US 11,838,760 B2
Security handling for RRC resume from inactive state
Gunnar Mildh, Sollentuna (SE); and Icaro L. J. da Silva, Solna (SE)
Assigned to TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), Stockholm (SE)
Filed by TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), Stockholm (SE)
Filed on Nov. 2, 2021, as Appl. No. 17/517,446.
Application 17/517,446 is a continuation of application No. 16/721,410, filed on Dec. 19, 2019, granted, now 11,166,164.
Application 16/721,410 is a continuation of application No. 16/386,077, filed on Apr. 16, 2019, granted, now 10,555,168, issued on Feb. 4, 2020.
Claims priority of provisional application 62/657,967, filed on Apr. 16, 2018.
Prior Publication US 2022/0060902 A1, Feb. 24, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 12/60 (2021.01); H04L 9/40 (2022.01); H04W 12/037 (2021.01); H04W 12/041 (2021.01); H04W 76/18 (2018.01); H04W 76/19 (2018.01); H04W 76/27 (2018.01); H04W 80/08 (2009.01); H04W 92/10 (2009.01); H04W 12/04 (2021.01)
CPC H04W 12/60 (2021.01) [H04L 63/102 (2013.01); H04W 12/037 (2021.01); H04W 12/041 (2021.01); H04W 76/18 (2018.02); H04W 76/19 (2018.02); H04W 76/27 (2018.02); H04W 80/08 (2013.01); H04W 92/10 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method of updating a security context, performed by a wireless device operative in a wireless communication network employing a Radio Resource Control (RRC) protocol, wherein the wireless device in RRCCONNECTED state receives from the network an RRCSuspend message including a security update parameter, and in response to the RRC Suspend message enters an RRC INACTIVE state and stores a first security context, the method comprising, upon attempting to transition to an RRCCONNECTED state:
generating a second security context from the security update parameter received in the RRC Suspend message;
sending to the network an RRC Resume Request message;
receiving a response from the network to the RRC Resume Request message; and
performing an action based on the response wherein:
when the response is an RRC Reject message, the action is storing the second security context and utilizing the second security context until confirmed by the network; and
when the response is an RRC message different than the RRC Reject message, the action is discarding the first security context and using the second security context for further communication.