摘要:
A method of enabling key handling for a handover between different domains may include determining whether an indication of a potential key mismatch is present responsive to an attempt to conduct a handover between a first domain and a second domain, and defining validity of a most recent key set used for ciphering communication between a mobile terminal and a network device based on a result of the determining.
摘要:
A method, apparatus and computer program product are provided to facilitate security in response to a handover from an initial network to a subsequent network, such as a handover between a packet-switched network and a circuit-switched network. The method, apparatus and computer program product may provide at least one security key for use in the subsequent network following handover from the initial network such that communications conducted via the subsequent network, including initial communications, may be secure. In order to provide at least one security key for use in the subsequent network, at least one security key of the initial network may be identified along with a nonce in response to a determination that a handover is to be made. The at least one security key of the subsequent network may then be determined based upon the at least one security key of the initial network and the nonce.
摘要:
A method of enabling key handling for a handover between different domains may include determining whether an indication of a potential key mismatch is present responsive to an attempt to conduct a handover between a first domain and a second domain, and defining validity of a most recent key set used for ciphering communication between a mobile terminal and a network device based on a result of the determining.
摘要:
A method, apparatus and computer program product are provided to facilitate security in response to a handover from an initial network to a subsequent network, such as a handover between a packet-switched network and a circuit-switched network. The method, apparatus and computer program product may provide at least one security key for use in the subsequent network following handover from the initial network such that communications conducted via the subsequent network, including initial communications, may be secure. In order to provide at least one security key for use in the subsequent network, at least one security key of the initial network may be identified along with a nonce in response to a determination that a handover is to be made. The at least one security key of the subsequent network may then be determined based upon the at least one security key of the initial network and the nonce.
摘要:
An apparatus detects, over multiple transfers, an amount of data transferred to/from a network per transfer and/or an amount of time elapsed between transfers; and based at least on the detecting, the apparatus decides whether to trigger an early release from the network in order to at least reduce power consumption in the apparatus, where the decision is made in consideration of at least one configuration aspect of the network. In specific embodiments, the decision is made in consideration of availability and/or suitability of the power saving feature and configuration support in the network, which may be re-detected periodically; re-detection occurs after cell mobility, and/or network access element mobility and/or network control element mobility. An amount of useful data transfer per length of each connection for recent transfers can trigger the decision. Deactivating an early release may be based only on an amount of time that elapses between the transfers.
摘要:
An apparatus detects, over multiple transfers, an amount of data transferred to/from a network per transfer and/or an amount of time elapsed between transfers; and based at least on the detecting, the apparatus decides whether to trigger an early release from the network in order to at least reduce power consumption in the apparatus, where the decision is made in consideration of at least one configuration aspect of the network. In specific embodiments, the decision is made in consideration of availability and/or suitability of the power saving feature and configuration support in the network, which may be re-detected periodically; re-detection occurs after cell mobility, and/or network access element mobility and/or network control element mobility. An amount of useful data transfer per length of each connection for recent transfers can trigger the decision. Deactivating an early release may be based only on an amount of time that elapses between the transfers.