Patent classifications
H04W12/043
Configuring a remote electronic device by a peer electronic device in a networked environment
A method for configuring multiple electronic devices in a batch, is described. The method can include initializing, by a first computing device a communication network based on a pre-defined configuration parameter. The pre-defined configuration parameter is associated with a first instance of an application on the first computing device. Further, the method includes identifying, by the first computing device, an initialization of a second instance of an application at a second computing device. In response to identifying the initialization of the second instance of the application at the second computing device, the method includes, sending, by the first computing device configuration settings for the second computing device over a secured communication network. In this regard, the configuration settings can comprise at least the pre-defined configuration parameter for configuring the second computing device.
METHOD AND APPARATUS FOR MANAGING SECURITY CONTEXT RELATED TO UE
Embodiments of present disclosure relates to an apparatus and method for managing security context related to a UE. Initially, registration of a UE with a new AMF in a communication network is identified. Further, generation of new security context by new AUSF selected by the new AMF for authentication of the UE is detected. Further, presence of one or more old security contexts elated to the UE and generated by one or more old AUSFs selected by one or more old AMFs for one or more previous authentications of the UE, is detected. Upon the detection, de-registration of the UE with the one or more old AUSFs is initiated for managing security context related to the UE in the communication network. Thus, stale and inactive security context related to the UE may be deleted in the network and security of communication with the UE is enhanced.
MOBILE NETWORK-BASED AUTHENTICATION SYSTEM
A mobile network based authentication system for authenticating a user's access to a restricted-access account includes an application server and an identification server. The application server is configured to authenticate the user's access to the restricted-access account by transmitting a one-time password to a mobile computing device of the user and confirming that the one-time password has been entered by the user. The identification server communicates with the application server after the application server receives a request from the user to access the restricted-access account and before the application transmits the one-time password to the mobile device, to verify that an attribute of the restricted-access account is linked to a network identification of the mobile computing device.
SYSTEMS AND METHODS FOR SECURELY MANAGING VEHICLE INFORMATION
Systems and methods are provided for securely managing vehicle information. A first digital signature associated with the vehicle may be generated based on a first public-private key pair, and a second digital signature associated with a mobile application may be generated based on a second public-private key pair. The mobile application may be associated with a mobile device operated by a user. The first digital signature and the public key of the first public-private key pair may be transmitted to, and stored by, the vehicle, and the second digital signature and the public key of the second public-private key pair may be transmitted to, and stored on the mobile device via the mobile application. The systems and methods may determine that a request to access the vehicle information has been received, and permit access to the vehicle information based on the first digital signature and the second digital signature.
METHOD AND WIRELESS NETWORK FOR APPLICATION-SPECIFIC AUTHORIZATION FOR NETWORK SERVICES IN WIRELESS NETWORK
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Accordingly, embodiments herein disclose a method performed by an application function (AF) server, the method comprises receiving, from a terminal, a first request message including an user equipment (UE) service identifier (ID), transmitting, to an authorization server, a second request message for request association information of the terminal, the second request message including a terminal ID, receiving, from the authorization server, the association information of the terminal, in case that the association information is retrieved based on the terminal ID and performing to verify whether the UE service ID is associated with the terminal ID in the association information of the terminal.
METHOD AND WIRELESS NETWORK FOR APPLICATION-SPECIFIC AUTHORIZATION FOR NETWORK SERVICES IN WIRELESS NETWORK
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Accordingly, embodiments herein disclose a method performed by an application function (AF) server, the method comprises receiving, from a terminal, a first request message including an user equipment (UE) service identifier (ID), transmitting, to an authorization server, a second request message for request association information of the terminal, the second request message including a terminal ID, receiving, from the authorization server, the association information of the terminal, in case that the association information is retrieved based on the terminal ID and performing to verify whether the UE service ID is associated with the terminal ID in the association information of the terminal.
TECHNIQUES FOR DECOUPLING AUTHENTICATION AND SUBSCRIPTION MANAGEMENT FROM A HOME SUBSCRIBER SERVER
Techniques are described to provide for authentication and subscription management that are decoupled from a Home Subscriber Server (HSS). In one example, a method includes providing a device profile at an authentication function, wherein the device profile comprises identification information for a device for a plurality of access types including a first identifier for the device associated with a cellular access and a second identifier for the device associated with a wireless local area network access; obtaining an access request message associated with the device for the cellular access, wherein the access request message comprises the first identifier and an authentication attribute; generating authentication information for authenticating the device for the cellular access based, at least in part, on the authentication attribute; and generating, for transmission, an access accept message for the cellular access, wherein the access accept message comprises the first identifier, the second identifier, and the authentication information.
TECHNIQUES FOR DECOUPLING AUTHENTICATION AND SUBSCRIPTION MANAGEMENT FROM A HOME SUBSCRIBER SERVER
Techniques are described to provide for authentication and subscription management that are decoupled from a Home Subscriber Server (HSS). In one example, a method includes providing a device profile at an authentication function, wherein the device profile comprises identification information for a device for a plurality of access types including a first identifier for the device associated with a cellular access and a second identifier for the device associated with a wireless local area network access; obtaining an access request message associated with the device for the cellular access, wherein the access request message comprises the first identifier and an authentication attribute; generating authentication information for authenticating the device for the cellular access based, at least in part, on the authentication attribute; and generating, for transmission, an access accept message for the cellular access, wherein the access accept message comprises the first identifier, the second identifier, and the authentication information.
Quantum authentication in wireless communication networks
A wireless communication network performs quantum authentication for a wireless User Equipment (UE). In the wireless communication network, network quantum circuitry generates and transfers qubits. UE quantum circuitry receives and processes the qubits and determines polarization states for the qubits. The UE quantum circuitry exchanges cryptography information with the network quantum circuitry and generates cryptography keys based on polarization states and cryptography information. The UE quantum circuitry transfers the cryptography keys to UE network circuitry. The network quantum circuitry exchanges the cryptography information with the UE quantum circuitry. The network quantum circuitry generates the cryptography keys based on the polarization states and the cryptography information and transfers the cryptography keys to network authentication circuitry. The UE network circuitry processes the cryptography keys to generate authentication data and wirelessly transfers to the network authentication circuitry. The network authentication circuitry receives the cryptography keys and the authentication data and authenticates the UE.
Secure communication method and secure communications apparatus
A secure communication method and a secure communications apparatus related to the field of communications technologies and applied to a terminal. The terminal has a first security context and a second security context, the first security context is used by the terminal to communicate with a first network, the second security context is used by the terminal to communicate with a second network, and the first security context and the second security context include different first information.