Exception handling in cellular authentication

    公开(公告)号:US10390224B2

    公开(公告)日:2019-08-20

    申请号:US15311054

    申请日:2014-05-20

    Abstract: A cellular terminal transmits a request that requires authentication procedure triggering to a cellular network and responsively receives from the cellular network an authentication request message with an indication of a selected cryptographic algorithm from a group of a plurality of cryptographic algorithms. The cellular terminal attempts to decode the authentication request message to a decoded authentication request according to the selected cryptographic algorithm and based on a shared secret known by the cellular terminal and a network operator of the cellular terminal. The cellular terminal produces a determination whether the attempt was successful and the cellular terminal supports the selected cryptographic algorithm in authenticating to the cellular network; and in case the determination is positive, based on the decoded authentication request, the shared secret and the selected cryptographic algorithm, produces and encrypts an authentication response message and transmits the authentication response message to the cellular network; and in case the determination is not positive, produces and sends to the cellular network a failure report.

    User equipment credential system
    22.
    发明授权

    公开(公告)号:US10284555B2

    公开(公告)日:2019-05-07

    申请号:US15282995

    申请日:2016-09-30

    Abstract: A user equipment in a communications system, the user equipment comprising: a memory arranged to store at least one identifier associated with the user equipment; a transceiver arranged to communicate with a node in the communication system, wherein the transceiver is arranged to receive the at least one identifier from the node in the communications system, wherein the at least one identifier is used by the user equipment to authenticate the user equipment to at least one further node in the communications system.

    Adaptive security indicator for wireless devices

    公开(公告)号:US10200865B2

    公开(公告)日:2019-02-05

    申请号:US14914531

    申请日:2013-08-29

    Abstract: Methods and apparatus, including computer program products, are provided for adaptive security. In one aspect there is provided a method. The method may include receiving, at a user equipment, at least one policy update representative of a rule defining at least one of a security level and an operation allowed to be performed at the security level; monitoring a configuration of the user equipment to determine whether the configuration of the user equipment violates the at least one policy update; and adapting, based on the monitoring, at least one of a security indicator at the user equipment and the operation at the user equipment. Related apparatus, systems, methods, and articles are also described.

    Service authorization for indirect communication in a communication system

    公开(公告)号:US11844014B2

    公开(公告)日:2023-12-12

    申请号:US17264105

    申请日:2020-04-03

    Abstract: A service request is received at a first service communication proxy element, wherein the service request is received from a service consumer and is a request to access at least one service of a service producer. The first service communication proxy element determines at least one target service producer based on the service request. The first service communication proxy element sends an access token request to an authorization entity, wherein the access token request is generated based on the determining step. The first service communication proxy element receives an access token response from the authorization entity, wherein the access token response comprises an access token. The first service communication proxy element may then send a service request with the access token to a second service communication proxy element, wherein the second service communication proxy element is associated with the target service producer. The method may apply to roaming and non-roaming scenarios.

    Method and device of generating a key for device-to-device communication between a first user equipment and a second user equipment

    公开(公告)号:US10341859B2

    公开(公告)日:2019-07-02

    申请号:US14433725

    申请日:2012-10-19

    Abstract: A method of generating a key for D2D communication between a first user equipment and a second user equipment in a first radio access node is disclosed. In an exemplary embodiment, the method may comprise: receiving a request for D2D key generation from the first user equipment which is served by the first radio access node; determining whether the second user equipment is served by the first radio access node; when it is determined that the second user equipment is served by the first radio access node, generating a first random number and a second random number; generating a first D2D key based on the first random number and a second D2D key based on the second random number; sending the first D2D key and the second random number to the second user equipment; and sending the second D2D key and the first random number to the first user equipment; and when it is determined that the second user equipment is not served by the first radio access node, determining a second radio access node which serves the second user equipment; generating a first random number; generating a first D2D key based on the first random number; sending the first D2D key to the second radio access node; receiving a second D2D key from the second radio access node; and sending the second D2D key and the first random number to the first user equipment.

    Method and apparatus for access credential provisioning

    公开(公告)号:US09843569B2

    公开(公告)日:2017-12-12

    申请号:US14813241

    申请日:2015-07-30

    Abstract: A method and apparatus are provided for access credential provisioning. A method may include receiving, at a first mobile apparatus, information about a second mobile apparatus. The first mobile apparatus may be provisioned with network access credential information to be transferred from the first mobile apparatus to the second mobile apparatus. The method may further include causing the information about the second mobile apparatus to be provided to a provisioning apparatus for the network. The method may additionally include receiving authorization form the provisioning apparatus to transfer the network access credential information from the first mobile apparatus to the second mobile apparatus. The method may also include, in response to receipt of the authorization, causing the network access credential information to be provided to the second mobile apparatus. A corresponding apparatus is also provided.

    Diameter Edge Agent Attack Detection
    30.
    发明申请

    公开(公告)号:US20170295201A1

    公开(公告)日:2017-10-12

    申请号:US15441363

    申请日:2017-02-24

    CPC classification number: H04L63/1466 H04L63/1458 H04W12/12

    Abstract: In accordance with the example embodiments of the Invention there is at least a method and apparatus to detect that at least one message received from another network device of a communication network is in response to a prior message using a spoofed source address; based on the detecting, mirror the at least one message; and send to the another network device the mirrored at least one message to cause the another network device to filter out the at least one message in response to the prior message using the spoofed address. Further, there is at least a method and apparatus to receive from a network node signaling associated with at least one message; based on the signaling, detect that the at least one message is in response to a prior message using a spoofed source address; and based on the detecting, filter out the at least one message in response to the prior message using the spoofed source address.

Patent Agency Ranking