Access (CDMA)), and/or the like.
  • TDM A Time Division Multiple Access
  • GSM Global System for Mobile communications
  • CDMA Code Division Multiple Access
  • the mobile terminal may be capable of operating in accordance with 2.5G wireless communication protocols General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), and/or the like.
  • GPRS General Packet Radio Service
  • EDGE Enhanced Data GSM Environment
  • the mobile terminal may be capable of operating in accordance with 3G wireless communication protocols such as Universal Mobile Telecommunications System (UMTS), Code Division Multiple Access 2000 (CDMA2000), Wideband Code Division Multiple Access (WCDMA), Time Division- Synchronous Code Division Multiple Access (TD-SCDMA), and/or the like.
  • the mobile terminal may be additionally capable of operating in accordance with 3.9G wireless communication protocols such as Long Term Evolution (LTE) or Evolved Universal Terrestrial Radio Access Network (E-UTRAN) and/or the like.
  • LTE Long Term Evolution
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • the mobile terminal may be capable of operating in accordance with fourth-generation (4G) wireless communication protocols and/or the like as well as similar wireless
  • NAMPS Narrow-band Advanced Mobile Phone System
  • TACS Total Access Communication System
  • mobile terminals may also benefit from embodiments of this invention, as should dual or higher mode phones (for example, digital/analog or TDMA/CDMA/analog phones). Additionally, the mobile terminal 10 may be capable of operating according to Wi-Fi or Worldwide Interoperability for
  • WiMAX Microwave Access
  • the processor 20 may comprise circuitry for implementing audio/video and logic functions of the mobile terminal 10.
  • the processor 20 may comprise a digital signal processor device, a microprocessor device, an analog-to- digital converter, a digital-to-analog converter, and/or the like. Control and signal processing functions of the mobile terminal may be allocated between these devices according to their respective capabilities.
  • the processor may additionally comprise an internal voice coder (VC) 20a, an internal data modem (DM) 20b, and/or the like.
  • the processor may comprise functionality to operate one or more software programs, which may be stored in memory.
  • the processor 20 may be capable of operating a connectivity program, such as a web browser.
  • the connectivity program may allow the mobile terminal 10 to transmit and receive web content, such as location-based content, according to a protocol, such as Wireless Application Protocol (WAP), hypertext transfer protocol (HTTP), and/or the like.
  • WAP Wireless Application Protocol
  • HTTP hypertext transfer protocol
  • the mobile terminal 10 may be capable of using a Transmission Control Protocol/Internet Protocol (TCP/IP) to transmit and receive web content across the internet or other networks.
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • the mobile terminal 10 may also comprise a user interface including, for example, an earphone or speaker 24, a ringer 22, a microphone 26, a display 28, a user input interface, and/or the like, which may be operationally coupled to the processor 20.
  • the processor 20 may comprise user interface circuitry configured to control at least some functions of one or more elements of the user interface, such as, for example, the speaker 24, the ringer 22, the microphone 26, the display 28, and/or the like.
  • the processor 20 and/or user interface circuitry comprising the processor 20 may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (for example, software and/or firmware) stored on a memory accessible to the processor 20 (for example, volatile memory 40, non-volatile memory 42, and/or the like).
  • the mobile terminal may comprise a battery for powering various circuits related to the mobile terminal, for example, a circuit to provide mechanical vibration as a detectable output.
  • the user input interface may comprise devices allowing the mobile terminal to receive data, such as a keypad 30, a touch display (not shown), a joystick (not shown), and/or other input device.
  • the keypad may comprise numeric (0-9) and related keys (#, *), and/or other keys for operating the mobile terminal.
  • the mobile terminal 10 may also include one or more means for sharing and/or obtaining data.
  • the mobile terminal may comprise a short-range radio frequency (RF) transceiver and/or interrogator 64 so data may be shared with and/or obtained from electronic devices in accordance with RF techniques.
  • the mobile terminal may comprise other short-range transceivers, such as, for example, an infrared (IR) transceiver 66, a BluetoothTM (BT) transceiver 68 operating using IR and/or RF techniques.
  • IR infrared
  • BT BluetoothTM
  • USB universal serial bus
  • BluetoothTM transceiver 68 may be capable of operating according to ultra-low power BluetoothTM technology (for example, WibreeTM) radio standards.
  • the mobile terminal 10 and, in particular, the short-range transceiver may be capable of transmitting data to and/or receiving data from electronic devices within a proximity of the mobile terminal, such as within 10 meters, for example.
  • the mobile terminal may be capable of transmitting and/or receiving data from electronic devices according to various wireless networking techniques, including Wi-Fi, WLAN techniques such as IEEE 802.11 techniques, IEEE 802.15 techniques, IEEE 802.16 techniques, and/or the like.
  • the mobile terminal 10 may comprise memory, such as a subscriber identity module (SIM) 38, a removable user identity module (R-UIM), and/or the like, which may store information elements related to a mobile subscriber. In addition to the SIM, the mobile terminal may comprise other removable and/or fixed memory.
  • the mobile terminal 10 may include volatile memory 40 and/or non- volatile memory 42.
  • volatile memory 40 may include Random Access Memory (RAM) including dynamic and/or static RAM, on-chip or off-chip cache memory, and/or the like.
  • RAM Random Access Memory
  • Non-volatile memory 42 which may be embedded and/or removable, may include, for example, readonly memory, flash memory, magnetic storage devices (for example, hard disks, floppy disk drives, magnetic tape, etc.), optical disc drives and/or media, non- volatile random access memory (NVRAM), and/or the like. Like volatile memory 40 non-volatile memory 42 may include a cache area for temporary storage of data.
  • the memories may store one or more software programs, instructions, pieces of information, data, and/or the like which may be used by the mobile terminal for performing functions of the mobile terminal.
  • the memories may comprise an identifier, such as an international mobile equipment identification (IMEI) code, capable of uniquely identifying the mobile terminal 10.
  • IMEI international mobile equipment identification
  • FIG. 3 illustrates a block diagram of a terminal apparatus 102 according to an example embodiment.
  • the terminal apparatus 102 includes various means for performing the various functions herein described. These means may comprise one or more of a processor 110, memory 112, communication interface 1 14, user interface 1 16, or connection management circuitry 1 18.
  • the means of the terminal apparatus 102 as described herein may be embodied as, for example, circuitry, hardware elements (e.g., a suitably programmed processor,
  • a computer program product comprising computer-readable program instructions (e.g., software or firmware) stored on a computer- readable medium (for example memory 1 12) that is executable by a suitably configured processing device (e.g., the processor 1 10), or some combination thereof.
  • computer-readable program instructions e.g., software or firmware
  • a suitably configured processing device e.g., the processor 1 10
  • one or more of the means illustrated in FIG. 3 may be embodied as a chip or chip set.
  • the terminal apparatus 102 may comprise one or more physical packages (for example, chips) including materials, components and/or wires on a structural assembly (for example, a baseboard).
  • the structural assembly may provide physical strength, conservation of size, and/or limitation of electrical interaction for component circuitry included thereon.
  • the processor 1 10, memory 1 12, communication interface 1 14, user interface 1 16, and/or connection management circuitry 1 18 may be embodied as a chip or chip set.
  • the terminal apparatus 102 may therefore, in some example embodiments, be configured to implement embodiments of the present invention on a single chip or as a single "system on a chip.”
  • the terminal apparatus 102 may comprise component(s) configured to implement embodiments of the present invention on a single chip or as a single "system on a chip.”
  • a chip or chipset may constitute means for performing one or more operations for providing the
  • the processor 1 10 may, for example, be embodied as various means including one or more microprocessors with accompanying digital signal processor(s), one or more processor(s) without an accompanying digital signal processor, one or more coprocessors, one or more multi-core processors, one or more controllers, processing circuitry, one or more computers, various other processing elements including integrated circuits such as, for example, an ASIC (application specific integrated circuit) or FPGA (field
  • the processor 1 10 comprises a plurality of processors.
  • the plurality of processors may be in operative communication with each other and may be collectively configured to perform one or more functionalities of the terminal apparatus 102 as described herein.
  • the processor 110 may be embodied as or comprise the processor 20.
  • the processor 110 is configured to execute instructions stored in the memory 112 or otherwise accessible to the processor 110. These instructions, when executed by the processor 110, may cause the terminal apparatus 102 to perform one or more of the functionalities of the terminal apparatus 102 as described herein.
  • the processor 110 may comprise an entity capable of performing operations according to embodiments of the present invention while configured accordingly.
  • the processor 110 when the processor 110 is embodied as an ASIC, FPGA or the like, the processor 110 may comprise specifically configured hardware for conducting one or more operations described herein.
  • the processor 110 when the processor 110 is embodied as an executor of instructions, such as may be stored in the memory 112, the instructions may specifically configure the processor 110 (e.g., a hardware processor) to perform one or more algorithms and operations described herein.
  • the memory 112 may comprise, for example, volatile memory, non- volatile memory, or some combination thereof.
  • the memory 112 may comprise a non-transitory computer-readable storage medium.
  • the memory 112 may comprise a plurality of memories.
  • the plurality of memories may be embodied on a single computing device or may be distributed across a plurality of computing devices collectively configured to function as the terminal apparatus 102.
  • the memory 112 may comprise a hard disk, random access memory, cache memory, flash memory, a compact disc read only memory (CD-ROM), digital versatile disc read only memory (DVD-ROM), an optical disc, circuitry configured to store information, or some combination thereof.
  • the memory 112 may comprise the volatile memory 40 and/or the non-volatile memory 42.
  • the memory 112 may be configured to store information, data, applications, instructions, or the like for enabling the terminal apparatus 102 to carry out various functions in accordance with various example embodiments.
  • the memory 112 may be configured to store information, data, applications, instructions, or the like for enabling the terminal apparatus 102 to carry out various functions in accordance with various example embodiments.
  • the memory 112 may comprise the volatile memory 40 and/or the non-volatile memory 42.
  • the memory 112 may be configured to store information, data, applications, instructions, or the like for enabling the terminal apparatus 102 to carry out various functions in accordance with various example embodiments.
  • the memory 112 may comprise the volatile memory 40 and/or the non-volatile memory 42.
  • the memory 112 may be configured to store information, data, applications, instructions, or the like for enabling the terminal apparatus 102 to carry out various functions in accordance with various example embodiments.
  • the memory 112 may
  • the memory 112 is configured to buffer input data for processing by the processor 110. Additionally or alternatively, the memory 112 may be configured to store program instructions for execution by the processor 110. The memory 112 may store information in the form of static and/or dynamic information. This stored information may be stored and/or used by the connection management circuitry 118 during the course of performing its
  • the communication interface 114 may be embodied as any device or means embodied in circuitry, hardware, a computer program product comprising computer readable program instructions stored on a computer readable medium (for example, the memory 112) and executed by a processing device (for example, the processor 110), or a combination thereof that is configured to receive and/or transmit data from/to another computing device.
  • the communication interface 114 is at least partially embodied as or otherwise controlled by the processor 110.
  • the communication interface 114 may be in communication with the processor 110, such as via a bus.
  • the communication interface 114 may include, for example, an antenna, a transmitter, a receiver, a transceiver and/or supporting hardware or software for enabling communications with one or more remote computing devices.
  • the communication interface 114 may be configured to receive and/or transmit data using any protocol that may be used for communications between computing devices.
  • the communication interface 114 may be configured to receive and/or transmit data using any protocol that may be used for transmission of data over a wireless network, wireline network, some combination thereof, or the like by which the terminal apparatus 102 and one or more computing devices or computing resources may be in communication.
  • the communication interface 114 may be configured to enable radio
  • the communication interface 114 may additionally be in communication with the memory 112, user interface 116, and/or connection management circuitry 118, such as via a bus.
  • the user interface 116 may be in communication with the processor 110 to receive an indication of a user input and/or to provide an audible, visual, mechanical, or other output to a user.
  • the user interface 116 may include, for example, a keyboard, a mouse, a joystick, a display, a touch screen display, a microphone, a speaker, and/or other input/output mechanisms.
  • the user interface 116 may additionally be configured to detect and/or receive an indication of a touch gesture or other input to the touch screen display.
  • the user interface 116 may be in communication with the memory 112, communication interface 114, and/or connection management circuitry 118, such as via a bus.
  • connection management circuitry 118 may be embodied as various means, such as circuitry, hardware, a computer program product comprising computer readable program instructions stored on a computer readable medium (for example, the memory 112) and executed by a processing device (for example, the processor 110), or some combination thereof and, in some embodiments, is embodied as or otherwise controlled by the processor 110.
  • the connection management circuitry 118 may be in communication with the processor 110.
  • the connection management circuitry 118 may further be in communication with one or more of the memory 112,
  • communication interface 114 or user interface 116, such as via a bus.
  • the connection management circuitry 118 is configured to receive a message sent by an access point, such as an eNB of the E-UTRA 76.
  • the message may, for example, comprise a connection reconfiguration message, such as an RRCConnectionReconfiguration message.
  • the connection management circuitry 118 may be configured to determine the contents of one or more fields of the received message.
  • the connection management circuitry 118 may be configured to determine whether the received message includes a field indicating that a handover, such as an intra-cell handover, is to be performed.
  • the received message comprises an RRCConnectionReconfiguration message
  • RRCConnectionReconfiguration message may comprise a mobilityControUnfo field, which may indicate that an intra-cell handover is to be performed.
  • the connection management circuitry 118 may be configured to determine whether the received message includes a field indicating that one or more security keys is to be changed (e.g., one or more new security keys is to be derived) for use in conjunction with and/or subsequent to the handover.
  • the received message comprises an RRCConnectionReconfiguration message
  • RRCConnectionReconfiguration message may comprise a keyChangelndicator field. If the keyChangelndicator field has a value set to TRUE, the connection management circuitry 118 may determine that one or more security keys is to be changed.
  • the one or more security keys to be changed may be changed through derivation from a base key.
  • the base key may, for example, comprise a key established or otherwise shared with an access security management entity
  • the base key may, for example, comprise the key K ASME -
  • a fresh base key which may comprise a base key that has not been used to derive one or more existing security keys, may be needed to derive the one or more security keys to be changed.
  • a fresh base key may comprise a fresh K ASME resulting from a previous successful non access stratum (NAS) security mode control (SMC) procedure.
  • NAS non access stratum
  • SMC security mode control
  • the fresh K ASME may be used to derive a new IQ NB in an instance in which a security key is to be changed in response to a handover.
  • connection management circuitry 118 may determine whether the fresh base key is available.
  • the fresh base key may not be available in an instance in which the fresh base key was not obtained, was corrupted, or is missing. If no base key is available or if only a base key that has already been used to derive a security key is available, the connection management circuitry 118 may determine that a fresh base key is not available.
  • connection management circuitry 118 may be configured to handle a received message comprising an indication that a handover is to be performed and an indication that a security key is to be changed as an exception.
  • connection management circuitry 118 may be configured to handle a received message as an exception by initiating a connection re- establishment procedure responsive to a determination that a fresh base key is not available.
  • the connection management circuitry 118 may be configured to initiate a connection re-establishment procedure by causing a connection reestablishment request to be sent to a network access point (e.g., the source eNB 72, target eNB 74, or the like).
  • the connection reestablishment request may, for example, comprise a radio resource control connection reestablishment request (R CConnectionReestablishmentRequest) message.
  • the connection management circuitry 1 18 may further revert back to a configuration (e.g., a security context) used in the source cell (e.g., in the source eNB 72).
  • FIG. 4 a signaling diagram is illustrated of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key. While FIG. 4 illustrates signals exchanged in accordance with a radio access network operating in accordance with E-UTRAN standards, it will be appreciated that this example is provided by way of example and not by way of limitation. Accordingly, similar signals may be exchanged in accordance with other standards.
  • the terminal apparatus 102 does not have a fresh K ASME -
  • the terminal apparatus may receive an
  • the connection management circuitry 118 may determine at operation 410 that the RRCConnectionReconfiguration message includes a mobilityControUnfo field indicating that an intra-cell handover is to be performed and a securityConfigHO field with a keyChangelndicator value set to TRUE. Responsive to this determination, the connection management circuitry 118 may determine whether a fresh K ASME is available. As a fresh K ASME is unavailable, the connection management circuitry 118 may further handle the received RRCConnectionReconfiguration message as an exception by initiating a connection re-establishment procedure.
  • connection management circuitry 118 may cause an RRCConnectionReestablishmentRequest message to be sent to the E-UTRAN 76, at operation 420.
  • the connection management circuitry 118 may further start a timer (e.g., the timer T304) at operation 410 in response to receipt of the RRCConnectionReconfiguration message. The value of this timer may be specified by a parameter included in the RRCConnectionReconfiguration message.
  • the connection management circuitry 118 may stop this timer (e.g., prior to expiry of the timer) at operation 420.
  • the connection management circuitry 118 may be configured to handle a received message as an exception by releasing a connection with a network access point (e.g., the source eNB 72, target eNB 74, or the like).
  • Releasing the connection may comprise releasing a radio resource control (RRC) connection.
  • RRC radio resource control
  • releasing the connection may comprise causing the terminal apparatus 102 to leave a resource control connected (RRC Connected) state. Release of the RRC connection may, for example, be requested by upper layers.
  • FIG. 5 a signaling diagram is illustrated of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key. While FIG. 5 illustrates signals exchanged in accordance with a radio access network operating in accordance with E-UTRAN standards, it will be appreciated that this example is provided by way of example and not by way of limitation.
  • the terminal apparatus 102 does not have a fresh
  • the terminal apparatus may receive an RRCConnectionReconfiguration message sent by the E-UTRAN 76 (e.g., by an eNB of the E-UTRAN 76).
  • the connection management circuitry 118 may determine at operation 510 that the RRCConnectionReconfiguration message includes a mobilityControUnfo field indicating that an intra-cell handover is to be performed and a securityConfigHO field with a keyChangelndicator value set to TRUE. Responsive to this determination, the connection management circuitry 118 may determine whether a fresh K ASME is available.
  • the connection management circuitry 118 may further handle the received RRCConnectionReconfiguration message as an exception by releasing the RRC connection, at operation 520.
  • the connection management circuitry 118 may further start a timer (e.g., the timer T304) at operation 510 in response to receipt of the RRCConnectionReconfiguration message.
  • the value of this timer may be specified by a parameter included in the RRCConnectionReconfiguration message.
  • the connection management circuitry 118 may stop this timer (e.g., prior to expiry of the timer) at operation 520.
  • the connection management circuitry 118 may be configured to handle a received message as an exception by ignoring the received message.
  • the connection management circuitry 118 may determine that the received message includes a field set to a value that is not comprehended.
  • the received message may comprise a field indicating that a security key is to be changed (e.g., a keyChangelndicator field having a value set to TRUE).
  • a keyChangelndicator field having a value set to TRUE.
  • the connection management circuitry 118 may ignore a received message having a field with a value that is not comprehended.
  • FIG. 6 a signaling diagram is illustrated of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key. While FIG. 6 illustrates signals exchanged in accordance with a radio access network operating in accordance with E-UTRAN standards, it will be appreciated that this example is provided by way of example and not by way of limitation.
  • the terminal apparatus 102 does not have a fresh K ASME -
  • the terminal apparatus may receive an
  • the connection management circuitry 1 18 may determine at operation 610 that the RRCConnectionReconfiguration message includes a mobilityControlInfo field indicating that an intra-cell handover is to be performed and a securityConfigHO field with a keyChangelndicator value set to TRUE. Responsive to this determination, the connection management circuitry 1 18 may determine whether a fresh K ASME is available. As a fresh K ASME is unavailable, the connection management circuitry 1 18 may further determine that the value of the KeyChangelndicator field is not comprehended. As such, the connection management circuitry 1 18 may handle the received
  • FIG. 7 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment.
  • the operations illustrated in and described with respect to FIG. 7 may, for example, be performed by, with the assistance of, and/or under the control of one or more of the processor 1 10, memory 1 12, communication interface 1 14, or connection management circuitry 1 18.
  • Operation 700 may comprise determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the processor 1 10, memory 1 12, communication interface 1 14, and/or connection management circuitry 1 18 may, for example, provide means for performing operation 700.
  • Operation 710 may comprise determining that the fresh base key is not available.
  • the processor 1 10, memory 1 12, and/or connection management circuitry 1 18 may, for example, provide means for performing operation 710. Operation 720 may comprise handling the received message as an exception in response to the determination that the fresh base key is not available.
  • the processor 1 10, memory 1 12, communication interface 1 14, and/or connection management circuitry 1 18 may, for example, provide means for performing operation 720.
  • FIG. 8 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment.
  • the operations illustrated in and described with respect to FIG. 8 may, for example, be performed by, with the assistance of, and/or under the control of one or more of the processor 1 10, memory 1 12, communication interface 1 14, or connection management circuitry 1 18.
  • Operation 800 may comprise determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the processor 1 10, memory 1 12, communication interface 1 14, and/or connection management circuitry 118 may, for example, provide means for performing operation 800.
  • Operation 810 may comprise determining that the fresh base key is not available.
  • the processor 110, memory 112, and/or connection management circuitry 118 may, for example, provide means for performing operation 810. Operation 820 may comprise handling the received message as an exception by initiating a connection re-establishment procedure in response to the determination that the fresh base key is not available.
  • the processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 820.
  • FIG. 9 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment.
  • the operations illustrated in and described with respect to FIG. 9 may, for example, be performed by, with the assistance of, and/or under the control of one or more of the processor 110, memory 112, communication interface 114, or connection management circuitry 118.
  • Operation 900 may comprise determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 900.
  • Operation 910 may comprise determining that the fresh base key is not available.
  • the processor 110, memory 112, and/or connection management circuitry 118 may, for example, provide means for performing operation 910. Operation 920 may comprise handling the received message as an exception by releasing a connection with a network access point in response to the determination that the fresh base key is not available.
  • the processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 920.
  • FIG. 10 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment.
  • the operations illustrated in and described with respect to FIG. 10 may, for example, be performed by, with the assistance of, and/or under the control of one or more of the processor 110, memory 112,
  • Operation 1000 may comprise determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 1000.
  • Operation 1010 may comprise determining that the fresh base key is not available.
  • the processor 110, memory 112, and/or connection management circuitry 118 may, for example, provide means for performing operation 1010.
  • Operation 1020 may comprise handling the received message as an exception by ignoring the received message in response to the determination that the fresh base key is not available.
  • the processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 1020.
  • FIGs. 7-10 each illustrate a flowchart of a system, method, and computer program product according to an example embodiment. It will be understood that each block of the flowcharts, and combinations of blocks in the flowcharts, may be
  • the procedures described herein may be embodied by computer program instructions of a computer program product.
  • the computer program product(s) which embody the procedures described herein may be stored by one or more memory devices of a mobile terminal, server, or other computing device (for example, in the memory 112) and executed by a processor in the computing device (for example, by the processor 110).
  • the computer program instructions comprising the computer program product(s) which embody the procedures described above may be stored by memory devices of a plurality of computing devices.
  • any such computer program product may be loaded onto a computer or other programmable apparatus (for example, a terminal apparatus 102) to produce a machine, such that the computer program product including the instructions which execute on the computer or other programmable apparatus creates means for implementing the functions specified in the flowchart block(s).
  • the computer program product may comprise one or more computer-readable memories on which the computer program instructions may be stored such that the one or more computer-readable memories can direct a computer or other programmable apparatus to function in a particular manner, such that the computer program product comprises an article of manufacture which implements the function specified in the flowchart block(s).
  • the computer program instructions of one or more computer program products may also be loaded onto a computer or other programmable apparatus (for example, a terminal apparatus 102) to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus implement the functions specified in the flowchart block(s).
  • a computer or other programmable apparatus for example, a terminal apparatus 102
  • blocks of the flowcharts support combinations of means for performing the specified functions. It will also be understood that one or more blocks of the flowcharts, and combinations of blocks in the flowcharts, may be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer program product(s).
  • a suitably configured processor for example, the processor 110
  • all or a portion of the elements may be configured by and operate under control of a computer program product.
  • the computer program product for performing the methods of an example embodiment of the invention includes a computer-readable storage medium (for example, the memory 112), such as the nonvolatile storage medium, and computer-readable program code portions, such as a series of computer instructions, embodied in the computer-readable storage medium.
  • a method which comprises
  • determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the method of this example embodiment further comprises determining that the fresh base key is not available.
  • the method of this example embodiment additionally comprises handling the received message as an exception in response to the determination that the fresh base key is not available.
  • Handling the received message as an exception may comprise a processor handling the received message as an exception.
  • handling the received message as an exception may comprise connection management circuitry handling the received message as an exception.
  • the message may comprise a connection reconfiguration message, such as a radio resource control connection reconfiguration (R CConnectionReconfiguration) message.
  • the handover may comprise a handover in a cellular network.
  • the cellular network may comprise a Long Term Evolution (LTE) network.
  • the indication that the handover is to be performed may comprise an indication that an intra-cell handover is to be performed.
  • the indication that the intra-cell handover is to be performed may comprise a mobilityControlInfo field indicating that an intra-cell handover is to be performed.
  • the indication that the security key is to be changed may comprise a security configuration field including a key change indicator set to TRUE.
  • the fresh base key may comprise a key established with an access security management entity (AS ME).
  • the access security management entity may comprise a mobility management entity (MME).
  • the fresh base key may comprise the key K ASME -
  • the security key indicated to be changed may comprise IQ NB and/or one or more keys at least indirectly derived using K ASME -
  • Handling the received message as an exception may comprise initiating a connection re-establishment procedure responsive to the determination that the fresh base key is not available.
  • Initiating the connection re-establishment procedure may comprise causing a connection reestablishment request to be sent to a network access point.
  • the network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRAN).
  • the connection reestablishment request may comprise a radio resource control connection reestablishment request (RRCConnectionReestablishmentRequest) message.
  • RRCConnectionReestablishmentRequest radio resource control connection reestablishment request
  • Handling the received message as an exception may comprise releasing a connection with a network access point.
  • Releasing the connection may comprise releasing a radio resource control connection.
  • releasing the connection may comprise leaving a radio resource control connected (RRC CONNECTED) state.
  • the network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRAN).
  • eNB evolved node B
  • UMTS evolved universal mobile telecommunications system
  • E-UTRAN terrestrial radio access network
  • Handling the received message as an exception may comprise ignoring the received message.
  • the method may further comprise determining responsive to the determination that the fresh base key is not available that the received message comprises a field having a value that is not comprehended. Ignoring the received message may be performed responsive to the determination that the received message comprises a field having a value that is not comprehended.
  • an apparatus comprising at least one processor and at least one memory storing computer program code.
  • the at least one memory and stored computer program code are configured, with the at least one processor, to cause the apparatus of this example embodiment to at least determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the at least one memory and stored computer program code are configured, with the at least one processor, to further cause the apparatus of this example embodiment to determine that the fresh base key is not available.
  • the at least one memory and stored computer program code are configured, with the at least one processor, to additionally cause the apparatus of this example embodiment to handle the received message as an exception in response to the determination that the fresh base key is not available.
  • the message may comprise a connection reconfiguration message, such as a radio resource control connection reconfiguration (RRCConnectionReconfiguration) message.
  • the handover may comprise a handover in a cellular network.
  • the cellular network may comprise a Long Term Evolution (LTE) network.
  • the indication that the handover is to be performed may comprise an indication that an intra-cell handover is to be performed.
  • the indication that the intra-cell handover is to be performed may comprise a mobilityControUnfo field indicating that an intra-cell handover is to be performed.
  • the indication that the security key is to be changed may comprise a security configuration field including a key change indicator set to TRUE.
  • the fresh base key may comprise a key established with an access security management entity (AS ME).
  • the access security management entity may comprise a mobility management entity (MME).
  • the fresh base key may comprise the key K ASME -
  • the security key indicated to be changed may comprise IQ NB and/or one or more keys at least indirectly derived using K ASME -
  • the at least one memory and stored computer program code may be configured, with the at least one processor, to cause the apparatus of this example embodiment to handle the received message as an exception at least in part by initiating a connection re- establishment procedure responsive to the determination that the fresh base key is not available.
  • Initiating the connection re-establishment procedure may comprise causing a connection reestablishment request to be sent to a network access point.
  • the network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRAN).
  • the connection reestablishment request may comprise a radio resource control connection reestablishment request (RRCConnectionReestablishmentRequest) message.
  • the at least one memory and stored computer program code may be configured, with the at least one processor, to cause the apparatus of this example embodiment to handle the received message as an exception at least in part by releasing a connection with a network access point.
  • Releasing the connection may comprise releasing a radio resource control connection.
  • releasing the connection may comprise leaving a radio resource control connected (R C CO NECTED) state.
  • the network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRA ).
  • the at least one memory and stored computer program code may be configured, with the at least one processor, to cause the apparatus of this example embodiment to handle the received message as an exception at least in part by ignoring the received message.
  • the at least one memory and stored computer program code may be configured, with the at least one processor, to cause the apparatus of this example embodiment to determine responsive to the determination that the fresh base key is not available that the received message comprises a field having a value that is not
  • a computer program product in another example embodiment, includes at least one non- transitory computer-readable storage medium having computer-readable program instructions stored therein.
  • the program instructions of this example embodiment comprise program instructions configured to determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the program instructions of this example embodiment further comprise program instructions configured to determine that the fresh base key is not available.
  • the program instructions of this example embodiment additionally comprise program instructions configured to handle the received message as an exception in response to the determination that the fresh base key is not available.
  • the message may comprise a connection reconfiguration message, such as a radio resource control connection reconfiguration (RRCConnectionReconfiguration) message.
  • the handover may comprise a handover in a cellular network.
  • the cellular network may comprise a Long Term Evolution (LTE) network.
  • the indication that the handover is to be performed may comprise an indication that an intra-cell handover is to be performed.
  • the indication that the intra-cell handover is to be performed may comprise a mobilityControUnfo field indicating that an intra-cell handover is to be performed.
  • the indication that the security key is to be changed may comprise a security configuration field including a key change indicator set to TRUE.
  • the fresh base key may comprise a key established with an access security management entity (AS ME).
  • the access security management entity may comprise a mobility management entity (MME).
  • the fresh base key may comprise the key K ASME -
  • the security key indicated to be changed may comprise IQ NB and/or one or more keys at least indirectly derived using K ASME -
  • the program instructions configured to handle the received message as an exception may comprise program instructions configured to initiate a connection re- establishment procedure responsive to the determination that the fresh base key is not available.
  • the program instructions configured to initiate the connection re-establishment procedure may comprise program instructions configured to cause a connection
  • the network access point may comprise an evolved node B (eNB) of an evolved universal mobile
  • connection reestablishment request may comprise a radio resource control connection reestablishment request (RRCConnectionReestablishmentRequest) message.
  • RRCConnectionReestablishmentRequest radio resource control connection reestablishment request
  • the program instructions configured to handle the received message as an exception may comprise program instructions configured to release a connection with a network access point.
  • the program instructions configured to release the connection may comprise program instructions configured to release a radio resource control connection.
  • the program instructions configured to release the radio resource control connection may comprise program instructions configured to leave a radio resource control connected (RRC CO NECTED) state.
  • the network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system
  • UMTS terrestrial radio access network
  • E-UTRAN terrestrial radio access network
  • the program instructions configured to handle the received message as an exception may comprise program instructions configured to ignore the received message.
  • the program instructions may further comprise program instructions configured to determine responsive to the determination that the fresh base key is not available that the received message comprises a field having a value that is not
  • the program instructions configured to ignore the received message may comprise program instructions configured to ignore the received message responsive to the determination that the received message comprises a field having a value that is not comprehended.
  • an apparatus which comprises means for determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key.
  • the apparatus of this example embodiment further comprises means for determining that the fresh base key is not available.
  • the apparatus of this example embodiment additionally comprises means for handling the received message as an exception in response to the determination that the fresh base key is not available.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

Methods and apparatuses are provided for handling an unavailable key. A method may include determining that a received message includes an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key (700). The method may further include determining that the fresh base key is not available (710). The method may additionally include handling the received message as an exception in response to the determination that the fresh base key is not available (720). Corresponding apparatuses are also provided.

Description

METHODS AND APPARATUSES FOR HANDLING AN UNAVAILABLE KEY
TECHNOLOGICAL FIELD
[0001] Example embodiments of the present invention relate generally to
communications technology and, more particularly, relate to methods and apparatuses for handling an unavailable key.
BACKGROUND
[0002] The modern communications era has brought about a tremendous expansion of wireline and wireless networks. Computer networks, television networks, and telephony networks are experiencing an unprecedented technological expansion, fueled by consumer demand. Wireless and mobile networking technologies have addressed related consumer demands, while providing more flexibility and immediacy of information transfer and providing convenience to users.
[0003] Current and future networking technologies continue to facilitate ease of information transfer and convenience to users. In order to provide easier or faster information transfer and convenience, telecommunication industry service providers are developing improvements to existing networks. For example, the evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRAN) is currently being developed. The E-UTRAN, which is also known as Long Term
Evolution (LTE) or 3.9G, is aimed at upgrading prior technologies by improving efficiency, lowering costs, improving services, making use of new spectrum opportunities, and providing better integration with other open standards.
[0004] One advantage of E-UTRAN which continues to be shared with other preceding telecommunication standards is the fact that users are enabled to access a network employing such standards while remaining mobile. Thus, for example, users having mobile terminals equipped to communicate in accordance with such standards may travel vast distances while maintaining communication with the network. In this regard, an access point or base station providing network coverage for a particular area (or cell), may pass off communication with a particular mobile terminal to a neighboring base station when the user of the particular mobile terminal exits the coverage area of the base station or can otherwise be more effectively served by the neighboring base station. This process is often referred to as a handover. BRIEF SUMMARY
[0005] Methods, apparatuses, and computer program products are herein provided for handling an unavailable key. Methods, apparatuses, and computer program products in accordance with various embodiments may provide several advantages to computing devices, computing device users, and network operators. Some example embodiments provide for handling a missing base key needed for performing a key change attendant to a handover operation. More particularly, some example embodiments provide for determining an instance in which a message is received indicating that a handover is to be performed and one or more keys are to be changed on the basis of a fresh base key, but the fresh base key is missing. In this regard, some example embodiments provide for handling the received message as an exception responsive to the determination. Accordingly, the missing fresh base key may be recovered and errors in security key synchronization used in the network connection and/or a failure of cryptographic security that might have occurred if the handover was performed as instructed in the absence of the fresh base key may be avoided.
[0006] In an example embodiment, a method is provided, which comprises
determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The method of this example embodiment further comprises determining that the fresh base key is not available. The method of this example embodiment additionally comprises handling the received message as an exception in response to the determination that the fresh base key is not available.
[0007] In another example embodiment, an apparatus comprising at least one processor and at least one memory storing computer program code is provided. The at least one memory and stored computer program code are configured, with the at least one processor, to cause the apparatus of this example embodiment to at least determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The at least one memory and stored computer program code are configured, with the at least one processor, to further cause the apparatus of this example embodiment to determine that the fresh base key is not available. The at least one memory and stored computer program code are configured, with the at least one processor, to additionally cause the apparatus of this example embodiment to handle the received message as an exception in response to the determination that the fresh base key is not available. [0008] In another example embodiment, a computer program product is provided. The computer program product of this example embodiment includes at least one non- transitory computer-readable storage medium having computer-readable program instructions stored therein. The program instructions of this example embodiment comprise program instructions configured to determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The program instructions of this example embodiment further comprise program instructions configured to determine that the fresh base key is not available. The program instructions of this example embodiment additionally comprise program instructions configured to handle the received message as an exception in response to the determination that the fresh base key is not available.
[0009] In another example embodiment, an apparatus is provided, which comprises means for determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The apparatus of this example embodiment further comprises means for determining that the fresh base key is not available. The apparatus of this example embodiment additionally comprises means for handling the received message as an exception in response to the determination that the fresh base key is not available.
[0010] The above summary is provided merely for purposes of summarizing some example embodiments of the invention so as to provide a basic understanding of some aspects of the invention. Accordingly, it will be appreciated that the above described example embodiments are merely examples and should not be construed to narrow the scope or spirit of the invention in any way. It will be appreciated that the scope of the invention encompasses many potential embodiments, some of which will be further described below, in addition to those here summarized.
BRIEF DESCRIPTION OF THE DRAWING(S)
[0011] Having thus described embodiments of the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
[0012] FIG. 1 illustrates a system for handling an unavailable key according to an example embodiment;
[0013] FIG. 2 is a schematic block diagram of a mobile terminal according to an example embodiment; [0014] FIG. 3 illustrates a block diagram of a terminal apparatus according to an example embodiment;
[0015] FIG. 4 illustrates a signaling diagram of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key;
[0016] FIG. 5 illustrates a signaling diagram of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key;
[0017] FIG. 6 illustrates a signaling diagram of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key;
[0018] FIG. 7 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment;
[0019] FIG. 8 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment;
[0020] FIG. 9 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment; and
[0021] FIG. 10 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment.
DETAILED DESCRIPTION
[0022] Some embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout.
[0023] As used herein, the terms "data," "content," "information" and similar terms may be used interchangeably to refer to data capable of being transmitted, received, displayed and/or stored in accordance with various example embodiments. Thus, use of any such terms should not be taken to limit the spirit and scope of the disclosure. Further, where a computing device is described herein to receive data from another computing device, it will be appreciated that the data may be received directly from the another computing device or may be received indirectly via one or more intermediary computing devices, such as, for example, one or more servers, relays, routers, network access points, base stations, and/or the like. [0024] The term "computer-readable medium" as used herein refers to any medium configured to participate in providing information to a processor, including instructions for execution. Such a medium may take many forms, including, but not limited to a non- transitory computer-readable storage medium (for example, non-volatile media, volatile media), and transmission media. Transmission media include, for example, coaxial cables, copper wire, fiber optic cables, and carrier waves that travel through space without wires or cables, such as acoustic waves and electromagnetic waves, including radio, optical and infrared waves. Signals include man-made transient variations in amplitude, frequency, phase, polarization or other physical properties transmitted through the transmission media. Examples of computer-readable media include a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a compact disc read only memory (CD-ROM), compact disc compact disc-rewritable (CD-RW), digital versatile disc (DVD), Blu-Ray, any other optical medium, punch cards, paper tape, optical mark sheets, any other physical medium with patterns of holes or other optically recognizable indicia, a random access memory (RAM), a programmable read only memory (PROM), an erasable programmable read only memory (EPROM), a FLASH-EPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read. The term computer- readable storage medium is used herein to refer to any computer-readable medium except transmission media. However, it will be appreciated that where embodiments are described to use a computer-readable storage medium, other types of computer-readable mediums may be substituted for or used in addition to the computer-readable storage medium in alternative embodiments.
[0025] Additionally, as used herein, the term 'circuitry' refers to (a) hardware-only circuit implementations (for example, implementations in analog circuitry and/or digital circuitry); (b) combinations of circuits and computer program product(s) comprising software and/or firmware instructions stored on one or more computer readable memories that work together to cause an apparatus to perform one or more functions described herein; and (c) circuits, such as, for example, a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation even if the software or firmware is not physically present. This definition of 'circuitry' applies to all uses of this term herein, including in any claims. As a further example, as used herein, the term 'circuitry' also includes an implementation comprising one or more processors and/or portion(s) thereof and accompanying software and/or firmware. As another example, the term 'circuitry' as used herein also includes, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, other network device, and/or other computing device.
[0026] A terminal apparatus, such as a user equipment (UE), may be connected to a network access point, such as a base station, node B, evolved node B (eNB), router, or the like. The access point may comprise an access point for a cellular network, such as a Long Term Evolution (LTE) cellular network, Long Term Evolution Advanced (LTE-A) network, or the like. The terminal apparatus may receive a message from the access point or other network entity indicating that a handover, such as an intra-cell handover is to be performed and that one or more security keys used to facilitate secure communication between the terminal apparatus and the network is to be changed. The one or more security keys may need to be changed on the basis of a fresh base key. However, the terminal apparatus may not have the fresh base key. In an instance in which the terminal apparatus does not have the fresh base key, the terminal apparatus may not be able to derive new security keys and, thus, if the terminal apparatus proceeds with the handover, errors in security key synchronization used in the network connection and/or a failure of cryptographic security may result. As such, various example embodiments disclosed herein may facilitate handling an unavailable key. More particularly, various example embodiments disclosed herein may facilitate handling an unavailable key in a situation where a handover is to be performed and at least one security key is to be changed, but a base key needed to derive a new security key is unavailable.
[0027] Referring now to FIG. 1, FIG. 1 illustrates a block diagram of a system 100 for handling an unavailable key according to an example embodiment. It will be appreciated that the system 100 as well as the illustrations in other figures are each provided as an example of one embodiment and should not be construed to narrow the scope or spirit of the disclosure in any way. In this regard, the scope of the disclosure encompasses many potential embodiments in addition to those illustrated and described herein. As such, while FIG. 1 illustrates one example of a configuration of a system for handling an unavailable key, numerous other configurations may also be used to implement embodiments of the present invention.
[0028] The system of FIG. 1 represents a general block diagram of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-
UTRAN). However, it will be appreciated that E-UTRAN and LTE are merely examples of a network technology with which various example embodiments disclosed herein may be implemented. In this regard, various example embodiments may be implemented with other network technologies and, where reference is made herein to a specific network technology, elements thereof, and/or standards thereof, that reference is made for purposes of example and not by way of limitation. Accordingly, the system of FIG. 1 is provided merely by way of example and the terminal apparatus 102 as will be further described herein below is not limited to operation in the system of FIG. 1.
[0029] The system includes an E-UTRAN 76 which may include, among other things, a plurality of evolved node-Bs (eNBs) in communication with an evolved packet core (EPC) 78 which may include one or more mobility management entities (MMEs) 80 and one or more system architecture evolution (SAE) gateways. An MME 80 may serve as an access security management entity (ASME). One or more of the eNBs (including source evolved node-B 72 and target evolved node-B 74) may be in communication with the terminal apparatus 102. It will be appreciated that the eNB 72 and eNB 74 are provided for purposes of example access points that may be used in the system 100 in connection with various example embodiments. As such, reference to and illustration of an eNB in the description and figures is by way of illustration and not by way of example. Other types of access points, such as node Bs, base stations, routers, and/or the like may be substituted for an eNB in various example embodiments.
[0030] The eNBs may provide E-UTRA user plane and control plane (radio resource control (RRC)) protocol terminations for the terminal apparatus 102. The eNBs may provide functionality hosting for such functions as radio resource management, radio bearer control, radio admission control, connection mobility control, dynamic allocation of resources to a terminal apparatus 102 in both uplink and downlink, selection of an MME 80 responsive to terminal apparatus attachment, Internet Protocol (IP) header compression and encryption, scheduling of paging and broadcast information, routing of data, measurement and measurement reporting for configuration mobility, and/or the like.
[0031] The MME 80 may host functions such as distribution of messages to respective evolved node-Bs, security control, idle state mobility control, system architecture evolution (SAE) bearer control, ciphering and integrity protection of non-access stratum (NAS) signaling, and the like. Although referred to herein as an "MME" in conformance with the E-UTRAN standard, it will be appreciated that embodiments of are not limited to operation in accordance with the E-UTRAN standard and that the MME 80 may also be entities operable with other networking standards. In this regard, the MME 80 may, for example, be alternatively embodied as a serving General Packet Radio Service (GPRS) support node (SGSN). In an example embodiment, the EPC 78 may provide connection to a network, such as the Internet.
[0032] In accordance with various example embodiments, an access point, such as the source eNB 72 and/or the target eNB 74 may comprise a processor and/or other hardware configured to carry out various functions of the access point. Such functions may be, for example, associated with stored instructions (e.g., instructions stored on a computer readable storage medium of the access point), which when executed by the processor carry out the corresponding functions associated with the instructions.
[0033] An access point, such as the source eNB 72 may be configured to may determine whether to request a handover with another access point, such as the target eNB 74. This determination may, for example, be based on measurement reports received from the terminal apparatus 102. In this regard, for example, if measurement reports received at the source eNB 72 indicate the presence of a condition for which a handover is desirable (e.g., low signal strength), the source eNB 72 may send a handover request to the target eNB 74. An encryption key, which may be used to facilitate communication with the terminal apparatus 102, may be included with the handover request. In this regard, an access point, such as the target eNB 74, may be configured to utilize encryption keys received from another network device, such as the source eNB 72 or an MME 80, to communicate with a terminal apparatus 102 and/or to use parameters received from another network device to derive or otherwise calculate encryption keys to use in communications with a terminal apparatus 102.
[0034] An access point, such as the source eNB 72, may further be configured to exchange messages related to a handover with a terminal apparatus 102. In this regard, an access point may be configured to send a message triggering a handover of the terminal apparatus 102 to another access point, such as to the target eNB 74, to a terminal apparatus 102. The message may comprise a handover command, a connection reconfiguration message, a radio resource control connection reconfiguration
(R CConnectionReconfiguration) message, and/or the like. The access point may, for example, be configured to send such a message in response to a handover decision made based at least in part on measurement reports received from the terminal apparatus 102, a radio link failure, and/or the like.
[0035] A terminal apparatus 102 may be configured to connect to a network by establishing a connection with an access point (e.g., with a source eNB 72, target eNB 74, and/or the like). In this regard, the terminal apparatus 102 may be configured to establish a radio resource control (R C) connection with an access point.
[0036] A terminal apparatus 102 may be embodied as any computing device, such as, for example, a desktop computer, laptop computer, mobile terminal, mobile computer, mobile phone, mobile communication device, game device, digital camera/camcorder, audio/video player, television device, radio receiver, digital video recorder, positioning device, wrist watch, portable digital assistant (PDA), any combination thereof, and/or the like. In an example embodiment, a terminal apparatus 102 may be embodied as a mobile terminal, such as that illustrated in FIG. 2
[0037] In this regard, FIG. 2 illustrates a block diagram of a mobile terminal 10 representative of one embodiment of a terminal apparatus 102. It should be understood, however, that the mobile terminal 10 illustrated and hereinafter described is merely illustrative of one type of terminal apparatus 102 that may implement and/or benefit from various embodiments and, therefore, should not be taken to limit the scope of the disclosure. While several embodiments of the electronic device are illustrated and will be hereinafter described for purposes of example, other types of electronic devices, such as mobile telephones, mobile computers, portable digital assistants (PDAs), pagers, laptop computers, desktop computers, gaming devices, televisions, and other types of electronic systems, may employ various embodiments of the invention.
[0038] As shown, the mobile terminal 10 may include an antenna 12 (or multiple antennas 12) in communication with a transmitter 14 and a receiver 16. The mobile terminal 10 may also include a processor 20 configured to provide signals to and receive signals from the transmitter and receiver, respectively. The processor 20 may, for example, be embodied as various means including circuitry, one or more microprocessors with accompanying digital signal processor(s), one or more processor(s) without an accompanying digital signal processor, one or more coprocessors, one or more multi-core processors, one or more controllers, processing circuitry, one or more computers, various other processing elements including integrated circuits such as, for example, an ASIC (application specific integrated circuit) or FPGA (field programmable gate array), or some combination thereof. Accordingly, although illustrated in FIG. 2 as a single processor, in some embodiments the processor 20 comprises a plurality of processors. These signals sent and received by the processor 20 may include signaling information in accordance with an air interface standard of an applicable cellular system, and/or any number of different wireline or wireless networking techniques, comprising but not limited to Wi-Fi, wireless local access network (WLA ) techniques such as Institute of Electrical and Electronics Engineers (IEEE) 802.11, 802.16, and/or the like. In addition, these signals may include speech data, user generated data, user requested data, and/or the like. In this regard, the mobile terminal may be capable of operating with one or more air interface standards, communication protocols, modulation types, access types, and/or the like. More particularly, the mobile terminal may be capable of operating in accordance with various first generation (1G), second generation (2G), 2.5G, third-generation (3G) communication protocols, fourth-generation (4G) communication protocols, Internet Protocol Multimedia Subsystem (IMS) communication protocols (for example, session initiation protocol (SIP)), and/or the like. For example, the mobile terminal may be capable of operating in accordance with 2G wireless communication protocols IS- 136 (Time Division Multiple Access (TDM A)), Global System for Mobile communications (GSM), IS-95 (Code Division Multiple Access (CDMA)), and/or the like. Also, for example, the mobile terminal may be capable of operating in accordance with 2.5G wireless communication protocols General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), and/or the like. Further, for example, the mobile terminal may be capable of operating in accordance with 3G wireless communication protocols such as Universal Mobile Telecommunications System (UMTS), Code Division Multiple Access 2000 (CDMA2000), Wideband Code Division Multiple Access (WCDMA), Time Division- Synchronous Code Division Multiple Access (TD-SCDMA), and/or the like. The mobile terminal may be additionally capable of operating in accordance with 3.9G wireless communication protocols such as Long Term Evolution (LTE) or Evolved Universal Terrestrial Radio Access Network (E-UTRAN) and/or the like. Additionally, for example, the mobile terminal may be capable of operating in accordance with fourth-generation (4G) wireless communication protocols and/or the like as well as similar wireless
communication protocols that may be developed in the future.
[0039] Some Narrow-band Advanced Mobile Phone System (NAMPS), as well as Total Access Communication System (TACS), mobile terminals may also benefit from embodiments of this invention, as should dual or higher mode phones (for example, digital/analog or TDMA/CDMA/analog phones). Additionally, the mobile terminal 10 may be capable of operating according to Wi-Fi or Worldwide Interoperability for
Microwave Access (WiMAX) protocols.
[0040] It is understood that the processor 20 may comprise circuitry for implementing audio/video and logic functions of the mobile terminal 10. For example, the processor 20 may comprise a digital signal processor device, a microprocessor device, an analog-to- digital converter, a digital-to-analog converter, and/or the like. Control and signal processing functions of the mobile terminal may be allocated between these devices according to their respective capabilities. The processor may additionally comprise an internal voice coder (VC) 20a, an internal data modem (DM) 20b, and/or the like. Further, the processor may comprise functionality to operate one or more software programs, which may be stored in memory. For example, the processor 20 may be capable of operating a connectivity program, such as a web browser. The connectivity program may allow the mobile terminal 10 to transmit and receive web content, such as location-based content, according to a protocol, such as Wireless Application Protocol (WAP), hypertext transfer protocol (HTTP), and/or the like. The mobile terminal 10 may be capable of using a Transmission Control Protocol/Internet Protocol (TCP/IP) to transmit and receive web content across the internet or other networks.
[0041] The mobile terminal 10 may also comprise a user interface including, for example, an earphone or speaker 24, a ringer 22, a microphone 26, a display 28, a user input interface, and/or the like, which may be operationally coupled to the processor 20. In this regard, the processor 20 may comprise user interface circuitry configured to control at least some functions of one or more elements of the user interface, such as, for example, the speaker 24, the ringer 22, the microphone 26, the display 28, and/or the like. The processor 20 and/or user interface circuitry comprising the processor 20 may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (for example, software and/or firmware) stored on a memory accessible to the processor 20 (for example, volatile memory 40, non-volatile memory 42, and/or the like). Although not shown, the mobile terminal may comprise a battery for powering various circuits related to the mobile terminal, for example, a circuit to provide mechanical vibration as a detectable output. The user input interface may comprise devices allowing the mobile terminal to receive data, such as a keypad 30, a touch display (not shown), a joystick (not shown), and/or other input device. In embodiments including a keypad, the keypad may comprise numeric (0-9) and related keys (#, *), and/or other keys for operating the mobile terminal.
[0042] As shown in FIG. 2, the mobile terminal 10 may also include one or more means for sharing and/or obtaining data. For example, the mobile terminal may comprise a short-range radio frequency (RF) transceiver and/or interrogator 64 so data may be shared with and/or obtained from electronic devices in accordance with RF techniques. The mobile terminal may comprise other short-range transceivers, such as, for example, an infrared (IR) transceiver 66, a Bluetooth™ (BT) transceiver 68 operating using
Bluetooth™ brand wireless technology developed by the Bluetooth™ Special Interest Group, a wireless universal serial bus (USB) transceiver 70 and/or the like. The
Bluetooth™ transceiver 68 may be capable of operating according to ultra-low power Bluetooth™ technology (for example, Wibree™) radio standards. In this regard, the mobile terminal 10 and, in particular, the short-range transceiver may be capable of transmitting data to and/or receiving data from electronic devices within a proximity of the mobile terminal, such as within 10 meters, for example. Although not shown, the mobile terminal may be capable of transmitting and/or receiving data from electronic devices according to various wireless networking techniques, including Wi-Fi, WLAN techniques such as IEEE 802.11 techniques, IEEE 802.15 techniques, IEEE 802.16 techniques, and/or the like.
[0043] The mobile terminal 10 may comprise memory, such as a subscriber identity module (SIM) 38, a removable user identity module (R-UIM), and/or the like, which may store information elements related to a mobile subscriber. In addition to the SIM, the mobile terminal may comprise other removable and/or fixed memory. The mobile terminal 10 may include volatile memory 40 and/or non- volatile memory 42. For example, volatile memory 40 may include Random Access Memory (RAM) including dynamic and/or static RAM, on-chip or off-chip cache memory, and/or the like. Non-volatile memory 42, which may be embedded and/or removable, may include, for example, readonly memory, flash memory, magnetic storage devices (for example, hard disks, floppy disk drives, magnetic tape, etc.), optical disc drives and/or media, non- volatile random access memory (NVRAM), and/or the like. Like volatile memory 40 non-volatile memory 42 may include a cache area for temporary storage of data. The memories may store one or more software programs, instructions, pieces of information, data, and/or the like which may be used by the mobile terminal for performing functions of the mobile terminal. For example, the memories may comprise an identifier, such as an international mobile equipment identification (IMEI) code, capable of uniquely identifying the mobile terminal 10.
[0044] Referring now to FIG. 3, FIG. 3 illustrates a block diagram of a terminal apparatus 102 according to an example embodiment. In the example embodiment, the terminal apparatus 102 includes various means for performing the various functions herein described. These means may comprise one or more of a processor 110, memory 112, communication interface 1 14, user interface 1 16, or connection management circuitry 1 18. The means of the terminal apparatus 102 as described herein may be embodied as, for example, circuitry, hardware elements (e.g., a suitably programmed processor,
combinational logic circuit, and/or the like), a computer program product comprising computer-readable program instructions (e.g., software or firmware) stored on a computer- readable medium (for example memory 1 12) that is executable by a suitably configured processing device (e.g., the processor 1 10), or some combination thereof.
[0045] In some example embodiments, one or more of the means illustrated in FIG. 3 may be embodied as a chip or chip set. In other words, the terminal apparatus 102 may comprise one or more physical packages (for example, chips) including materials, components and/or wires on a structural assembly (for example, a baseboard). The structural assembly may provide physical strength, conservation of size, and/or limitation of electrical interaction for component circuitry included thereon. In this regard, the processor 1 10, memory 1 12, communication interface 1 14, user interface 1 16, and/or connection management circuitry 1 18 may be embodied as a chip or chip set. The terminal apparatus 102 may therefore, in some example embodiments, be configured to implement embodiments of the present invention on a single chip or as a single "system on a chip." As another example, in some example embodiments, the terminal apparatus 102 may comprise component(s) configured to implement embodiments of the present invention on a single chip or as a single "system on a chip." As such, in some cases, a chip or chipset may constitute means for performing one or more operations for providing the
functionalities described herein and/or for enabling user interface navigation with respect to the functionalities and/or services described herein.
[0046] The processor 1 10 may, for example, be embodied as various means including one or more microprocessors with accompanying digital signal processor(s), one or more processor(s) without an accompanying digital signal processor, one or more coprocessors, one or more multi-core processors, one or more controllers, processing circuitry, one or more computers, various other processing elements including integrated circuits such as, for example, an ASIC (application specific integrated circuit) or FPGA (field
programmable gate array), one or more other types of hardware processors, or some combination thereof. Accordingly, although illustrated in FIG. 3 as a single processor, in some embodiments the processor 1 10 comprises a plurality of processors. The plurality of processors may be in operative communication with each other and may be collectively configured to perform one or more functionalities of the terminal apparatus 102 as described herein. In embodiments wherein the terminal apparatus 102 is embodied as a mobile terminal 10, the processor 110 may be embodied as or comprise the processor 20. In some example embodiments, the processor 110 is configured to execute instructions stored in the memory 112 or otherwise accessible to the processor 110. These instructions, when executed by the processor 110, may cause the terminal apparatus 102 to perform one or more of the functionalities of the terminal apparatus 102 as described herein. As such, whether configured by hardware or software methods, or by a combination thereof, the processor 110 may comprise an entity capable of performing operations according to embodiments of the present invention while configured accordingly. Thus, for example, when the processor 110 is embodied as an ASIC, FPGA or the like, the processor 110 may comprise specifically configured hardware for conducting one or more operations described herein. Alternatively, as another example, when the processor 110 is embodied as an executor of instructions, such as may be stored in the memory 112, the instructions may specifically configure the processor 110 (e.g., a hardware processor) to perform one or more algorithms and operations described herein.
[0047] The memory 112 may comprise, for example, volatile memory, non- volatile memory, or some combination thereof. In this regard, the memory 112 may comprise a non-transitory computer-readable storage medium. Although illustrated in FIG. 3 as a single memory, the memory 112 may comprise a plurality of memories. The plurality of memories may be embodied on a single computing device or may be distributed across a plurality of computing devices collectively configured to function as the terminal apparatus 102. In various example embodiments, the memory 112 may comprise a hard disk, random access memory, cache memory, flash memory, a compact disc read only memory (CD-ROM), digital versatile disc read only memory (DVD-ROM), an optical disc, circuitry configured to store information, or some combination thereof. In embodiments wherein the terminal apparatus 102 is embodied as a mobile terminal 10, the memory 112 may comprise the volatile memory 40 and/or the non-volatile memory 42. The memory 112 may be configured to store information, data, applications, instructions, or the like for enabling the terminal apparatus 102 to carry out various functions in accordance with various example embodiments. For example, in some example embodiments, the memory
112 is configured to buffer input data for processing by the processor 110. Additionally or alternatively, the memory 112 may be configured to store program instructions for execution by the processor 110. The memory 112 may store information in the form of static and/or dynamic information. This stored information may be stored and/or used by the connection management circuitry 118 during the course of performing its
functionalities.
[0048] The communication interface 114 may be embodied as any device or means embodied in circuitry, hardware, a computer program product comprising computer readable program instructions stored on a computer readable medium (for example, the memory 112) and executed by a processing device (for example, the processor 110), or a combination thereof that is configured to receive and/or transmit data from/to another computing device. In an example embodiment, the communication interface 114 is at least partially embodied as or otherwise controlled by the processor 110. In this regard, the communication interface 114 may be in communication with the processor 110, such as via a bus. The communication interface 114 may include, for example, an antenna, a transmitter, a receiver, a transceiver and/or supporting hardware or software for enabling communications with one or more remote computing devices. The communication interface 114 may be configured to receive and/or transmit data using any protocol that may be used for communications between computing devices. In this regard, the communication interface 114 may be configured to receive and/or transmit data using any protocol that may be used for transmission of data over a wireless network, wireline network, some combination thereof, or the like by which the terminal apparatus 102 and one or more computing devices or computing resources may be in communication. As an example, the communication interface 114 may be configured to enable radio
communications between the terminal apparatus 102 and the E-UTRAN 76 (e.g., with the source eNB 72 and/or target eNB 74). The communication interface 114 may additionally be in communication with the memory 112, user interface 116, and/or connection management circuitry 118, such as via a bus.
[0049] The user interface 116 may be in communication with the processor 110 to receive an indication of a user input and/or to provide an audible, visual, mechanical, or other output to a user. As such, the user interface 116 may include, for example, a keyboard, a mouse, a joystick, a display, a touch screen display, a microphone, a speaker, and/or other input/output mechanisms. In embodiments wherein the user interface 116 comprises a touch screen display, the user interface 116 may additionally be configured to detect and/or receive an indication of a touch gesture or other input to the touch screen display. The user interface 116 may be in communication with the memory 112, communication interface 114, and/or connection management circuitry 118, such as via a bus. [0050] The connection management circuitry 118 may be embodied as various means, such as circuitry, hardware, a computer program product comprising computer readable program instructions stored on a computer readable medium (for example, the memory 112) and executed by a processing device (for example, the processor 110), or some combination thereof and, in some embodiments, is embodied as or otherwise controlled by the processor 110. In embodiments wherein the connection management circuitry 118 is embodied separately from the processor 110, the connection management circuitry 118 may be in communication with the processor 110. The connection management circuitry 118 may further be in communication with one or more of the memory 112,
communication interface 114, or user interface 116, such as via a bus.
[0051] In some example embodiments, the connection management circuitry 118 is configured to receive a message sent by an access point, such as an eNB of the E-UTRA 76. The message may, for example, comprise a connection reconfiguration message, such as an RRCConnectionReconfiguration message. The connection management circuitry 118 may be configured to determine the contents of one or more fields of the received message. As an example, the connection management circuitry 118 may be configured to determine whether the received message includes a field indicating that a handover, such as an intra-cell handover, is to be performed. In embodiments wherein the received message comprises an RRCConnectionReconfiguration message, the
RRCConnectionReconfiguration message may comprise a mobilityControUnfo field, which may indicate that an intra-cell handover is to be performed. As a further example, the connection management circuitry 118 may be configured to determine whether the received message includes a field indicating that one or more security keys is to be changed (e.g., one or more new security keys is to be derived) for use in conjunction with and/or subsequent to the handover. In embodiments wherein the received message comprises an RRCConnectionReconfiguration message, the
RRCConnectionReconfiguration message may comprise a keyChangelndicator field. If the keyChangelndicator field has a value set to TRUE, the connection management circuitry 118 may determine that one or more security keys is to be changed.
[0052] In some example embodiments, the one or more security keys to be changed may be changed through derivation from a base key. The base key may, for example, comprise a key established or otherwise shared with an access security management entity
(ASME), such as the MME 80. In this regard, the base key may, for example, comprise the key KASME- A fresh base key, which may comprise a base key that has not been used to derive one or more existing security keys, may be needed to derive the one or more security keys to be changed. In embodiments wherein the base key comprises KASME, a fresh base key may comprise a fresh KASME resulting from a previous successful non access stratum (NAS) security mode control (SMC) procedure. In this regard, the fresh KASME may be used to derive a new IQNB in an instance in which a security key is to be changed in response to a handover.
[0053] Accordingly, an instance in which the connection management circuitry 118 determines that a received message comprises an indication that a handover (e.g., an intra- cell handover) is to be performed and an indication that a security key is to be changed on the basis of a fresh base key, the connection management circuitry 118 may determine whether the fresh base key is available. In this regard, the fresh base key may not be available in an instance in which the fresh base key was not obtained, was corrupted, or is missing. If no base key is available or if only a base key that has already been used to derive a security key is available, the connection management circuitry 118 may determine that a fresh base key is not available. In an instance in which the connection management circuitry 118 determines that a fresh base key is not available, the connection management circuitry 118 may be configured to handle a received message comprising an indication that a handover is to be performed and an indication that a security key is to be changed as an exception.
[0054] In some example embodiments, the connection management circuitry 118 may be configured to handle a received message as an exception by initiating a connection re- establishment procedure responsive to a determination that a fresh base key is not available. As an example, the connection management circuitry 118 may be configured to initiate a connection re-establishment procedure by causing a connection reestablishment request to be sent to a network access point (e.g., the source eNB 72, target eNB 74, or the like). The connection reestablishment request may, for example, comprise a radio resource control connection reestablishment request (R CConnectionReestablishmentRequest) message. The connection management circuitry 1 18 may further revert back to a configuration (e.g., a security context) used in the source cell (e.g., in the source eNB 72).
[0055] Referring now to FIG. 4, a signaling diagram is illustrated of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key. While FIG. 4 illustrates signals exchanged in accordance with a radio access network operating in accordance with E-UTRAN standards, it will be appreciated that this example is provided by way of example and not by way of limitation. Accordingly, similar signals may be exchanged in accordance with other standards. As illustrated in FIG. 4 by the state 400, the terminal apparatus 102 does not have a fresh KASME- At operation 410, the terminal apparatus may receive an
RRCConnectionReconfiguration message sent by the E-UTRAN 76 (e.g., by an eNB of the E-UTRAN 76). The connection management circuitry 118 may determine at operation 410 that the RRCConnectionReconfiguration message includes a mobilityControUnfo field indicating that an intra-cell handover is to be performed and a securityConfigHO field with a keyChangelndicator value set to TRUE. Responsive to this determination, the connection management circuitry 118 may determine whether a fresh KASME is available. As a fresh KASME is unavailable, the connection management circuitry 118 may further handle the received RRCConnectionReconfiguration message as an exception by initiating a connection re-establishment procedure. In this regard, the connection management circuitry 118 may cause an RRCConnectionReestablishmentRequest message to be sent to the E-UTRAN 76, at operation 420. In some embodiments, the connection management circuitry 118 may further start a timer (e.g., the timer T304) at operation 410 in response to receipt of the RRCConnectionReconfiguration message. The value of this timer may be specified by a parameter included in the RRCConnectionReconfiguration message. The connection management circuitry 118 may stop this timer (e.g., prior to expiry of the timer) at operation 420.
[0056] In some example embodiments, the connection management circuitry 118 may be configured to handle a received message as an exception by releasing a connection with a network access point (e.g., the source eNB 72, target eNB 74, or the like). Releasing the connection may comprise releasing a radio resource control (RRC) connection. In this regard, releasing the connection may comprise causing the terminal apparatus 102 to leave a resource control connected (RRC Connected) state. Release of the RRC connection may, for example, be requested by upper layers.
[0057] Referring now to FIG. 5, a signaling diagram is illustrated of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key. While FIG. 5 illustrates signals exchanged in accordance with a radio access network operating in accordance with E-UTRAN standards, it will be appreciated that this example is provided by way of example and not by way of limitation.
Accordingly, similar signals may be exchanged in accordance with other standards. As illustrated in FIG. 5 by the state 500, the terminal apparatus 102 does not have a fresh
KASME- At operation 510, the terminal apparatus may receive an RRCConnectionReconfiguration message sent by the E-UTRAN 76 (e.g., by an eNB of the E-UTRAN 76). The connection management circuitry 118 may determine at operation 510 that the RRCConnectionReconfiguration message includes a mobilityControUnfo field indicating that an intra-cell handover is to be performed and a securityConfigHO field with a keyChangelndicator value set to TRUE. Responsive to this determination, the connection management circuitry 118 may determine whether a fresh KASME is available. As a fresh KASME is unavailable, the connection management circuitry 118 may further handle the received RRCConnectionReconfiguration message as an exception by releasing the RRC connection, at operation 520. In some embodiments, the connection management circuitry 118 may further start a timer (e.g., the timer T304) at operation 510 in response to receipt of the RRCConnectionReconfiguration message. The value of this timer may be specified by a parameter included in the RRCConnectionReconfiguration message. The connection management circuitry 118 may stop this timer (e.g., prior to expiry of the timer) at operation 520.
[0058] In some example embodiments, the connection management circuitry 118 may be configured to handle a received message as an exception by ignoring the received message. In this regard, the connection management circuitry 118 may determine that the received message includes a field set to a value that is not comprehended. In this regard, the received message may comprise a field indicating that a security key is to be changed (e.g., a keyChangelndicator field having a value set to TRUE). However, in an instance in which a fresh base key is unavailable, the value of this field may be regarded by the connection management circuitry 118 as not being comprehended because a fresh base key to change the security key is unavailable. Accordingly, the connection management circuitry 118 may ignore a received message having a field with a value that is not comprehended.
[0059] Referring now to FIG. 6, a signaling diagram is illustrated of signals that may be exchanged between network entities according to an example embodiment for handling an unavailable key. While FIG. 6 illustrates signals exchanged in accordance with a radio access network operating in accordance with E-UTRAN standards, it will be appreciated that this example is provided by way of example and not by way of limitation.
Accordingly, similar signals may be exchanged in accordance with other standards. As illustrated in FIG. 6 by the state 600, the terminal apparatus 102 does not have a fresh KASME- At operation 610, the terminal apparatus may receive an
RRCConnectionReconfiguration message sent by the E-UTRAN 76 (e.g., by an eNB of the E-UTRA 76). The connection management circuitry 1 18 may determine at operation 610 that the RRCConnectionReconfiguration message includes a mobilityControlInfo field indicating that an intra-cell handover is to be performed and a securityConfigHO field with a keyChangelndicator value set to TRUE. Responsive to this determination, the connection management circuitry 1 18 may determine whether a fresh KASME is available. As a fresh KASME is unavailable, the connection management circuitry 1 18 may further determine that the value of the KeyChangelndicator field is not comprehended. As such, the connection management circuitry 1 18 may handle the received
RRCConnectionReconfiguration message as an exception ignoring the
RRCConnectionReconfiguration message, at operation 620.
[0060] FIG. 7 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment. The operations illustrated in and described with respect to FIG. 7 may, for example, be performed by, with the assistance of, and/or under the control of one or more of the processor 1 10, memory 1 12, communication interface 1 14, or connection management circuitry 1 18. Operation 700 may comprise determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The processor 1 10, memory 1 12, communication interface 1 14, and/or connection management circuitry 1 18 may, for example, provide means for performing operation 700. Operation 710 may comprise determining that the fresh base key is not available. The processor 1 10, memory 1 12, and/or connection management circuitry 1 18 may, for example, provide means for performing operation 710. Operation 720 may comprise handling the received message as an exception in response to the determination that the fresh base key is not available. The processor 1 10, memory 1 12, communication interface 1 14, and/or connection management circuitry 1 18 may, for example, provide means for performing operation 720.
[0061] FIG. 8 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment. The operations illustrated in and described with respect to FIG. 8 may, for example, be performed by, with the assistance of, and/or under the control of one or more of the processor 1 10, memory 1 12, communication interface 1 14, or connection management circuitry 1 18. Operation 800 may comprise determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The processor 1 10, memory 1 12, communication interface 1 14, and/or connection management circuitry 118 may, for example, provide means for performing operation 800. Operation 810 may comprise determining that the fresh base key is not available. The processor 110, memory 112, and/or connection management circuitry 118 may, for example, provide means for performing operation 810. Operation 820 may comprise handling the received message as an exception by initiating a connection re-establishment procedure in response to the determination that the fresh base key is not available. The processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 820.
[0062] FIG. 9 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment. The operations illustrated in and described with respect to FIG. 9 may, for example, be performed by, with the assistance of, and/or under the control of one or more of the processor 110, memory 112, communication interface 114, or connection management circuitry 118. Operation 900 may comprise determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 900. Operation 910 may comprise determining that the fresh base key is not available. The processor 110, memory 112, and/or connection management circuitry 118 may, for example, provide means for performing operation 910. Operation 920 may comprise handling the received message as an exception by releasing a connection with a network access point in response to the determination that the fresh base key is not available. The processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 920.
[0063] FIG. 10 illustrates a flowchart according to an example method for handling an unavailable key according to an example embodiment. The operations illustrated in and described with respect to FIG. 10 may, for example, be performed by, with the assistance of, and/or under the control of one or more of the processor 110, memory 112,
communication interface 114, or connection management circuitry 118. Operation 1000 may comprise determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 1000. Operation 1010 may comprise determining that the fresh base key is not available. The processor 110, memory 112, and/or connection management circuitry 118 may, for example, provide means for performing operation 1010. Operation 1020 may comprise handling the received message as an exception by ignoring the received message in response to the determination that the fresh base key is not available. The processor 110, memory 112, communication interface 114, and/or connection management circuitry 118 may, for example, provide means for performing operation 1020.
[0064] FIGs. 7-10 each illustrate a flowchart of a system, method, and computer program product according to an example embodiment. It will be understood that each block of the flowcharts, and combinations of blocks in the flowcharts, may be
implemented by various means, such as hardware and/or a computer program product comprising one or more computer-readable mediums having computer readable program instructions stored thereon. For example, one or more of the procedures described herein may be embodied by computer program instructions of a computer program product. In this regard, the computer program product(s) which embody the procedures described herein may be stored by one or more memory devices of a mobile terminal, server, or other computing device (for example, in the memory 112) and executed by a processor in the computing device (for example, by the processor 110). In some embodiments, the computer program instructions comprising the computer program product(s) which embody the procedures described above may be stored by memory devices of a plurality of computing devices. As will be appreciated, any such computer program product may be loaded onto a computer or other programmable apparatus (for example, a terminal apparatus 102) to produce a machine, such that the computer program product including the instructions which execute on the computer or other programmable apparatus creates means for implementing the functions specified in the flowchart block(s). Further, the computer program product may comprise one or more computer-readable memories on which the computer program instructions may be stored such that the one or more computer-readable memories can direct a computer or other programmable apparatus to function in a particular manner, such that the computer program product comprises an article of manufacture which implements the function specified in the flowchart block(s). The computer program instructions of one or more computer program products may also be loaded onto a computer or other programmable apparatus (for example, a terminal apparatus 102) to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus implement the functions specified in the flowchart block(s).
[0065] Accordingly, blocks of the flowcharts support combinations of means for performing the specified functions. It will also be understood that one or more blocks of the flowcharts, and combinations of blocks in the flowcharts, may be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer program product(s).
[0066] The above described functions may be carried out in many ways. For example, any suitable means for carrying out each of the functions described above may be employed to carry out embodiments of the invention. In one embodiment, a suitably configured processor (for example, the processor 110) may provide all or a portion of the elements. In another embodiment, all or a portion of the elements may be configured by and operate under control of a computer program product. The computer program product for performing the methods of an example embodiment of the invention includes a computer-readable storage medium (for example, the memory 112), such as the nonvolatile storage medium, and computer-readable program code portions, such as a series of computer instructions, embodied in the computer-readable storage medium.
[0067] In an example embodiment, a method is provided, which comprises
determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The method of this example embodiment further comprises determining that the fresh base key is not available. The method of this example embodiment additionally comprises handling the received message as an exception in response to the determination that the fresh base key is not available.
[0068] Handling the received message as an exception may comprise a processor handling the received message as an exception. As another example, handling the received message as an exception may comprise connection management circuitry handling the received message as an exception.
[0069] The message may comprise a connection reconfiguration message, such as a radio resource control connection reconfiguration (R CConnectionReconfiguration) message. The handover may comprise a handover in a cellular network. The cellular network may comprise a Long Term Evolution (LTE) network. The indication that the handover is to be performed may comprise an indication that an intra-cell handover is to be performed. The indication that the intra-cell handover is to be performed may comprise a mobilityControlInfo field indicating that an intra-cell handover is to be performed. The indication that the security key is to be changed may comprise a security configuration field including a key change indicator set to TRUE.
[0070] The fresh base key may comprise a key established with an access security management entity (AS ME). The access security management entity may comprise a mobility management entity (MME). The fresh base key may comprise the key KASME- The security key indicated to be changed may comprise IQNB and/or one or more keys at least indirectly derived using KASME-
[0071] Handling the received message as an exception may comprise initiating a connection re-establishment procedure responsive to the determination that the fresh base key is not available. Initiating the connection re-establishment procedure may comprise causing a connection reestablishment request to be sent to a network access point. The network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRAN). The connection reestablishment request may comprise a radio resource control connection reestablishment request (RRCConnectionReestablishmentRequest) message.
[0072] Handling the received message as an exception may comprise releasing a connection with a network access point. Releasing the connection may comprise releasing a radio resource control connection. In this regard, releasing the connection may comprise leaving a radio resource control connected (RRC CONNECTED) state. The network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRAN).
[0073] Handling the received message as an exception may comprise ignoring the received message. In this regard, the method may further comprise determining responsive to the determination that the fresh base key is not available that the received message comprises a field having a value that is not comprehended. Ignoring the received message may be performed responsive to the determination that the received message comprises a field having a value that is not comprehended.
[0074] In another example embodiment, an apparatus comprising at least one processor and at least one memory storing computer program code is provided. The at least one memory and stored computer program code are configured, with the at least one processor, to cause the apparatus of this example embodiment to at least determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The at least one memory and stored computer program code are configured, with the at least one processor, to further cause the apparatus of this example embodiment to determine that the fresh base key is not available. The at least one memory and stored computer program code are configured, with the at least one processor, to additionally cause the apparatus of this example embodiment to handle the received message as an exception in response to the determination that the fresh base key is not available.
[0075] The message may comprise a connection reconfiguration message, such as a radio resource control connection reconfiguration (RRCConnectionReconfiguration) message. The handover may comprise a handover in a cellular network. The cellular network may comprise a Long Term Evolution (LTE) network. The indication that the handover is to be performed may comprise an indication that an intra-cell handover is to be performed. The indication that the intra-cell handover is to be performed may comprise a mobilityControUnfo field indicating that an intra-cell handover is to be performed. The indication that the security key is to be changed may comprise a security configuration field including a key change indicator set to TRUE.
[0076] The fresh base key may comprise a key established with an access security management entity (AS ME). The access security management entity may comprise a mobility management entity (MME). The fresh base key may comprise the key KASME- The security key indicated to be changed may comprise IQNB and/or one or more keys at least indirectly derived using KASME-
[0077] The at least one memory and stored computer program code may be configured, with the at least one processor, to cause the apparatus of this example embodiment to handle the received message as an exception at least in part by initiating a connection re- establishment procedure responsive to the determination that the fresh base key is not available. Initiating the connection re-establishment procedure may comprise causing a connection reestablishment request to be sent to a network access point. The network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRAN). The connection reestablishment request may comprise a radio resource control connection reestablishment request (RRCConnectionReestablishmentRequest) message.
[0078] The at least one memory and stored computer program code may be configured, with the at least one processor, to cause the apparatus of this example embodiment to handle the received message as an exception at least in part by releasing a connection with a network access point. Releasing the connection may comprise releasing a radio resource control connection. In this regard, releasing the connection may comprise leaving a radio resource control connected (R C CO NECTED) state. The network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (E-UTRA ).
[0079] The at least one memory and stored computer program code may be configured, with the at least one processor, to cause the apparatus of this example embodiment to handle the received message as an exception at least in part by ignoring the received message. In this regard, the at least one memory and stored computer program code may be configured, with the at least one processor, to cause the apparatus of this example embodiment to determine responsive to the determination that the fresh base key is not available that the received message comprises a field having a value that is not
comprehended.
[0080] In another example embodiment, a computer program product is provided. The computer program product of this example embodiment includes at least one non- transitory computer-readable storage medium having computer-readable program instructions stored therein. The program instructions of this example embodiment comprise program instructions configured to determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The program instructions of this example embodiment further comprise program instructions configured to determine that the fresh base key is not available. The program instructions of this example embodiment additionally comprise program instructions configured to handle the received message as an exception in response to the determination that the fresh base key is not available.
[0081] The message may comprise a connection reconfiguration message, such as a radio resource control connection reconfiguration (RRCConnectionReconfiguration) message. The handover may comprise a handover in a cellular network. The cellular network may comprise a Long Term Evolution (LTE) network. The indication that the handover is to be performed may comprise an indication that an intra-cell handover is to be performed. The indication that the intra-cell handover is to be performed may comprise a mobilityControUnfo field indicating that an intra-cell handover is to be performed. The indication that the security key is to be changed may comprise a security configuration field including a key change indicator set to TRUE.
[0082] The fresh base key may comprise a key established with an access security management entity (AS ME). The access security management entity may comprise a mobility management entity (MME). The fresh base key may comprise the key KASME- The security key indicated to be changed may comprise IQNB and/or one or more keys at least indirectly derived using KASME-
[0083] The program instructions configured to handle the received message as an exception may comprise program instructions configured to initiate a connection re- establishment procedure responsive to the determination that the fresh base key is not available. The program instructions configured to initiate the connection re-establishment procedure may comprise program instructions configured to cause a connection
reestablishment request to be sent to a network access point. The network access point may comprise an evolved node B (eNB) of an evolved universal mobile
telecommunications system (UMTS) terrestrial radio access network (E-UTRA ). The connection reestablishment request may comprise a radio resource control connection reestablishment request (RRCConnectionReestablishmentRequest) message.
[0084] The program instructions configured to handle the received message as an exception may comprise program instructions configured to release a connection with a network access point. The program instructions configured to release the connection may comprise program instructions configured to release a radio resource control connection. In this regard, the program instructions configured to release the radio resource control connection may comprise program instructions configured to leave a radio resource control connected (RRC CO NECTED) state. The network access point may comprise an evolved node B (eNB) of an evolved universal mobile telecommunications system
(UMTS) terrestrial radio access network (E-UTRAN).
[0085] The program instructions configured to handle the received message as an exception may comprise program instructions configured to ignore the received message. In this regard, the program instructions may further comprise program instructions configured to determine responsive to the determination that the fresh base key is not available that the received message comprises a field having a value that is not
comprehended. The program instructions configured to ignore the received message may comprise program instructions configured to ignore the received message responsive to the determination that the received message comprises a field having a value that is not comprehended.
[0086] In another example embodiment, an apparatus is provided, which comprises means for determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key. The apparatus of this example embodiment further comprises means for determining that the fresh base key is not available. The apparatus of this example embodiment additionally comprises means for handling the received message as an exception in response to the determination that the fresh base key is not available.
[0087] Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the embodiments of the invention are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the invention. Moreover, although the foregoing descriptions and the associated drawings describe example embodiments in the context of certain example combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the scope of the invention. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated within the scope of the invention.
Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims

Claims:
1. A method , comprising:
determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key;
determining that the fresh base key is not available, and handling the received message as an exception in response to the determination that the fresh base key is not available.
2. A method according to claim 1, wherein handling the received message as an exception comprises either a processor handling the received message as an exception or connection management circuitry handling the received message as an exception.
3. A method according to claim 1, wherein the message comprises a connection reconfiguration message.
4. A method according to claim 3, wherein the connection reconfiguration message comprises a radio resource control connection reconfiguration,
R CConnectionReconfiguration, message.
5. A method according to claim 1, wherein the handover comprises a handover in a cellular network.
6. A method according to claim 5, wherein the cellular network comprises a long term evolution, LTE, network.
7. A method according to claim 5, wherein the indication that handover is to be performed comprises an indication that an intra-cell handover is to be performed.
8. A method according to claim 7, wherein the indication that the intra-cell handover is to be performed comprises a mobilityControUnfo field indicating that an intra-cell handover is to be performed.
9. A method according to claim 1 , wherein the indication that the security key is to be changed comprises a security configuration field including a key change indicator set to TRUE.
10. A method according to claim 1, wherein the fresh base key comprises a key established with an access security management entity, AS ME.
11. A method according to claim 10, wherein the access security management entity comprises a mobility management entity, MME.
12. A method according to claim 1, wherein the fresh base key comprises a key KASME-
13. A method according to claim 12, wherein the security key indicated to be changed comprises IQNB and/or one or more keys at least indirectly derived using KASME-
14. A method according to claim 1, wherein handling the received message as an exception comprises initiating a connection re-establishment procedure responsive to the determination that the fresh base key is not available.
15. A method according to claim 14, wherein initiating the connection re-establishment procedure comprises causing a connection reestablishment request to be sent to a network access point.
16. A method according to claim 15, wherein the connection reestablishment request comprises a radio resource control connection reestablishment request,
RRCConnectionReestablishmentRequest, message.
17. A method according to claim 1, wherein handling the received message as an exception comprises releasing a connection with a network access point.
18. A method according to claim 17, wherein releasing the connection comprises releasing a radio resource control connection.
19. A method according to claim 18, wherein releasing the connection comprises leaving a radio resource control connected, RRC CONNECTED, state.
20. A method according to claim 1, wherein handling the received message as an exception comprises ignoring the received message.
21. A method according to claim 20, wherein the method further comprises
determining responsive to the determination that the fresh base key is not available that the received message comprises a field having a value that is not comprehended.
22. A method according to claim 21, wherein ignoring the received message is performed responsive to the determination that the received message comprises a field having a value that is not comprehended.
23. An apparatus comprising at least one processor and at least one memory storing computer program code, the at least one memory and stored computer program code are configured, with the at least one processor, to cause the apparatus to at least:
determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key;
determine that the fresh base key is not available;
handle the received message as an exception in response to the
determination that the fresh base key is not available.
24. An apparatus according to claim 23, wherein the fresh base key comprises a key established with an access security management entity.
25. An apparatus according to claim 24, wherein the access security management entity comprises a mobility management entity.
26. An apparatus according to claim 23, wherein the fresh base key comprises key KASME, and the security key indicated to be changed comprises IQNB and/or one or more keys at least indirectly derived using KASME-
27. An apparatus according to claim 23, wherein handling the received message as an exception comprises initiating a connection re-establishment procedure responsive to the determination that the fresh base key is not available.
28. An apparatus according to claim 27, wherein initiating the connection re- establishment procedure comprises causing a connection reestablishment request to be sent to a network access point.
29. An apparatus according to claim 23, wherein handling the received message as an exception comprises releasing a connection with a network access point.
30. An apparatus according to claim 29, wherein releasing the connection comprises releasing a radio resource control connection.
31. An apparatus according to claim 23, wherein handling the received message as an exception comprises ignoring the received message.
32. A computer program product comprising at least one non-transitory computer-readable storage medium having computer-readable program instructions stored therein, the program instructions comprising program instructions configured to cause an apparatus to at least:
determine that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key;
determine that the fresh base key is not available, and
handle the received message as an exception in response to the
determination that the fresh base key is not available.
33. A computer program product according to claim 32, wherein handling the received message as an exception comprises initiating a connection re-establishment procedure responsive to the determination that the fresh base key is not available.
34. A computer program product according to claim 32, wherein handling the received message as an exception comprises releasing a connection with a network access point.
35. A computer program product according to claim 32, wherein handling the received message as an exception comprises ignoring the received message.
36. An apparatus, comprising:
means for determining that a received message comprises an indication that a handover is to be performed and an indication that a security key is to be changed on the basis of a fresh base key;
means for determining that the fresh base key is not available, and means for handling the received message as an exception in response to the determination that the fresh base key is not available.
PCT/FI2011/050701 2010-09-09 2011-08-09 Methods and apparatuses for handling an unavailable key WO2012032218A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US38125110P 2010-09-09 2010-09-09
US61/381,251 2010-09-09

Publications (1)

Publication Number Publication Date
WO2012032218A1 true WO2012032218A1 (en) 2012-03-15

Family

ID=45810162

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2011/050701 WO2012032218A1 (en) 2010-09-09 2011-08-09 Methods and apparatuses for handling an unavailable key

Country Status (3)

Country Link
AR (1) AR082832A1 (en)
TW (1) TW201230830A (en)
WO (1) WO2012032218A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040228491A1 (en) * 2003-05-13 2004-11-18 Chih-Hsiang Wu Ciphering activation during an inter-rat handover procedure
EP2071885A2 (en) * 2007-12-05 2009-06-17 Innovative Sonic Limited Method of handling security key change and related communication device
EP2197147A1 (en) * 2007-09-28 2010-06-16 Huawei Technologies Co., Ltd. The method and device for updating the key in the active state
EP2203008A1 (en) * 2008-12-29 2010-06-30 HTC Corporation Method of handling security configuration in wireless communications system and related communication device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040228491A1 (en) * 2003-05-13 2004-11-18 Chih-Hsiang Wu Ciphering activation during an inter-rat handover procedure
EP2197147A1 (en) * 2007-09-28 2010-06-16 Huawei Technologies Co., Ltd. The method and device for updating the key in the active state
EP2071885A2 (en) * 2007-12-05 2009-06-17 Innovative Sonic Limited Method of handling security key change and related communication device
EP2203008A1 (en) * 2008-12-29 2010-06-30 HTC Corporation Method of handling security configuration in wireless communications system and related communication device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Technical Specification; 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification (Release 9)", 3GPP TS 36.331 V9.3.0 (2010-06), 18 June 2010 (2010-06-18), Retrieved from the Internet <URL:ftp://ftp.3gpp.org/specs/html-info/36331.htm> [retrieved on 20111105] *
"Technical Specification; 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3GPP System Architecture Evolution (SAE); Security architecture (Release 9)", 3GPP TS 33.401 V9.4.0 (2010-06), 18 June 2010 (2010-06-18), Retrieved from the Internet <URL:http://www.3gpp.org/ftp/specs/html-info/33401.htm> [retrieved on 20111103] *

Also Published As

Publication number Publication date
TW201230830A (en) 2012-07-16
AR082832A1 (en) 2013-01-09

Similar Documents

Publication Publication Date Title
US11304248B2 (en) Transmission method and device for sidelink information and communication system
US11805455B2 (en) Cell global identifier, CGI, reporting of enhanced LTE (eLTE) cells
RU2643505C2 (en) Method for ue capabilities obtaining, terminal device and base station
EP3173810B1 (en) Method and apparatus for supporting positioning measurements
EP2732674B1 (en) Method and apparatus for distributing sensor data
JP5654684B2 (en) Inter-frequency measurement
JP6169057B2 (en) User device and offset report method
US20240214879A1 (en) Physical cell identity collision resolution for wireless networks
US20140024357A1 (en) Method and apparatus for cell type specific measurement configuration
JP2020535732A (en) Management of security context and implementation of key derivation in handover of wireless communication system
US8515431B2 (en) Methods and apparatuses for facilitating triggered mobility
JP2019521594A5 (en)
CN112534852A (en) Use of integrity protection in a wireless communication network
CN104205947A (en) Method and apparatus for managing carriers
CN108781379A (en) Method, device, mobile management entity and base station for identifying UAV
CN103458458B (en) Carrier wave measuring method and device
WO2024165342A1 (en) Conditional reconfiguration handling during musim operation in wireless networks
WO2023185756A1 (en) Information transmission methods and apparatus, terminal and network-side device
CN108432284B (en) Method for triggering independent radio resource control reports
CN114143701B9 (en) Device search and registration method, network side device
WO2022233909A1 (en) Bi-layered mobility for ng-ran
WO2012032218A1 (en) Methods and apparatuses for handling an unavailable key
CN107079489A (en) Method for transmitting signals and the network equipment
US20250203437A1 (en) Handling of mismatch between ue and network early measurment handling capabilities during early measurement reporting
US20250301412A1 (en) Network assisted pl-rs maintenance for inter cell scenarios

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11823118

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11823118

Country of ref document: EP

Kind code of ref document: A1