MITIGATION AGAINST ACCESS TOKEN THEFT ATTACK IN DIRECT AND INDIRECT COMMUNICATIONS IN SBA

    公开(公告)号:US20250062903A1

    公开(公告)日:2025-02-20

    申请号:US18802902

    申请日:2024-08-13

    Abstract: Various examples of embodiments described herein relate to methods and apparatuses for mitigation against access token theft attack in direct and indirect communications in SBA. One such example of an embodiment relates to a method that includes obtaining a first access token request from a network function service consumer, NFc, the first access token request comprising an authentication code of the NFc; authenticate the network function consumer, NFc, based on a check whether the authentication code is signed by the NFc; sending a second access token request to a network authorization entity or function, wherein the second access token request comprises the authentication code of the NFc and the second access token request further comprises a public key of the NFc or a hash of the public key of the NFc; based thereon, receiving an access token from the network authorization entity or function, wherein the access token comprises the public key of the NFc or a hash of the public key of the NFc; and sending a service request to a network function service provider, NFp, wherein the service request comprises the access token and the authentication code of the NFc.

    APPARATUS, METHODS, AND COMPUTER PROGRAMS
    4.
    发明公开

    公开(公告)号:US20230361989A1

    公开(公告)日:2023-11-09

    申请号:US18312627

    申请日:2023-05-05

    CPC classification number: H04L9/0822 H04L9/3213 G06F21/6209

    Abstract: There is provided a method, computer program, and an apparatus for a network function service consumer, that causes the apparatus to perform: retrieving, from a first repository function, protected sensitive data; retrieving, from a second network function, at least one encrypted key; decrypting the retrieved at least one encrypted key using a private key associated with the network function service consumer to obtain a respective at least one key; and performing at least one of: decryption of the protected sensitive data using the at least one key to obtain sensitive data or integrity protected sensitive data; or verification of the integrity of the protected sensitive data using the at least one key.

    VERIFICATION OF USER EQUIPMENT COMPLIANCE IN COMMUNICATION NETWORK ENVIRONMENT

    公开(公告)号:US20240292214A1

    公开(公告)日:2024-08-29

    申请号:US18588870

    申请日:2024-02-27

    CPC classification number: H04W12/06 H04W12/71

    Abstract: Techniques are disclosed for verifying user equipment compliance. For example, a method comprises computing, via user equipment, a secure identifier for the user equipment comprising an equipment identifier of the user equipment, and sending the secure identifier comprising the equipment identifier in a request message from the user equipment to a communication network to which the user equipment is attempting to connect. The communication network performs compliance verification for the user equipment based at least in part on the equipment identifier securely received from the user equipment.

    APPARATUS, METHOD, AND COMPUTER PROGRAM

    公开(公告)号:US20220337597A1

    公开(公告)日:2022-10-20

    申请号:US17716028

    申请日:2022-04-08

    Abstract: An apparatus comprises means for: causing information indicating a first security protocol profile of a first security protocol from a first security node of a first network to be sent from a first security node of a first network to a second security node of a second network, wherein the first security profile has one or more of: a modification policy; a data type policy; and a cipher suite; and causing the first security node to communicate with the second security node in accordance with the first security profile.

Patent Agency Ranking