18401670. CORE NETWORK INDICATION AND SECURITY HANDLING FOR HANDOVER simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

CORE NETWORK INDICATION AND SECURITY HANDLING FOR HANDOVER

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Patrik Rugeland of Bromma (SE)

Lian Araujo of Solna (SE)

Oscar Ohlsson of Bromma (SE)

Malik Wahaj Arshad of Stockholm (SE)

CORE NETWORK INDICATION AND SECURITY HANDLING FOR HANDOVER - A simplified explanation of the abstract

This abstract first appeared for US patent application 18401670 titled 'CORE NETWORK INDICATION AND SECURITY HANDLING FOR HANDOVER

Simplified Explanation

The method described in the abstract involves a handover procedure in a mobile network where a connection is established with a source network node, and then a handover is performed towards a target network node using security parameters based on the core network associated with the target network node.

  • Explanation of the patent/innovation:

- Establish connection with source network node - Receive RRC message with information element indicating second core network - Apply security parameters based on second core network - Perform handover towards target network node using applied security parameters - Provide indication in RRC connection reconfiguration procedure to indicate core network of target network node to UE

  • Potential applications of this technology:

- Mobile network handover procedures - Inter-system handovers in cellular networks

  • Problems solved by this technology:

- Efficient handover procedures between different core networks - Secure handover process without additional signaling

  • Benefits of this technology:

- Improved network connectivity during handovers - Enhanced security during inter-system handovers

  • Potential commercial applications of this technology:

- Telecommunications companies - Mobile network equipment manufacturers

  • Possible prior art:

- Handover procedures in cellular networks - Security protocols for mobile network handovers

  1. Unanswered questions:
    1. How does this method impact the overall performance of the mobile network?

The method aims to improve handover procedures in mobile networks, but it is not clear how it affects the network's overall performance in terms of speed, reliability, and efficiency.

    1. Are there any potential drawbacks or limitations to implementing this handover procedure?

While the method enhances security and efficiency in handover procedures, there may be challenges or limitations in its implementation that are not addressed in the abstract.


Original Abstract Submitted

A method for a handover procedure comprises establishing a connection with a source network node of a first core network; receiving a radio resource control (RRC) message including an information element, wherein the information element indicates a second core network associated with a target network node; applying security parameters based on the second core network indicated in the information element; and performing a handover toward the target network node using the applied security parameters. The method provides an indication in RRC connection reconfiguration procedure to indicate the UE the core network of the target network node, so that the UE may recognize that this is an inter-system handover and apply corresponding security parameters for performing the handover without additional signaling.