Abstract
A method of and arrangement for detecting a manipulated or defect base station of a communication network is disclosed wherein a target base station having selected one or more algorithms on the basis of a prioritized algorithm list (PAL) and a UBE security capabilities (SCAP) reports UE SCAP related information to a core network node. The core network node having knowledge of the UE SCAP compares this information or parts of this information with the retrieved UE SCAP related information in order to be able to identify a manipulated or defect base station when a comparison fails to match.
Technology | Declaration Information | Specification Information | Explicitly Disclosed | Patent Type | |||||
---|---|---|---|---|---|---|---|---|---|
Declaration Date | Declaration Reference | Declaring Company | Specification Information | ||||||
4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member |
Specification Information
Specification Information
Technologies
Family Information
All Granted Patents In Patent Family : | ---- |
Publication No | Technology | Declaration Information | Specification Information | Explicitly Disclosed | Patent Type | |||||
---|---|---|---|---|---|---|---|---|---|---|
Declaration Date | Declaration Reference | Declaring Company | Specification Information | |||||||
WO2009120122A1 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | Yes | Basis Patent | ||||
WO2009120122A1 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | Yes | Basis Patent | ||||
WO2009120122A1 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | Yes | Basis Patent | ||||
AU2008353507A1 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
AU2008353507A1 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
AU2008353507A1 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
AU2008353507B2 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
AU2008353507B2 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
AU2008353507B2 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
CN102017681A | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
CN102017681A | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
CN102017681A | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
CN102017681B | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
CN102017681B | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
CN102017681B | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
EP2255560A1 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
EP2255560A1 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
EP2255560A1 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
EP2255560B1 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
EP2255560B1 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
EP2255560B1 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
US2011059736A1 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
US2011059736A1 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
US2011059736A1 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
US8620267B2 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
US8620267B2 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
US8620267B2 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
JP2011515984A | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
JP2011515984A | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
JP2011515984A | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
JP4965737B2 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
JP4965737B2 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
JP4965737B2 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
TW200948133A | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
TW200948133A | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
TW200948133A | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
TWI454160B | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
TWI454160B | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
TWI454160B | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
AR079772A1 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
AR079772A1 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
AR079772A1 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
BRPI0822423A2 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
BRPI0822423A2 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
BRPI0822423A2 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
CN104780540A | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
CN104780540A | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
CN104780540A | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
US2014038566A1 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
US2014038566A1 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
US2014038566A1 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
US8706086B2 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
US8706086B2 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
US8706086B2 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
US2014228003A1 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
US2014228003A1 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
US2014228003A1 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
DK2255560T3 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
DK2255560T3 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
DK2255560T3 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
ES2569501T3 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
ES2569501T3 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
ES2569501T3 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
HUE028290T2 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
HUE028290T2 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
HUE028290T2 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
AR098837A2 | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
AR098837A2 | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
AR098837A2 | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
CN104780540B | 4G,3G,2G | 06/04/2010 | ISLD-201005-004 | ERICSSON INC | No | Family Member | ||||
CN104780540B | 5G | 22/12/2017 | ISLD-201712-073 | ERICSSON INC | No | Family Member | ||||
CN104780540B | 5G | 28/02/2019 | ISLD-201902-030 | ERICSSON INC | No | Family Member | ||||
BRPI0822423B1 | ----- | ----- | ----- | ----- | ----- | ----- | ----- |
Publication No | Technology | Declaration Information | Specification Information | Explicitly Disclosed | Patent Type | Status | National Phase Entries | |||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Declaration Date | Declaration Reference | Declaring Company | Specification Information | |||||||||
----- | ----- | ----- | ----- | ----- |
S1
|
----- | ----- | ----- | ----- |
Technologies
Product
Use Cases
Services
Claim
1. A method performed by a target base station of a communication network for detecting a manipulated or defective status of a source base station in connection with a handover of a user equipment (UE), said method comprising:
receiving a prioritized algorithm list (PAL) from the network, said list listing algorithms allowed for use when communicating with said UE in order of priority;
receiving UE security capabilities (SCAP) related information from the source base station for the UE that is handed over between the source and target base stations;
selecting at least one algorithm having the highest priority according to the PAL out of the algorithms allowed for use when communicating with said UE in response to said UE SCAP related information; and
reporting the received UE SCAP related information to a core network node that has knowledge of the UE SCAP of said UE and that is configured to use the reported UE SCAP related information to detect whether the source base station has a manipulated or defective status;
wherein said PAL is a global PAL and is unique to said UE.
2. The method according to claim 1, further comprising distributing said global PAL to the source and target base stations from a network Operation & Maintenance system.
3. The method according to claim 1, further comprising distributing said global PAL to the source and target base stations via the core network node.
4. The method according to claim 1, further comprising distributing the UE unique PAL to the target base station via the source base station.
5. The method according to claim 1, wherein said reporting further comprises reporting the PAL to the core network.
6. A method performed by a core network node of a communication network for detection of a manipulated or defective status of a source base station in connection with a handover of a user equipment (UE) to a target base station, said method comprising:
receiving and storing a Prioritized Algorithm List (PAL) from the network, said list listing algorithms allowed for use when communicating with said UE in order of priority;
receiving and storing UE security capabilities (SCAP) from said UE;
receiving, from said target base station, UE SCAP related information of said UE, said UE SCAP related information having been reported from the source base station to said target base station previously during said handover; and
verifying the UE SCAP related information received from the target base station in order to detect a manipulated or defective status of the source base station by comparing at least part of said stored UE SCAP to the UE SCAP related information;
wherein said PAL is a global PAL and is unique to said UE.
7. The method according to claim 6, wherein the PAL is received at the core network node from a network operation and maintenance system (O&M).
8. The method according to claim 6, wherein the UE SCAP related information comprises the PAL.
9. The method according to claim 6, wherein the UE SCAP related information received from said target base station is piggy-backed on another message received from said target base station.
10. The method according to claim 9, wherein said other message is a path-switch request.
11. The method according to claim 6, wherein said receiving of UE SCAP related information from said target base station further comprises receiving an identity of the source base station.
12. The method according to claim 6, wherein said UE SCAP related information comprises a respective hash value of the PAL and/or UE SCAP of said UE.
13. A target base station of a communication network-for detecting a manipulated or defective status of a source base station in connection with a handover of a user equipment (UE), said target base station comprising:
receiving circuitry that is configured for receiving a prioritized algorithm list (PAL) from the network, said list listing algorithms allowed for use when communicating with said UE in order of priority and for receiving UE security capabilities (SCAP) related information from the source base station for the UE that is handed over between the two base stations;
selecting circuitry that is configured for selecting at least one algorithm from the PAL having the highest priority according to the PAL out of the algorithms allowed for use when communicating with said UE in response to said UE SCAP related information and that is supported by said base station; and
reporting circuitry that is configured for reporting, via a transmitting circuit, the received UE SCAP related information to a core network node that has knowledge of the UE SCAP of said UE and that is configured to use the reported UE SCAP related information to detect whether the source base station has a manipulated or defective status;
wherein said PAL is a global PAL and is unique to said UE.
14. The target base station according to claim 13, wherein the target base station comprises an enhanced node B (eNB).
15. A core network node of a communication network that is configured to detect a manipulated or defective status of a source base station in connection with a handover of a user equipment (UE) to a target base station, said core network node comprising:
receiving circuitry that is configured for receiving a Prioritized Algorithm List (PAL) from the network and storing said PAL, said list listing algorithms allowed for use when communicating with said UE in order of priority, for receiving UE security capabilities (SCAP) from said UE and for storing said UE SCAP;
receiving circuitry that is configured for receiving UE SCAP related information of said UE from said target base station, said UE SCAP having been reported from the source base station to said target base station previously during said handover; and
verifying circuitry that is configured for verifying the UE SCAP related information received from the target base station in order to detect whether the source base station has a manipulated or defective status by comparing at least part of said stored UE SCAP to the UE SCAP related information;
wherein said PAL is a global PAL and is unique to said UE.
16. The core network node according to claim 15, wherein said core network node is a Mobility Management Entity (MME).
Claim Chart | Technology | Creation Date | Download |
---|---|---|---|
Claim charts will soon be available!
|
To view claim charts you must become a Gold or Platinum Member.
Upgrade your subscriptionYou have reached the maximum number of patents which can be associated to your account per your subscription. If you wish to associate more patents
Please upgrade your subscription.Note:
The information in blue was extracted from the third parties (Standard Setting Organisation, Espacenet)
The information in grey was provided by the patent holder
The information in purple was extracted from the FrandAvenue
Explicitly disclosed patent:openly and comprehensibly describes all details of the invention in the patent document.
Implicitly disclosed patent:does not explicitly state certain aspects of the invention, but still allows for these to be inferred from the information provided.
Basis patent:The core patent in a family, outlining the fundamental invention from which related patents or applications originate.
Family member:related patents or applications that share a common priority or original filing.