18483234. ENHANCED SECURITY IN COMMUNICATION NETWORKS simplified abstract (Nokia Technologies Oy)

From WikiPatents
Jump to navigation Jump to search

ENHANCED SECURITY IN COMMUNICATION NETWORKS

Organization Name

Nokia Technologies Oy

Inventor(s)

German Peinado Gomez of Wroclaw (PL)

Topuri Brahmaiah of Bangalore (IN)

Mallikarjunudu Makham of Bangalore (IN)

Sireesha Bommisetty of Bangalore (IN)

Saurabh Khare of Bangalore (IN)

ENHANCED SECURITY IN COMMUNICATION NETWORKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18483234 titled 'ENHANCED SECURITY IN COMMUNICATION NETWORKS

Simplified Explanation

The abstract describes a method for storing key information elements, receiving request messages from a network function, validating the messages, and transmitting responses.

  • Storing key information elements with key identifiers and keys/certificates
  • Receiving request messages with unprotected and protected fields
  • Determining and validating the key/certificate used for protection
  • Validating the request message based on the instance identity of the requesting network function
  • Transmitting a response after successful validation

Potential Applications

This technology could be applied in secure communication systems, authentication processes, and network function virtualization.

Problems Solved

This technology solves the problem of unauthorized access to sensitive information, ensuring the integrity and authenticity of communication between network functions.

Benefits

The benefits of this technology include enhanced security, reliable authentication, and efficient communication between network functions.

Potential Commercial Applications

One potential commercial application of this technology could be in the telecommunications industry for secure data transmission and network function authentication.

Possible Prior Art

One possible prior art for this technology could be related to secure communication protocols and authentication methods used in network systems.

Unanswered Questions

How does this technology handle different types of keys or certificates for protecting the request message fields?

The method described in the abstract focuses on determining and validating the key or certificate used for protection, but it does not specify how the system handles multiple types of keys or certificates.

What measures are in place to prevent key information elements from being compromised or tampered with?

While the abstract mentions storing key information elements, it does not detail the specific security measures in place to protect these elements from unauthorized access or modification.


Original Abstract Submitted

According to an example aspect of the present invention, there is provided a method comprising storing, by an apparatus, one or more key information elements, wherein each key information element comprises a stored key identifier and a stored key or a certificate, receiving by the apparatus, from a requesting network function, a request message comprising a first field and a second field, wherein the first field comprises an instance identity of the requesting network function and the second field comprises the instance identity of the requesting network function, and the first field is unprotected and the second field is protected with the key or the certificate, determining by the apparatus the key or the certificate used for protecting the second field, validating by the apparatus the second field using the key or the certificate, validating by the apparatus the request message when the instance identity of the requesting network function in the first field matches with the instance identity of the requesting network function in the validated second field and transmitting by the apparatus, after a successful validation of the second field and the request message, a response to the requesting network function.