METHODS AND APPARATUS FOR SUBSCRIPTION AUTHORIZATION ENHANCEMENT

    公开(公告)号:US20240129710A1

    公开(公告)日:2024-04-18

    申请号:US18352626

    申请日:2023-07-14

    CPC classification number: H04W8/20 H04W48/16 H04W84/042

    Abstract: Techniques for enhancing subscription authorization in a communications network are provided. For example, a method in a source network function service producer or an apparatus for a source network function service provider is disclosed. The method comprises: receiving a subscription request including access authorization information from a network function service consumer for a subscription to receive a notification upon occurrence of a specific event; verifying that the network function service consumer is authorized to create the subscription to the source network function service producer; storing subscription context and access authorization information granted for the subscription if the subscription request is authorized.

    ENCRYPTION IN 5G DATA REPOSITORY SERVICE
    23.
    发明公开

    公开(公告)号:US20230396997A1

    公开(公告)日:2023-12-07

    申请号:US18327387

    申请日:2023-06-01

    CPC classification number: H04W12/03 G06F21/6227 G06F21/602

    Abstract: Systems, methods, and software of performing a data repository service. In one embodiment, a data repository Network Function (NF) of a 5G core network is configured to receive a request from an NF service consumer for a service operation regarding storage of a record, and containing meta and/or one or more blocks of the record. The data repository NF is configured to apply encryption to one or more meta tags of the meta and/or to the blocks of the record based on one or more encryption indicators embedded in a meta schema defined for the meta, and to store the record with the one or more meta tags and/or the blocks in encrypted format according to the meta schema.

    HIERARCHICAL CONSENT IN A COMMUNICATION NETWORK

    公开(公告)号:US20230345247A1

    公开(公告)日:2023-10-26

    申请号:US18306147

    申请日:2023-04-24

    CPC classification number: H04W12/08 H04L63/20

    Abstract: Techniques for user consent in a communication network are disclosed. For example, a method comprises receiving, at a network entity of a communication network, a first level user consent for a first level data type for a first level purpose. The method further comprises applying, at the network entity, at least one hierarchical consent policy to the first level user consent to determine whether the first level user consent implies a second level user consent for a second level data type for a second level purpose.

    ENHANCED INTERCONNECTION BETWEEN CELLULAR COMMUNICATION NETWORKS

    公开(公告)号:US20230319569A1

    公开(公告)日:2023-10-05

    申请号:US18189457

    申请日:2023-03-24

    CPC classification number: H04W12/088 H04W84/042

    Abstract: According to an example aspect of the present disclosure, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus to perform at least one of: transmit to a second security edge protection proxy (SEPP) of a second public land mobile network (PLMN), in a control plane signaling procedure, addressing information of a first SEPP of a first PLMN, to be used by the second SEPP for forwarding messages from the second PLMN to the first PLMN and receive from the second SEPP of the second PLMN, in the control plane signaling procedure, addressing information of the second SEPP of the second PLMN, to be used by the first SEPP for forwarding messages from the first PLMN to the second PLMN.

    ENRICHED A-KID FOR AKMA AUTHENTICATION SERVICE

    公开(公告)号:US20230319561A1

    公开(公告)日:2023-10-05

    申请号:US18190910

    申请日:2023-03-27

    CPC classification number: H04W12/06 H04W12/0433 H04W12/041

    Abstract: Systems, methods, and software of performing an Authentication and Key Management for Applications (AKMA) authentication service. In one embodiment, an AKMA element (1200) handles an enriched AKMA Key Identifier (A-KID) (800) having an identifier format with a username (802) and a realm (804) separated by an @-symbol (806). The username includes a Routing Indicator (RID) (812), an AKMA Temporary UE Identifier (A-TID) (814), and at least one supplemental character (810) that distinguishes the RID from the A-TID in the username The AKMA element performs a function of the AKMA authentication service based on the enriched A-KID.

    ROGUE NETWORK FUNCTION RE-AUTHORIZATION IN A COMMUNICATION NETWORK

    公开(公告)号:US20230292131A1

    公开(公告)日:2023-09-14

    申请号:US18006248

    申请日:2021-07-14

    CPC classification number: H04W12/122 H04W12/06

    Abstract: Techniques for preventing rogue network functions in a communication network are provided. For example, a method comprises obtaining information identifying one or more network entities suspected of malicious activity operating within the communication network, causing a re-authorization of the one or more network entities suspected of malicious activity, and in response to a re-authorization failure of at least one of the one or more network entities suspected of malicious activity, causing one or more remedial actions to occur within the communication network to prevent the at least one network entity that failed re-authorization from accessing other network entities in the communication network.

    METHOD, APPARATUS AND COMPUTER PROGRAM
    28.
    发明公开

    公开(公告)号:US20230269642A1

    公开(公告)日:2023-08-24

    申请号:US18166908

    申请日:2023-02-09

    CPC classification number: H04W36/08 H04W36/0033 H04W84/042

    Abstract: There is provided an apparatus comprising determining, by a first access and mobility management function in a first network, that handover of a user equipment from the first access and mobility management function to a second access and mobility management function in a second network is required; sending, to the second access and mobility management function, a context update request for the user equipment, wherein the context update request comprises an indication that the source and target access node are the same; and receiving, from the second access and mobility management function, a context update response based on the context update request, the context update response comprising the indication that the source and target access node are the same.

    APPARATUS, METHOD, AND COMPUTER PROGRAM

    公开(公告)号:US20230075022A1

    公开(公告)日:2023-03-09

    申请号:US17939134

    申请日:2022-09-07

    Abstract: The disclosure relates to an apparatus comprising at least one processor and at least one memory including computer code for one or more programs, the at least one memory and the computer code configured, with the at least one processor, to cause the apparatus at least to: receive one or more rules for storing data or analytics in a storage; determine a storage approach based on the one or more rules for storing data or analytics in the storage; and track data or analytics in the storage and determine whether to store, update or remove all or a portion of the data or analytics in the storage based on the storage approach.

    ENHANCED AUTHORIZATION IN CELLULAR COMMUNICATION NETWORKS

    公开(公告)号:US20220272537A1

    公开(公告)日:2022-08-25

    申请号:US17675436

    申请日:2022-02-18

    Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising means for receiving from a requesting network function, by a network repository function, an access token request, wherein the access token request is related to a network function consumer requesting access to a service provided by a network function producer and comprises an identity of a vendor of the network function consumer requesting access to the service, means for verifying by the network repository function, based at least on the identity of the vendor of the network function consumer, that the network function consumer is allowed to access the service and means for transmitting to the requesting network function, by the network repository function, an access token upon successful verification, wherein the access token generated and signed by the network repository function comprises the identity of the vendor of the network function consumer and an identity of the vendor of the network function producer.

Patent Agency Ranking