TIA-1085-2006 IP-Based LCS Security Framework《基于IP的LCS安全框架》.pdf
《TIA-1085-2006 IP-Based LCS Security Framework《基于IP的LCS安全框架》.pdf》由会员分享,可在线阅读,更多相关《TIA-1085-2006 IP-Based LCS Security Framework《基于IP的LCS安全框架》.pdf(66页珍藏版)》请在麦多课文档分享上搜索。
1、 TIA-1085 May 2006 (r 04/2012) IP-Based LCS Security Framework NOTICE TIA Engineering Standards and Publications are designed to serve the public interest through eliminating misunderstandings between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assi
2、sting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publications shall not in any respect preclude any member or non-member of TIA from manufacturing or selling products not conforming to such Standards a
3、nd Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and Publications are adopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By
4、 such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the
5、responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. (From Project No. TIA-PN-1085-RF1, formulated under the cognizance of the TIA TR-45 Mobile (b) there is no assurance that the
6、Document will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or changed in the standards development or any editing process. The use or practice of contents of this Document may involve the use of intellectual propert
7、y rights (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IPR consisting of patents and published pending patent applications are claimed and called to TIAs attention, a statement from the holder thereof is
8、requested, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the scope or validity of any claims of IPR. TIA will neither be a party to discussions of any licensing terms or conditions, which are instead left to t
9、he parties involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warrant or represent that procedures or practices suggested or provided in the Manual have been complied with as respects the Document or its contents. I
10、f the Document contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, development or publication of standards (whether designated as a standard, specification, recommendation or otherwise), whether such reference consists o
11、f mandatory, alternate or optional elements (as defined in the TIA Engineering Manual, 4thedition) then (i) TIA disclaims any duty or obligation to search or investigate the records of any other SSO for IPR or letters of assurance relating to any such Normative Reference; (ii) TIAs policy of encoura
12、gement of voluntary disclosure (see Engineering Manual Section 6.5.1) of Essential Patent(s) and published pending patent applications shall apply; and (iii) Information as to claims of IPR in the records or publications of the other SSO shall not constitute identification to TIA of a claim of Essen
13、tial Patent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the contents of the Document. TIA does not certify, inspect, test or otherwise investigate products, designs or services or any claims of compliance with the contents of the Document. ALL WARRANT
14、IES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF THE CONTENTS, ITS FITNESS OR APPROPRIATENESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXP
15、RESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIES REGARDING THE CONTENTS COMPLIANCE WITH ANY APPLICABLE STATUTE, RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE CONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DO
16、CUMENT OR PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR INDIRECT, ARISING FROM OR RELATING TO ANY USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCL
17、UDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTA
18、L ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS. IP-Based LCS Security Framework TIA-1085 1 Table of Contents 1 1 Introduction and Scope.4 2 2 References 4 3 2.1 Normative References.4 4 2.2 Informative References.4 5 3 Definitio
19、ns and Abbreviations4 6 3.1 Definitions.4 7 3.2 Abbreviations6 8 4 Overview of LCS Security Framework (Informative)7 9 4.1 Introduction to LCS 7 10 4.2 Security Functional Architecture for IP-Based LCS.8 11 4.2.1 Mobile Station (Informative)8 12 4.2.2 LCS Network Entities (Informative) 8 13 4.3 Wire
20、less All-IP Architecture Reference Points (Informative) 9 14 4.4 Summary of Security Mechanisms .10 15 4.5 Introduction to the Transport Layer Security (TLS) Protocol.11 16 4.5.1 Call Flow When Initiating a New TLS Session12 17 4.5.2 Call Flow When Resuming a New TLS Session13 18 5 LCS Security Prot
21、ocols.14 19 5.1 LCS Provisioning Protocol .14 20 5.1.1 Provisioning LCS_ROOT_KEY 14 21 5.1.2 Deriving Keys for the S-SAFE, TLS Session-A and TLS-Session-B Protocols 15 22 5.2 Secure Store-And-Forward Encapsulation (S-SAFE) Protocol.16 23 5.2.1 Version-Independent Steps for Forming an S-SAFE Envelope
22、 .17 24 5.2.2 Version-Independent Steps for Processing an S-SAFE Envelope18 25 5.2.3 Version-Dependent Steps for the S-SAFE Protocol.19 26 5.2.3.1 LCS_S_SAFE_VERSION = 0x0119 27 5.2.3.1.1 LCS_S_SAFE_GOODIES Format19 28 5.2.3.1.2 Generating GOODIES (H-PS) 20 29 5.2.3.1.3 Version Dependent Steps for P
23、rocessing an S-SAFE Message.21 30 5.3 Operations Common to LCS TLS Sessions 22 31 5.3.1 Initiating a New TLS Session.24 32 5.3.1.1 ClientHello Message.24 33 5.3.1.2 Server Hello24 34 5.3.1.3 Void 25 35 5.3.1.4 Void 25 36 5.3.1.5 Void 25 37 5.3.1.6 ServerHelloDone 25 38 5.3.1.7 Void 25 39 5.3.1.8 Cli
24、entKeyExchange 25 40 5.3.1.8.1 Generating master_secret in the MS .25 41 5.3.1.9 Void 26 42 5.3.1.10 ChangeCipherSpec and Finished Messages (from the MS)26 43 5.3.1.10.1 Generation of MSs verify_data .26 44 5.3.1.10.2 ME response to Output from the UIM 27 45 5.3.1.11 ChangeCipherSpec and Finished Me
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- TIA10852006IPBASEDLCSSECURITYFRAMEWORK 基于 IP LCS 安全 框架 PDF

链接地址:http://www.mydoc123.com/p-1060052.html