Granular network access control and methods thereof

    公开(公告)号:US09661525B2

    公开(公告)日:2017-05-23

    申请号:US14382997

    申请日:2013-03-20

    Abstract: A method and system that enhances the existing access barring mechanism as specified in the current 3GPP specification is disclosed. The method disclosed provides enhancing the access barring mechanism to accommodate application level barring between the User equipment (UE) and the network. The method disclosed individually restricts or permits access of network to every requesting application on the UE, based on granular category of the application and priority levels of the application within the granular category. The method disclosed also specifies handling of back-off timers; reject cause values and Access Point Name (APN) configuration by Access Stratum (AS) and Non Access Stratum (NAS) layer to support application level barring of UEs using the enhanced access barring mechanism. The enhanced access barring mechanism enables providing service to applications independent of other barred applications or priorities. The method disclosed provides a mechanism for access control for connected mode UEs.

    Method and system for detecting cyber-attacks using network analytics

    公开(公告)号:US12200492B2

    公开(公告)日:2025-01-14

    申请号:US17672136

    申请日:2022-02-15

    Abstract: The disclosure relates to 5G or 6G communication systems for supporting higher data transmission rates.
    A method of detecting cyber-attacks using network analytics in a user equipment (UE) is provided. The method includes receiving, by a network data analytics function (NWDAF), a request for sharing analytics information associated with the UE from a consumer network function (NF), requesting the analytics information associated with the UE and causing the cyber-attack to at least one 5th generation core (5GC) network entity, receiving the analytics information associated with the UE and causing the cyber-attack from the at least one 5GC network entity, comparing an expected behavior of the UE with an actual behavior based on the analytics information provided by the at least one 5GC network entity, deriving analytics associated with the cyber-attack based on the analytics information and the comparison, and sending the analytics associated with the UE to the consumer NF.

    Method and system for authenticating application program interface (API) invokers

    公开(公告)号:US12177253B2

    公开(公告)日:2024-12-24

    申请号:US17703531

    申请日:2022-03-24

    Abstract: A method and system for authenticating application program interface (API) invokers using a common application program interface framework (CAPIF) is provided. The method includes establishing by a CAPIF core function (CCF) a secure Transport Layers Security (TLS) connection with at least one API invoker, on receiving a connection request from the at least one API invoker to access at least one service API on a CAPIF-2e interface. Further, the method includes determining by the CCF at least one security method to be used by the at least one API invoker for a CAPIF-2e interface security (C2eIS) of the at least one API invoker for accessing the at least one service API on a CAPIF-2e interface. The method further includes enabling the C2eIS by an API exposing function (AEF) the at least one API invoker based on the determined at least one security method.

    Method and system for selective protection of data exchanged between user equipment and network

    公开(公告)号:USRE49491E1

    公开(公告)日:2023-04-11

    申请号:US17368336

    申请日:2021-07-06

    Abstract: A method and system for providing selective protection of data exchanged between user equipment (UE) and network is disclosed. The selective protection is applied to a packet, a bearer or an access point name for secure exchange of data between the UE and the network. The network decides to apply selective protection based on configuration of network, configuration of UE, load in the network, battery power availability of UE, type of application running on UE. Further, the UE can request for selective protection based on the type of application running on UE and the battery level availability of the UE. The selective protection is either enabled or disabled dynamically by the network. Further, various mechanisms for applying selective protection for each bearer, each packet and each Access Point Name (APN) are disclosed. Additionally, the method for identifying a secured and a non secured bearer has also been disclosed.

Patent Agency Ranking