-
公开(公告)号:US20240056506A1
公开(公告)日:2024-02-15
申请号:US18447645
申请日:2023-08-10
Applicant: Nokia Technologies Oy
Inventor: Sireesha BOMMISETTY , Mallikarjunudu MAKHAM , Topuri BRAHMAIAH , Saurabh KHARE
IPC: H04L67/303
CPC classification number: H04L67/303
Abstract: Embodiments of the present disclosure relate to network function validation. the first network device receives, from a second network device, a request including profile information of the second network device to be validated, obtain registered profile information of the second network device from a third network device maintaining a blockchain ledger storing the registered profile information, and validate the profile information of the second network device based on the registered profile information. The validation can be implemented via blockchain, and OAuth is not need, and for pure consumer can be authorized, in additioinformation for validation is sufficient.
-
公开(公告)号:US20240064512A1
公开(公告)日:2024-02-22
申请号:US18337794
申请日:2023-06-20
Applicant: Nokia Technologies Oy
Inventor: Sireesha BOMMISETTY , Mallikarjunudu MAKHAM , Topuri BRAHMAIAH , Saurabh KHARE , Anja JERICHOW
IPC: H04W12/082 , H04W12/069
CPC classification number: H04W12/082 , H04W12/069 , H04W84/042
Abstract: Embodiments of the present disclosure relate to usage of access token in service based architecture. According to one aspect of the present disclosure, a first network device transmits an access token request to a second network device, and receives, from the second network device, an access token associated with a first count value, the first count value indicating the number of times the access token is allowed to be used. The first network device transmits, to a third network device, a service request with the access token; and receives, from the third network device, a service response determined based on the first count value and the access token. In this way, usage of an access token may be restricted and chance of misuse of the access token may be reduced.
-
公开(公告)号:US20240422533A1
公开(公告)日:2024-12-19
申请号:US18671659
申请日:2024-05-22
Applicant: Nokia Technologies Oy
Inventor: German PEINADO GOMEZ , Topuri BRAHMAIAH , Mallikarjunudu MAKHAM , Sireesha BOMMISETTY , Saurabh KHARE , Ranganathan MAVUREDDI DHANASEKARAN , Chaitanya AGGARWAL
IPC: H04W12/03 , H04W12/041
Abstract: There is provided an apparatus, method, and computer program for causing an apparatus for a user equipment to perform: encrypting a digital asset using a first key to form an encrypted digital asset; providing the encrypted digital asset and an index for the encrypted digital asset to a first network function; and providing an identification of the encrypted digital asset to a first entity.
-
公开(公告)号:US20240121111A1
公开(公告)日:2024-04-11
申请号:US18483234
申请日:2023-10-09
Applicant: Nokia Technologies Oy
Inventor: German Peinado GOMEZ , Topuri BRAHMAIAH , Mallikarjunudu MAKHAM , Sireesha BOMMISETTY , Saurabh KHARE
IPC: H04L9/32
CPC classification number: H04L9/3268 , H04L9/3242
Abstract: According to an example aspect of the present invention, there is provided a method comprising storing, by an apparatus, one or more key information elements, wherein each key information element comprises a stored key identifier and a stored key or a certificate, receiving by the apparatus, from a requesting network function, a request message comprising a first field and a second field, wherein the first field comprises an instance identity of the requesting network function and the second field comprises the instance identity of the requesting network function, and the first field is unprotected and the second field is protected with the key or the certificate, determining by the apparatus the key or the certificate used for protecting the second field, validating by the apparatus the second field using the key or the certificate, validating by the apparatus the request message when the instance identity of the requesting network function in the first field matches with the instance identity of the requesting network function in the validated second field and transmitting by the apparatus, after a successful validation of the second field and the request message, a response to the requesting network function.
-
-
-