METHOD AND APPARATUS FOR MANAGING SECURITY CONTEXT RELATED TO UE

    公开(公告)号:US20230122389A1

    公开(公告)日:2023-04-20

    申请号:US17916404

    申请日:2021-04-02

    Abstract: Embodiments of present disclosure relates to an apparatus and method for managing security context related to a UE. Initially, registration of a UE with a new AMF in a communication network is identified. Further, generation of new security context by new AUSF selected by the new AMF for authentication of the UE is detected. Further, presence of one or more old security contexts elated to the UE and generated by one or more old AUSFs selected by one or more old AMFs for one or more previous authentications of the UE, is detected. Upon the detection, de-registration of the UE with the one or more old AUSFs is initiated for managing security context related to the UE in the communication network. Thus, stale and inactive security context related to the UE may be deleted in the network and security of communication with the UE is enhanced.

    METHODS AND SYSTEMS FOR AUTHENTICATING DEVICES USING 3GPP NETWORK ACCESS CREDENTIALS FOR PROVIDING MEC SERVICES

    公开(公告)号:US20230070253A1

    公开(公告)日:2023-03-09

    申请号:US17801162

    申请日:2021-02-19

    Abstract: Methods and systems for authenticating devices using 3GPP network access credentials for providing MEC services. A device is configured to receive MEC services from an EAS through 5G S A or NSA architecture. The device is authenticated by an ECS, which involves validating a MAC generated by the device. The MAC is validated using an edge authentication key, which is generated based on 3GPP network access security credentials of the device. The device is authorized by an EES to receive MEC services, which involves successful registration of the device with the EES and the EES providing credentials to the device for accessing an EAS providing desired MEC services. The EAS provides the desired MEC services to the device if the device provides credentials to the EAS, which are same as those provided to the device by the EES.

    METHODS AND SYSTEMS FOR MITIGATING DENIAL OF SERVICE (DOS) ATTACK IN A WIRELESS NETWORK

    公开(公告)号:US20220312215A1

    公开(公告)日:2022-09-29

    申请号:US17806654

    申请日:2022-06-13

    Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution. Methods and systems for mitigating Denial of Service (DOS) attacks in wireless networks, by performing admission control by verifying a User Equipment's (UE's) registration request via a Closed Access Group (CAG) cell without performing a primary authentication are provided. Embodiments herein disclose methods and system for verifying permissions of the UE to access a CAG cell based on the UE's Subscription identifier, before performing the primary authentication. The method for mitigating DOS attacks in wireless networks includes requesting a public land mobile network for accessing a non-public network (NPN) through a CAG cell, verifying the permissions of a UE to access the requested NPN through the CAG cell, and performing a primary authentication.

    METHOD AND SYSTEM FOR DETECTING CYBER-ATTACKS USING NETWORK ANALYTICS

    公开(公告)号:US20220264307A1

    公开(公告)日:2022-08-18

    申请号:US17672136

    申请日:2022-02-15

    Abstract: The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate.
    A method of detecting cyber-attacks using network analytics in a user equipment (UE) is provided. The method includes receiving, by a network data analytics function (NWDAF), a request for sharing analytics information associated with the UE from a consumer network function (NF), requesting the analytics information associated with the UE and causing the cyber-attack to at least one 5th generation core (5GC) network entity, receiving the analytics information associated with the UE and causing the cyber-attack from the at least one 5GC network entity, comparing an expected behavior of the UE with an actual behavior based on the analytics information provided by the at least one 5GC network entity, deriving analytics associated with the cyber-attack based on the analytics information and the comparison, and sending the analytics associated with the UE to the consumer NF.

    METHOD AND SYSTEM FOR OPTIMIZING AKMA KEY REFRESH MECHANISM IN WIRELESS NETWORK

    公开(公告)号:US20220210640A1

    公开(公告)日:2022-06-30

    申请号:US17561078

    申请日:2021-12-23

    Abstract: The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). A method performed by a user equipment (UE) in a wireless network, the method comprising: establishing a communication with an application function (AF) server using a first authentication and key management for applications (AKMA) application key (KAF); receiving a message over the established communication from the AF server, the message indicating that a lifetime of the first KAF has expired; and configuring a back-off flag in the UE to optimize an AKMA key refresh mechanism in the wireless network in response to receiving the message, wherein the back-off flag prevents a request for a first AKMA anchor key (KAKMA) until a fresh primary authentication is performed.

    METHOD AND SYSTEM OF ENABLING AKMA SERVICE IN ROAMING SCENARIO

    公开(公告)号:US20220210636A1

    公开(公告)日:2022-06-30

    申请号:US17563659

    申请日:2021-12-28

    Abstract: The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments herein provide a method of enabling authentication and key management application (AKMA) services in roaming mode comprising generating a key associated with the AKMA services after a primary authentication of the UE with a wireless network; determining whether to share the at least one key associated with the AKMA services with a visited AKMA anchor function (vAAnF); and sharing the at least one key associated with the AKMA services with the vAAnF.

    METHOD AND APPARATUS FOR ESTABLISHING SECURE CONNECTIONS FOR EDGE COMPUTING SERVICES

    公开(公告)号:US20220150696A1

    公开(公告)日:2022-05-12

    申请号:US17499403

    申请日:2021-10-12

    Abstract: A method of establishing a secure connection for edge computing services in a wireless network is provided. The method includes performing, by a UE, a primary network access authentication with a first network entity in a wireless network, detecting a trigger for configuring edge computing services in response to a successful primary network access authentication, sending an initial security context establishment request to an Edge Configuration Server (ECS), wherein the request comprises a plurality of security context related parameters, receiving an initial security context establishment status from the ECS indicating a successful context establishment based on the successful establishment of the authentication key by the ECS, and establishing a secure connection with the ECS in response to determining that the initial security context establishment response is successful.

    METHOD FOR PROVIDING END-TO-END SECURITY OVER SIGNALING PLANE IN MISSION CRITICAL DATA COMMUNICATION SYSTEM

    公开(公告)号:US20220141009A1

    公开(公告)日:2022-05-05

    申请号:US17573942

    申请日:2022-01-12

    Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). Embodiments herein provide method and system for end-to-end security over signaling plane in a mission critical data (MCData) communication system. The proposed method includes various ways of securing MCData data payload transmitted over signaling plane using short data service (SDS). The proposed method allows usage of multiple security keys to encrypt the MCData SDS message as per the requirements. Various Keys such as, signaling plane key or media plane key or a dedicated MCData data payload signaling key can be used independently or in a combination thereof to achieve the desired security context. The proposed method allows protection of all the application level components with the signaling plane security context.

    AUTOMATIC SELF-ACTIVATION OF UNIVERSAL INTEGRATED CIRCUIT CARD

    公开(公告)号:US20190327610A1

    公开(公告)日:2019-10-24

    申请号:US16464971

    申请日:2017-12-01

    Abstract: Accordingly, embodiments herein provide a method for self-activation of universal integrated circuit card (UICC) in a mobile device. The method includes receiving, by a UICC-activation application installed at the mobile device an input data from a user of the mobile device, wherein the UICC-activation application is associated with an operator of the UICC. The method also includes determining, by the UICC-activation application at the mobile device, whether an electronic-Know Your Customer (e-KYC) procedure needs to be initiated for obtaining a subscription to the UICC in the mobile device based on the input data. Furthermore, the method includes initiating, by the UICC-activation application at the mobile device, the e-KYC procedure with at least one operator server based on the input data and automatically activating the subscription in the UICC of the mobile device based on the e-KYC procedure.

    METHOD AND SYSTEM FOR AUTHENTICATING APPLICATION PROGRAM INTERFACE (API) INVOKERS

    公开(公告)号:US20190149576A1

    公开(公告)日:2019-05-16

    申请号:US16192069

    申请日:2018-11-15

    Abstract: A method and system for authenticating application program interface (API) invokers using a common application program interface framework (CAPIF) is provided. The method includes establishing by a CAPIF core function (CCF) a secure Transport Layers Security (TLS) connection with at least one API invoker, on receiving a connection request from the at least one API invoker to access at least one service API on a CAPIF-2e interface. Further, the method includes determining by the CCF at least one security method to be used by the at least one API invoker for a CAPIF-2e interface security (C2eIS) of the at least one API invoker for accessing the at least one service API on a CAPIF-2e interface. The method further includes enabling the C2eIS by an API exposing function (AEF) the at least one API invoker based on the determined at least one security method.

Patent Agency Ranking