The subject matter described herein relates to dynamically sharing certificate data used for verifying access tokens. More particularly, the subject matter described herein relates to methods, systems, and computer readable media for sharing key identification (key ID) and public certificate data for access token verification.
In 5G telecommunications networks, a network function that provides service is referred to as a producer NF or NF service producer. A network function that consumes services is referred to as a consumer NF or NF service consumer. A network function can be a producer NF, a consumer NF, or both, depending on whether the network function is consuming, producing, or consuming and producing services. The terms “producer NF” and “NF service producer” are used interchangeably herein. Similarly, the terms “consumer NF” and “NF service consumer” are used interchangeably herein.
A given producer NF may have many service endpoints, where a service endpoint is the point of contact for one or more NF instances hosted by the producer NF. The service endpoint is identified by a combination of Internet protocol (IP) address and port number or a fully qualified domain name (FQDN) that resolves to an IP address and port number on a network node that hosts a producer NF. An NF instance is an instance of a producer NF that provides a service. A given producer NF may include more than one NF instance. It should also be noted that multiple NF instances can share the same service endpoint.
Producer NFs register with a network function repository function (NRF). The NRF maintains service profiles of available NF instances identifying the services supported by each NF instance. The terms “service profiles” and “NF profiles” are used interchangeably herein. Consumer NFs can obtain information about producer NF instances that have registered with the NRF through the NF service discovery procedure. According to the NF service discovery procedure, a consumer NF sends an NF discovery request to the NRF. The NF discovery request includes query parameters that the NRF uses to locate NF profiles of producer NFs capable of providing the service identified by the query parameters. NF profiles are data structures that define the type of service provided by a producer NF instance and well as contact and capacity information regarding the producer NF instance.
One example of an intermediate proxy that forwards traffic between producer NFs and consumer NFs is the security edge protection proxy (SEPP). The SEPP is the network function used to protect control plane traffic that is exchanged between different 5G public land mobile networks (PLMNs). As such, the SEPP performs message filtering, policing and topology hiding for all application programming interface (API) messages that are transmitted between PLMNs.
One problem that can occur in 5G and other communications networks is that 3GPP standards do not define how certificates and public keys should be shared between network functions and the NRF. The exchange and sharing of certificates and associated public keys are necessary for the validation of access tokens that correspond to producer NFs and are managed by the NRF. However, the aforementioned lack of guidelines permit network vendors to implement custom solutions, such as the static provisioning of certificates at the numerous NFs or utilizing a public key infrastructure (PKI) and/or vault model that is shared by the NFs and NRF. Each of these likely customized solutions has its unique drawbacks (e.g., tedious and error prone provisioning and/or various vendor entities with different requirements/protocols) that present considerable challenges to efficiently distribute certificate and public key information among producer NFs.
Accordingly, in light of these and other difficulties, there exists a need for improved methods, systems, and computer readable media for sharing key identification and public certificate data for access token verification.
A method for sharing key identification (key ID) and public certificate data for access token verification comprises, at an NF repository function (NRF) including at least one processor, receiving, from a producer NF, an NF registration message including key ID version information. The method also includes, in response to detecting the key ID version information, sending, to the producer NF, an NF registration response message including a current key ID version value, at least one digital certificate, and at least one corresponding public key to the producer NF. The method further includes receiving, from the producer NF, an NF update message that includes the current key ID version value and in response to determining that the current key ID version value in the NF update message does not match an updated key ID version value maintained at the NRF, sending an NF update response message that the updated key ID version value, at least one updated digital certificate, and at least one corresponding updated public key to the producer NF.
According to another aspect of the method described herein, the current key ID version information is communicated via a first custom header section of the NF update message that includes a vendor-dynamic-keyID-version parameter.
According to another aspect of the method described herein, the at least one updated digital certificate and the at least one corresponding updated public key is communicated via a second custom header section of the NF update response message that includes a vendor-dynamic-keyID-pair parameter.
According to another aspect of the method described herein, the NF update message is an NF heart-beat request message and the NF update response message is a heart-beat response message.
According to another aspect of the method described herein, in response to determining that the current key ID version value in the NF update message matches the updated key ID version value maintained at the NRF, sending an NF update response message that includes the current key ID version value.
According to another aspect of the method described herein, the NRF is configured to update the current key ID version value in response to adding or deleting a public key.
According to another aspect of the method described herein, using, by the producer NF, the at least one corresponding updated public key to verify a digital signature of an access token received from a consumer NF, wherein the access token includes at least one key ID originating from the NRF.
According to another aspect of the subject matter described herein, a system for sharing key ID and public certificate data for access token verification comprises an NRF including at least one processor and a memory, and a key identifier distribution manager (KDM) implemented by the at least one processor configured for receiving, from a producer NF, an NF registration message including key ID version information; in response to detecting the key ID version information, sending, to the producer NF, an NF registration response message including a current key ID version value, at least one digital certificate, and at least one corresponding public key to the producer NF; receiving, from the producer NF, an NF update message that includes the current key ID version value; and in response to determining that the current key ID version value in the NF update message does not match an updated key ID version value maintained at the NRF, sending an NF update response message that the updated key ID version value, at least one updated digital certificate, and at least one corresponding updated public key to the producer NF.
The subject matter described herein can be implemented in software in combination with hardware and/or firmware. For example, the subject matter described herein can be implemented in software executed by a processor. In one exemplary implementation, the subject matter described herein can be implemented using one or more non-transitory computer readable media having stored thereon computer executable instructions that when executed by the processor of a computer control the computer to perform steps. Exemplary computer readable media suitable for implementing the subject matter described herein include non-transitory computer-readable media, such as disk memory devices, chip memory devices, programmable logic devices, and application specific integrated circuits. In addition, a computer readable medium that implements the subject matter described herein may be located on a single device or computing platform or may be distributed across multiple devices or computing platforms.
Exemplary implementations of the subject matter described herein will now be explained with reference to the accompanying drawings, of which:
NRF 100 is a repository for NF or service profiles of producer NF instances. In order to communicate with a producer NF instance, a consumer NF or an SCP must obtain the NF or service profile of the producer NF instance from NRF 100. The NF or service profile is a JavaScript object notation (JSON) data structure defined in 3GPP TS 29.510. The NF or service profile includes attributes that indicate the type of service provided, capacity of the NF instance, and information for contacting the NF instance.
In
The NFs illustrated in
A network slice selection function (NSSF) 116 provides network slicing services for devices seeking to access specific network capabilities and characteristics associated with a network slice. A network exposure function (NEF) 118 provides application programming interfaces (APIs) for application functions seeking to obtain information about Internet of things (IoT) devices and other UEs attached to the network. NEF 118 performs similar functions to the service capability exposure function (SCEF) in 4G networks.
A radio access network (RAN) 120 connects user equipment (UE) 114 to the network via a wireless link. Radio access network 120 may be accessed using a g-Node B (gNB) (not shown in
SEPP 126 filters incoming traffic from another PLMN and performs topology hiding for traffic exiting the home PLMN. SEPP 126 may communicate with a SEPP in a foreign PLMN which manages security for the foreign PLMN. Thus, traffic between NFs in different PLMNs may traverse two SEPP functions, one for the home PLMN and the other for the foreign PLMN.
SEPP 126 may utilize an N32-c interface and an N32-f interface. An N32-c interface is a control plane interface between two SEPPs usable for performing an initial handshake (e.g., a TLS handshake) and negotiating various parameters for an N32-f interface connection and related message forwarding. An N32-f interface is a forwarding interface between two SEPPs usable for forwarding various communications (e.g., 5GC requests) between a consumer NF and a producer NF after applying application level security protection.
As indicated above, there are many instances where the NRF needs to provide certificate and public key information to each of a plurality of supported producer NFs in order to facilitate the management and verification of access tokens. For example, the NRF may be configured to verify that input parameters (e.g., NF type) contained in an access token request from the consumer NF match the corresponding parameters included in the public key certificate of the consumer NF (e.g., NF service consumer) or in the NF profile of the consumer NF. If a match is found, the NRF can be configured to determine that the consumer NF is authorized to access the requested service(s). If the consumer NF is authorized, the NRF may then generate an access token containing the appropriate JSON web claims.
Further, the NRF shall digitally sign the requested access token using a shared secret or private key corresponding to the producer NF (i.e., a producer NF that has been provisioned with the NRF's public key). If the Consumer NF is not authorized, the NRF shall not issue an access token to the Consumer NF. The producer NF (e.g., NF service producer) ensures the integrity of the access token by verifying the NRF's digital signature using the NRF's public key (or checking the media access control (MAC) value using the shared secret). If the integrity check is successful, the NF Service producer shall verify the claims in the token.
To illustrate,
If the NF service consumer 202 is not authorized, NRF 204 does not generate and/or issue an access token to the NF service consumer. If NF service consumer 202 is determined to have authorization, NRF 204 is configured to generate an access token that includes a plurality of appropriate JSON web token (JWT) claims. Technical specification 33.501 specifies that access tokens are secured with digital signatures or Message Authentication Codes (MAC) based on JSON Web Signature (JWS) as described in RFC 7515. Thus, NRF 204 can also digitally sign the generated access token based on a shared secret or a private key stored locally at the NRF. After verifying the authorization of NF service consumer 202 and generating the access token, NRF 204 sends the access token via response message 213 (e.g., an Nnrf_AccessToken_Get Response message).
Likewise,
After the integrity and claims of the access token have been successfully verified, NF service producer 306 generates an NF service response message 313 that is directed to NF service consumer 302 and provides the requested service.
Notably,
As networks expand, there is a need for an NRF to share its public key and certificate with several producer NFs for the purpose of access token validation. For the management of multiple public/private certificate pairs, the use of a key identifier (key ID or kid) is one possible solution. For example, when the NRF has to rotate or renew its certificate (e.g., for expired or compromised certificates), this certificate renewal process has an impact on previously issued access tokens since these issued access tokens have been digitally signed with expired/rotated private certificates of the NRF.
There are scenarios where NRF may be configured to include a key ID in an access token sent to a consumer NF, which can serve as a hint for a producer NF to verify the identity of the NRF and determine which certificate pair was used. More specifically, the NRF can utilize the key ID to establish and indicate the private key that was used for digitally signing the access token (e.g., the NRF may be configured to add at least one key ID in an access token). Similarly, the producer NF can utilize the key ID in the NF service request message to identify the corresponding public certificate, which can be used to verify the digital signature.
One problem that is experienced among network functions is the actual implementation of sharing multiple public keys with a producer NF. In some instances, the NRF may generate “N” number of private/public certificate pairs and map these pairs to different key IDs. However, there are challenges involved with providing multiple versions of public key/certificate and key ID information to one or more producer NFs. In particular, since the producer NF does not know or learn about new key IDs associated with public certificates that have been rotated/renewed, present key ID distribution solutions do not work.
As such, there is a need for a process that allows the NRF to publish and/or provide key ID and public certificate information to the producer NFs in a dynamic manner. The sharing of key ID and public certificate information is compelled when the NRF rotates or renews its public certificate pair data (e.g., deleting old key IDs and public certificate pairs and/or adding new key IDs and public certificate pairs).
As indicated above, 3GPP standards do not provide clear guidelines on how key IDs and public certificates should be provided from the NRF to producer NFs. As such, different vendors typically employ unique custom implementations. While some possible industry practices can involve statically configuring the key ID and public certificate at each of the producer NFs, such static management of the producer NF can prove to be error prone and tedious, especially in scenarios where an NRF is responsible for managing hundreds of producer NFs. Similarly, utilizing a shared PKI/vault model among an NRF and producer NFs is also challenging when the producer NFs are associated with different vendors.
Referring to
NRF 400 may include a key ID distribution manager (KDM) 404. KDM 404 may be any suitable entity (e.g., software stored in memory and executing on at least one processor) for performing one or more aspects associated with sharing key identification and public certificate data for access token verification in a communications network. In some embodiments, KDM 404 may be configured for receiving, from a producer NF, an NF registration message including a first custom header section containing key identifier (ID) version information; in response to detecting the first custom header section, sending an NF registration response message including a first custom header with current key ID version information and a second custom header section containing at least one digital certificate and at least one corresponding public key to the producer NF; receiving, from the producer NF, an NF update message that includes the first custom header section containing a current key ID version value; and in response to determining that the current key ID version value in the NF update message does not match the updated key ID version value maintained at the NRF, sending an NF update response message that includes a first custom header section containing an updated key ID version value and a second custom header section that includes at least one updated digital certificate and at least one corresponding updated public key to the producer NF.
NRF 400 may also comprise data storage 406, which can include any storage medium that is configured to store and maintain database tables that contain entries mapping key IDs, private/public key pairs, Producer NFs, version value data, and the like. NRF 400 and/or KDM 404 can be configured to add or delete entire entries or individual parameters during the course of operation.
To further illustrate the operation of NRF 400 and/or KDM 404, exemplary signaling message flows are depicted in
In some embodiments, the producer NF is configured to communicate key ID value version information to the NRF during the NF registration (or re-registration) stage. For example, a producer NF can send a registration message that includes data (e.g., a custom header with key ID version value data) indicating that the producer NF is capable of processing or handling key IDs and public certificates from the NRF. Notably, the key ID version parameter indicates the version value/number for the grouping of the one or more key IDs maintained by the producer NF. At the registration stage, the initial/default key ID version value is “0” (since the producer NF does not maintain any NRF public keys yet).
Similarly, the NRF also maintains a key ID version parameter that represents the current version number/value for the grouping of the one or more key IDs stored and/or maintained at the NRF. Notably, each key ID version value is associated with one or more digital certificates and corresponding one or more public key(s). Each time a new key pair is added or an old key pair is deleted from the stored key ID group, the NRF is configured to increment the current version value by “1”. Further, the NRF can provide the updated key ID version value information in a customized header section of an NF heart-beat response message (or NF Update response message) directed to the producer NF (see below). During the NF registration stage, the NRF provides the Producer NF with the current version value information in a first custom header section of a registration response message and the corresponding key ID(s) and digital certificate(s) in a second custom header section of the registration response message.
After the registration stage is concluded, the producer NF is configured to transmit NF heart-beat messages (e.g., NF update messages) to the NRF. Notably, these NF heart-beat messages can be used by the producer NF to share the last known version value of the key ID that was provided by the NRF. Upon receiving this NF heart-beat request message, the NRF will determine if that key ID version value matches the version value of key ID that is currently stored and/or maintained by the NRF. If the NRF determines that that the key ID has been updated to a different version (e.g., addition or deletion of one or more public keys), the NRF will share an updated list of public keys and associated key ID version value information with the producer NF in an NF heart-beat response message.
Notably, the producer NF and the NRF are configured to communicate and share the key ID version value information and corresponding public keys and digital certificates via custom headers in NF heart-beat response messages. In some embodiments, the producer NF can be configured to utilize a custom header in the NF heart-beat messages directed to the NRF. For example, the registration message or the NF heart-beat message can include first custom header section that contains a “vendor-dynamic-keyid-version” parameter (e.g., an attribute-value pair parameter) that serves to indicate a version value/number of one or more key IDs. In the custom header of the initial registration message, the vendor-dynamic-keyid-version” parameter can be established with an initial default value of “0”, which indicates that no key ID is stored on the sending producer NF and/or is known by the sender of the message (e.g., vendor-dynamic-keyid-version=0).
If the NRF sends a registration response message or an heart-beat response message with a custom header containing a vendor-dynamic-keyid-version” parameter equal to “0”, then no key ID exists at the NRF. Further, the producer NF is responsible for sending a vendor-dynamic-keyid-version parameter and value in the custom header of an NF heart-beat message, which indicates the last key ID version value reported to the producer NF by the NRF.
In response to an NF heart-beat request message from a producer NF, the NRF is configured to provide an updated and/or current vendor-dynamic-keyid-version information to registered producer NFs. If the NRF has any change or modification to the key ID configuration (i.e., a version shared by the producer NF is not the same as current version at the NRF), the NRF is configured to send an NF heart-beat response message with a custom header that contains an updated vendor-dynamic-keyid-pair parameter.
If an NF sends an NF heart-beat request message (or even a re-registration message) with a custom header containing the “vendor-dynamic-keyid-version” parameter, the parameter indicates the current version of the key IDs (and identified public keys) that are known to the producer NF at that time. When the NRF sends a response message, the “vendor-dynamic-keyid-version” parameter indicates the key ID version value of the key ID(s) presently stored by the NRF.
Another parameter that can be contained in a custom header includes the “vendor-dynamic-keyid-pair” parameter. Notably, this parameter is included in the custom header sent by the NRF in response to a registration request and/or an NF heart-beat message. In some embodiments, the vendor-dynamic-keyid-pair contains a list of known key IDs and corresponding public keys and certificates associated with the NRF. The NRF can be configured to send a message with this custom header as a response message if i) vendor-dynamic-keyid-version is less than “1” at the NRF or ii) the value of the vendor-dynamic-keyid-version value from the NF is not the same as the key ID version value stored at the NRF.
In some embodiments, the vendor-dynamic-keyid-pair parameter is a JSON data structure providing one or more key IDs and public certificate pairs (e.g., vendor-dynamic-keyid-pair=<JSON data structure indicating one or more key ID and public certificate pairs>). For example, the JSON format can include {data=[keyID: <key ID>, cert: <X.509 Certificate>]}. In some embodiments, the certificate format is defined by “x5c” as specified in RFC 7515.
The use of the custom headers is best described using the examples depicted in
After receiving NF registration message 511 (e.g., as defined by Section 5.2.2.2 of 3GPP TS 29.510), NRF 504 is configured to generate a registration response message with a custom header that includes the current vendor-dynamic-keyid-version value information (see block 512 in
In
For example, consider the case where a network operator has removed ‘key ID 2’ and added ‘key ID 3’ from a local key ID store in NRF 604. In this scenario, the version value will change from ‘2’ to ‘4’ (i.e., the removal of “key ID 2” changes version value to ‘3’ and the addition of “key ID 3” changes the version value to ‘4’ in the local key ID store). NRF 604 subsequently generates an NF heart-beat response message 613 (e.g., “200 OK” message) that includes custom header sections that respectively indicate i) the updated key ID version value and ii) the updated key ID and certificate pairs. For example, message 613 in
After generating NF heart-beat response message 613, NRF 604 can direct message 613 to producer NF 602. Notably, producer NF 602 can utilize the provided public key(s) and certificate information to verify the integrity (e.g., verify the NRF digital signature) and claims in access tokens received from consumer NFs requesting service. In some embodiments, the access tokens received from a consumer NF includes at least one key ID that originated from the NRF.
In block 702, an NF registration message including a first custom header section containing key identifier (ID) version information is received.
In some embodiments, a registration message that includes a custom header section “vendor-dynamic-keyID-version” is received by the NRF from a producer NF. Notably, the custom header section includes an initial key ID version value of “0” (e.g., vendor-dynamic-keyID-version=0), which serves as an indication to the NRF that the sending producer NF supports the dynamic key ID support functionality feature.
In block 704, in response to detecting the first custom header section, an NF registration response message including a first custom header with current key ID version information and a second custom header section containing at least one digital certificate and at least one corresponding public key is to the producer NF. In some embodiments, the NRF identifies the custom header in the NF registration message (and that the key ID version value in the custom header is equal to 0) and generates a registration response message that includes both a first custom header section and a second custom header section. Notably, the first custom header section in the registration response message includes the key ID version value of the most current version of key ID information stored at the NRF. Similarly, the second custom header section in the registration response message includes the actual certificate information and corresponding public key(s) associated with the most current key ID version value (e.g., version value=2). Notably, the receiving producer NF will update its records to include the key ID version value (e.g., change key ID version value from 0 to 2) and store the public key identifiers and certificates.
In block 706, an NF update message that includes the first custom header section containing a current key ID version value is received from the producer NF. In some embodiments, the NRF receives an NF heart-beat request message from the producer NF. In particular, the NF heart-beat request message includes a first custom header section that indicates the key ID version value that is maintained by the producer NF (e.g., vendor-dynamic-keyID-version=2). Notably, these NF heart-beat request messages are sent by the producer NF on a predefined periodic basis.
In block 708, in response to determining that the current key ID version value in the NF update message does not match the updated key ID version value maintained at the NRF, an NF update response message that includes a first custom header section containing an updated key ID version value and a second custom header section that includes at least one updated digital certificate and at least one corresponding updated public key is sent to the producer NF. In some embodiments, the NRF determines if the key ID version value in the received NF heart-beat request message matches the key ID version value presently stored at the NRF. If the key ID version values do not match (and thus indicate key ID changes recently made by the NRF and/or operator), the NRF is configured to generate an NF heart-beat response message that includes a first custom header section that contains the updated key ID version value (e.g., vendor-dynamic-keyID-version=4) and second custom header that contains the public key ID(s) and certificate(s) associated with the updated key ID version. After generating the NF heart-beat response message, the NRF sends the NF heart-beat response message to the producer NF.
Exemplary advantages of the subject matter described herein include automation of the management and exchange of key IDs and associated digital certificates that can be used by producer NFs to validate access tokens received from consumer NFs requesting service. Moreover, because the disclosed subject matter is based on a producer NF's capability to handle dynamic updates of key IDs and public certificates through heart-beat messages received from an NRF, the solution is fully backward compatible for producer NFs that do not support this feature. The disclosed subject matter also provides an efficient automatic synchronization process between an NF and the NRF, even when the NF has encountered heart-beat failures or was previously shut down by a network operator. Further, the disclosed subject matter strengthens the security of the 5G core such that a compromised private key existing at the NRF can be readily replaced by the disclose subject matter. Specifically, a network operator is able to deploy new key pairs with minimal time to replace the existing keys through automated logic at the NRF, thereby enabling/adding new keys and deleting the appreciated keys. The disclosed subject matter also affords a measure of security since only the key ID and public certificates will be exchanged between the NRF and the NF, thus securely maintaining the private certificate at the NRF for the exclusive right to digitally sign access tokens. Accordingly, other NFs will be prevented from faking or generating an access token locally that can be digitally signed with its own private key.
The disclosure of each of the following references is incorporated herein by reference in its entirety.
It will be understood that various details of the subject matter described herein may be changed without departing from the scope of the subject matter described herein. Furthermore, the foregoing description is for the purpose of illustration only, and not for the purpose of limitation, as the subject matter described herein is defined by the claims as set forth hereinafter.
Number | Name | Date | Kind |
---|---|---|---|
8054722 | Xu | Nov 2011 | B2 |
8254143 | Du | Aug 2012 | B2 |
8509239 | Zhu | Aug 2013 | B2 |
8711864 | Ko | Apr 2014 | B1 |
8769287 | Huang | Jul 2014 | B2 |
8811372 | Li | Aug 2014 | B2 |
8824449 | van der Wateren | Sep 2014 | B2 |
8880891 | Liu | Nov 2014 | B2 |
8990936 | Jiang | Mar 2015 | B2 |
9866392 | Campagna | Jan 2018 | B1 |
10193700 | Liu | Jan 2019 | B2 |
10299128 | Suthar | May 2019 | B1 |
10595256 | Marupaduga | Mar 2020 | B1 |
10609154 | Talebi Fard | Mar 2020 | B2 |
10791044 | Krishan | Sep 2020 | B1 |
10833938 | Rajput | Nov 2020 | B1 |
11023585 | Light | Jun 2021 | B1 |
11316670 | Stahl | Apr 2022 | B2 |
11425636 | Aggarwal et al. | Aug 2022 | B1 |
11503031 | Hu | Nov 2022 | B1 |
11895501 | Rajput et al. | Feb 2024 | B2 |
20080144824 | Stewart | Jun 2008 | A1 |
20080155068 | Newman | Jun 2008 | A1 |
20080229110 | Balfanz | Sep 2008 | A1 |
20080229402 | Smetters | Sep 2008 | A1 |
20080317042 | Balfanz | Dec 2008 | A1 |
20090296706 | Zhang | Dec 2009 | A1 |
20090316572 | Zhang | Dec 2009 | A1 |
20090319985 | Sun | Dec 2009 | A1 |
20090323536 | Liu | Dec 2009 | A1 |
20090327688 | Li | Dec 2009 | A1 |
20100005181 | Zhang | Jan 2010 | A1 |
20100005514 | Chen | Jan 2010 | A1 |
20100049932 | Tan | Feb 2010 | A1 |
20100121992 | Chen | May 2010 | A1 |
20110040968 | Liu | Feb 2011 | A1 |
20110179267 | Xie | Jul 2011 | A1 |
20110202972 | Jiang | Aug 2011 | A1 |
20110208923 | Zhang | Aug 2011 | A1 |
20110211685 | Liu | Sep 2011 | A1 |
20110231931 | Ma | Sep 2011 | A1 |
20110246685 | Hu | Oct 2011 | A1 |
20110258255 | Luo | Oct 2011 | A1 |
20110258389 | Li | Oct 2011 | A1 |
20110264833 | Zhang | Oct 2011 | A1 |
20110264908 | Feng | Oct 2011 | A1 |
20110265181 | Jiang | Oct 2011 | A1 |
20110320532 | Cheng | Dec 2011 | A1 |
20110320712 | Xu | Dec 2011 | A1 |
20120032508 | Du | Feb 2012 | A1 |
20120036394 | Feng | Feb 2012 | A1 |
20120089799 | Wei | Apr 2012 | A1 |
20120124660 | Wang | May 2012 | A1 |
20120137042 | Wang | May 2012 | A1 |
20120144192 | Chen | Jun 2012 | A1 |
20120151070 | Li | Jun 2012 | A1 |
20120173941 | Tong | Jul 2012 | A1 |
20120203910 | Lan | Aug 2012 | A1 |
20120204264 | Jiang | Aug 2012 | A1 |
20120233691 | Jiang | Sep 2012 | A1 |
20120239804 | Liu | Sep 2012 | A1 |
20120254977 | Jiang | Oct 2012 | A1 |
20120259941 | Luo | Oct 2012 | A1 |
20120260125 | Wang | Oct 2012 | A1 |
20140379901 | Tseitlin | Dec 2014 | A1 |
20150039560 | Barker | Feb 2015 | A1 |
20160352588 | Subbarayan | Dec 2016 | A1 |
20180004453 | Baptist | Jan 2018 | A1 |
20180039494 | Lander | Feb 2018 | A1 |
20180262592 | Zandi | Sep 2018 | A1 |
20180324646 | Lee | Nov 2018 | A1 |
20180343567 | Ashrafi | Nov 2018 | A1 |
20190045351 | Zee | Feb 2019 | A1 |
20190075552 | Yu | Mar 2019 | A1 |
20190116486 | Kim | Apr 2019 | A1 |
20190158364 | Zhang | May 2019 | A1 |
20190173740 | Zhang | Jun 2019 | A1 |
20190174561 | Sivavakeesar | Jun 2019 | A1 |
20190182875 | Talebi Fard | Jun 2019 | A1 |
20190191348 | Futaki | Jun 2019 | A1 |
20190191467 | Dao | Jun 2019 | A1 |
20190223093 | Watfa | Jul 2019 | A1 |
20190251241 | Bykampadi | Aug 2019 | A1 |
20190253894 | Bykampadi | Aug 2019 | A1 |
20190261244 | Jung | Aug 2019 | A1 |
20190306907 | Andreoli-Fang | Oct 2019 | A1 |
20190313236 | Lee | Oct 2019 | A1 |
20190313437 | Jung | Oct 2019 | A1 |
20190313469 | Karampatsis | Oct 2019 | A1 |
20190335002 | Bogineni | Oct 2019 | A1 |
20190335534 | Atarius | Oct 2019 | A1 |
20190394624 | Karampatsis | Dec 2019 | A1 |
20200008069 | Zhu | Jan 2020 | A1 |
20200028920 | Livanos | Jan 2020 | A1 |
20200045753 | Dao | Feb 2020 | A1 |
20200053670 | Jung | Feb 2020 | A1 |
20200059856 | Cui | Feb 2020 | A1 |
20200136911 | Assali | Apr 2020 | A1 |
20200267214 | Yang | Aug 2020 | A1 |
20200322775 | Lee et al. | Oct 2020 | A1 |
20210136047 | Wilson | May 2021 | A1 |
20210234706 | Nair | Jul 2021 | A1 |
20210240554 | Landais | Aug 2021 | A1 |
20210288802 | Muhanna | Sep 2021 | A1 |
20210297935 | Belling | Sep 2021 | A1 |
20220158926 | Wennerström | May 2022 | A1 |
20220182835 | Rajput | Jun 2022 | A1 |
20220353263 | Choyi | Nov 2022 | A1 |
20220386225 | Sapra | Dec 2022 | A1 |
20230030315 | Khare | Feb 2023 | A1 |
20230308853 | Ding | Sep 2023 | A1 |
20230362970 | Furuichi | Nov 2023 | A1 |
20230396602 | Wu | Dec 2023 | A1 |
20230412589 | Jost | Dec 2023 | A1 |
Number | Date | Country |
---|---|---|
103812697 | Dec 2017 | CN |
3570515 | Nov 2019 | EP |
3886390 | Sep 2021 | EP |
4260515 | Oct 2023 | EP |
WO 2022125212 | Jun 2022 | WO |
Entry |
---|
Advisory Action for U.S. Appl. No. 17/115,746 (Sep. 27, 2023). |
Final Office Action for U.S. Appl. No. 17/115,746 (Jul. 18, 2023). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 17/115,746 (Apr. 26, 2023). |
Non-Final Office Action for U.S. Appl. No. 17/115,746 (Dec. 23, 2022). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2021/057158 (Jan. 27, 2022). |
“3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 5G System; Network Function Repository Services: Stage 3 (Release 16),” 3GPP TS 29.510, V16.5.0, pp. 1-208 (Sep. 2020). |
“3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 5G System; Public Land Mobile Network (PLMN) Interconnection; Stage 3 (Release 16),” 3GPP TS 29.573, V16.4.0, pp. 1-95 (Sep. 2020). |
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system (Release 16),” 3GPP TS 33.501, V16.4.0, pp. 1-249 (Sep. 2020). |
Jones et al., “JSON Web Token (JWT),” RFC 7519, pp. 1-30 (May 2015). |
Jones et al., “JSON Web Signature (JWS),” RFC 7515, pp. 1-59 (May 2015). |
Jones et al., “The OAuth 2.0 Authorization Framework: Bearer Token Usage,” RFC 6750, pp. 1-18 (Oct. 2012). |
Hardt, “The OAuth 2.0 Authorization Framework,” RFC 6749, pp. 1-76 (Oct. 2012). |
Dierks et al., “The Transport Layer Security (TLS) Protocol Version 1.2,” RFC 5246, pp. 1-104 (Aug. 2008). |
Housley et al., “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” RFC 3280, pp. 1-129 (Apr. 2002). |
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system (Release 17),” 3GPP TS 33.501, V17.3.0, pp. 1-258 (Sep. 2021). |
“3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 5G System; Network Function Repository Services; Stage 3 (Release 17),” 3GPP TS 29.510, V17.3.0, pp. 1-271 (Sep. 2021). |
Jones et al. “JSON Web Signature (JWS),” Internet Engineering Task Force (IETF), Request for Comments 7515, pp. 1-59 (May 2015). |
Akon et al., “Formal Analysis of Access Control Mechanism of 5G Core Network,” CCS '23: Proceedings of the 2023 ACS SIGSAC Conference on Computer and Communications Security; Nov. 2023, pp. 666-680 (2023). |
Notice of Allowance for U.S. Appl. No. 17/115,746 (Dec. 20, 2023). |
Number | Date | Country | |
---|---|---|---|
20230171099 A1 | Jun 2023 | US |