Patents by Inventor Suresh Nair
Suresh Nair has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATION USING A USER EQUIPMENT IDENTIFIER
Publication number: 20250142331Abstract: Methods, computer program products, and apparatuses are provided for enabling a user equipment (UE) to connect to the wireless access network that support non-seamless wireless local area network (WLAN) offload (NSWO), such as using the UE's fifth generation (5G) credentials. An apparatus may include a processor and a memory storing computer program code configured to cause the apparatus to request, by the UE, a wireless connection to a network entity; receive, by the UE, from the network entity, an identity request; and in response to the identity request, cause transmission, by the UE, an identity response including a UE identifier to the network entity such that the UE is configured to establish a security context with the network entity upon successful authentication using the UE identifier.Type: ApplicationFiled: January 7, 2025Publication date: May 1, 2025Applicant: NOKIA TECHNOLOGIES OYInventors: Suresh NAIR, Ranganathan MAVUREDDI DHANASEKARAN, Laurent THIEBAUT -
Patent number: 12184790Abstract: A request is received at an authorization entity for access to a service producer by a service consumer. The request comprises a public key of the service consumer. The authorization entity generates an access token with the public key of the service consumer bound thereto. The authorization entity sends the access token to the service consumer. The service consumer digitally signs the access token using a private key that corresponds to the public key bound to the access token to form a digital signature. The service consumer sends the access token with the public key bound thereto and the digital signature to the service producer. The service producer validates the access token, obtains the public key from the access token, and verifies the digital signature using the obtained public key of the service consumer. The service consumer is authorized when the access token is successfully validated and the digital signature is successfully verified.Type: GrantFiled: August 2, 2019Date of Patent: December 31, 2024Assignee: Nokia Technologies OyInventors: Suresh Nair, Anja Jerichow, Nagendra S Bykampadi
-
Patent number: 12177937Abstract: An apparatus and a method for reallocation of global unique temporary identifier (GUTI) in 5G networks are disclosed. The method includes receiving, at a user equipment, a first message from a network, the first message including a first global unique temporary identifier and additional information, at least the first global unique temporary identifier being as-signed to the user equipment; receiving a first data transmission including the first global unique temporary identifier from the network; in response to receiving the first data transmission, deriving, at the user equipment, a second global unique temporary identifier based on the first global unique temporary identifier and the additional information; and receiving a second data transmission including the second global unique temporary identifier from the network.Type: GrantFiled: February 4, 2021Date of Patent: December 24, 2024Assignee: NOKIA TECHNOLOGIES OYInventors: Devaki Chandramouli, Srinivasan Selvaganapathy, Hannu Petri Hietalahti, Suresh Nair, Philippe Godin
-
Patent number: 12015920Abstract: Improved techniques for secure access control in communication systems are provided. In one example, in accordance with an authorization server function, a method comprises receiving a request from a service consumer in a communication system for access to a service type and one or more resources associated with the service type. The method determines whether the service consumer is authorized to access the service type and the one or more resources associated with the service type. The method generates an access token that identifies one or more service producers for the service type and the one or more resources associated with the service type that the service consumer is authorized to access, and sends the access token to the service consumer. The service consumer can then use the access token to access the one or more services and one or more resources. In addition to such resource level access authorization, target network function group access authorization can be performed.Type: GrantFiled: June 9, 2020Date of Patent: June 18, 2024Inventors: Nagendra Bykampadi, Laurent Thiebaut, Anja Jerichow, Suresh Nair
-
Patent number: 12010752Abstract: Improved techniques for control plane message management in a communication system are provided. For example, a method comprises transmitting control data over a control plane associated with a communication system using a first access identifier value, and transmitting user data over the control plane using a second access identifier value. The first access identifier value is distinct from the second access identifier value.Type: GrantFiled: April 18, 2019Date of Patent: June 11, 2024Assignee: NOKIA TECHNOLOGIES OYInventor: Suresh Nair
-
Patent number: 11997477Abstract: Improved security management techniques between user equipment and a communication system are provided. For example, techniques are provided for preventing malicious attacks via a user equipment deregistration process. In one example, a method comprises sending a deregistration request message from the given user equipment to a communication system to which the given user equipment is registered, wherein the deregistration request message is security-protected and comprises a temporary identifier assigned to the given user equipment. By not sending the deregistration request message with a subscription concealed identifier, the given user equipment prevents a malicious actor from succeeding with a deregistration attack replaying the subscription concealed identifier.Type: GrantFiled: April 30, 2020Date of Patent: May 28, 2024Assignee: Nokia Technologies OyInventors: Suresh Nair, Nagendra Bykampadi, Anja Jerichow
-
Patent number: 11991190Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to establish a user equipment context for a user equipment registered with the apparatus, the user equipment context being associated with an identity of the user equipment, determine that a plurality of network messages comprising the identity of the user equipment as sender fail a network message integrity process, and trigger, responsive to the determination, at least one of: 1) sending a paging message to the user equipment, and 2) initiating an authentication process with a sender of the network messages, and deletion the user equipment context as a response to successful completion of the authentication process.Type: GrantFiled: April 7, 2020Date of Patent: May 21, 2024Assignee: NOKIA TECHNOLOGIES OYInventors: Suresh Nair, Anja Jerichow, Nagendra S Bykampadi
-
Publication number: 20240154803Abstract: Techniques for authentication and key management for applications (AKMA) in a communication network are disclosed. For example, a method comprises receiving an indication from an application function that a first expiry time of a first application function key, generated using a first random value and configured to enable user equipment to participate in a session with the application function, has expired. The method generates a second application function key for the application function, using a second random value, with a second expiry time.Type: ApplicationFiled: April 27, 2023Publication date: May 9, 2024Inventors: Ranganathan MAVUREDDI DHANASEKARAN, Saurabh KHARE, Suresh NAIR
-
Publication number: 20240147244Abstract: A user equipment in a communication system, a unified subscription identifier data structure is constructed. The unified subscription identifier data structure includes a plurality of fields that specify information for a selected one of two or more subscription identifier types and selectable parameters associated with the selected subscription identifier type, and wherein the information in the unified subscription identifier data structure is useable by the user equipment to access one or more networks associated with the communication system based on an authentication scenario corresponding to the selected subscription identifier type. For example, during different authentication scenarios, the user equipment utilizes the unified subscription identifier data structure to provide the appropriate subscription identifier (e.g., SUPI, SUCI or IMSI) and associated parameters for a given authentication scenario.Type: ApplicationFiled: January 5, 2024Publication date: May 2, 2024Inventors: Suresh NAIR, Anja JERICHOW, Nagendra S BYKAMPADI, Dimitrios SCHOINIANAKIS
-
Patent number: 11956627Abstract: Techniques for securing an identifier of user equipment for a request external to a communication network are disclosed. For example, a method comprises receiving, at a network entity, a request for identification information for user equipment from an entity external to a communication network to which the network entity belongs. The network entity generates a secure identifier for the user equipment, wherein the secure identifier comprises an encrypted form of a public subscription identifier associated with the user equipment. The network entity sends the secure identifier to the external entity. The network entity receives the secure identifier in a subsequent request from the external entity. The network entity utilizes the received secure identifier to confirm the received secure identifier corresponds to the user equipment.Type: GrantFiled: February 19, 2021Date of Patent: April 9, 2024Assignee: NOKIA TECHNOLOGIES OYInventors: Suresh Nair, Laurent Thiebaut, Omar Elloumi
-
Patent number: 11902792Abstract: At given user equipment in a communication system, a unified subscription identifier data structure is constructed. The unified subscription identifier data structure includes a plurality of fields that specify information for a selected one of two or more subscription identifier types and selectable parameters associated with the selected subscription identifier type, and wherein the information in the unified subscription identifier data structure is useable by the given user equipment to access one or more networks associated with the communication system based on an authentication scenario corresponding to the selected subscription identifier type. For example, during different authentication scenarios, the given user equipment utilizes the unified subscription identifier data structure to provide the appropriate subscription identifier (e.g., SUPI, SUCI or IMSI) and associated parameters for the given authentication scenario.Type: GrantFiled: April 4, 2019Date of Patent: February 13, 2024Assignee: NOKIA TECHNOLOGIES OYInventors: Suresh Nair, Anja Jerichow, Nagendra S Bykampadi, Dimitrios Schoinianakis
-
Patent number: 11889304Abstract: Systems, methods, apparatuses, and computer program products directed to next generation (e.g., 5G systems) key set identifier(s) are provided. One method includes requesting, by a network node, authentication of a user equipment with an authentication server, receiving a master key and authentication parameters/vectors from the authentication server when authorization is successful, and verifying validity of the authentication request. When the verification is successful, the method may further include instantiating a security context for the user equipment and assigning a security context identifier for next generation system security context to the user equipment, and then sending a security mode command message to instruct the user equipment to instantiate security context using the security context identifier.Type: GrantFiled: September 20, 2016Date of Patent: January 30, 2024Assignee: NOKIA SOLUTIONS AND NETWORKS OYInventors: Anja Jerichow, Suresh Nair
-
Publication number: 20230362637Abstract: Systems, methods, apparatuses, and computer program products for creation of a PCS connection between the remote user equipment (UE) and the relay UE. The remote UE may provide its identifier (e.g., a subscription concealed identifier (SUCI)) to the relay UE and the relay UE may forward this identifier to the network so that the network can authenticate the remote UE. The network may check the authorization of using the relay UE and/or for relaying the remote UE (e.g., both the remote UE and the relay UE may be checked for a configuration that permits the relaying). For the authentication and authorization, the access and mobility management function (AMF) associated with the relay UE may forward the messages between the remote UE and the authentication server function (AUSF) of the remote UE. In this way, certain embodiments described herein may address certain security issues related to relaying a remote UE.Type: ApplicationFiled: May 13, 2020Publication date: November 9, 2023Inventors: Laurent THIEBAUT, György WOLFNER, Devaki CHANDRAMOULI, Suresh NAIR
-
Patent number: 11789803Abstract: In a communication system comprising a first network operatively coupled to a second network, wherein the first network comprises a first security edge protection proxy element operatively coupled to a second security edge protection proxy element of the second network, and wherein one of the first and second security edge protection proxy elements is a sending security edge protection proxy element and the other of the first and second security edge protection proxy elements is a receiving security edge protection proxy element, the receiving security edge protection proxy element receives a message from the sending security edge protection proxy element. The receiving security edge protection proxy element detects one or more error conditions associated with the received message. The receiving security edge protection proxy element determines one or more error handling actions to be taken in response to the one or more detected error conditions.Type: GrantFiled: May 7, 2019Date of Patent: October 17, 2023Assignee: Nokia Technologies OyInventors: Suresh Nair, Anja Jerichow, Nagendra S Bykampadi
-
Publication number: 20230292131Abstract: Techniques for preventing rogue network functions in a communication network are provided. For example, a method comprises obtaining information identifying one or more network entities suspected of malicious activity operating within the communication network, causing a re-authorization of the one or more network entities suspected of malicious activity, and in response to a re-authorization failure of at least one of the one or more network entities suspected of malicious activity, causing one or more remedial actions to occur within the communication network to prevent the at least one network entity that failed re-authorization from accessing other network entities in the communication network.Type: ApplicationFiled: July 14, 2021Publication date: September 14, 2023Inventors: Saurabh KHARE, Narasimha Rao PULIPATI, Suresh NAIR
-
Patent number: 11722891Abstract: In given user equipment seeking access to a first communication network (e.g., 5G network), wherein the given user equipment comprises a subscriber identity module (e.g., USIM) configured for a second communication network, and wherein the second communication network is a legacy network with respect to the first communication network (e.g., legacy 4G network), a method includes: initiating an authentication procedure with at least one network entity of the first communication network and selecting an authentication method to be used during the authentication procedure; and participating in the authentication procedure with the at least one network entity using the selected authentication method and, upon successful authentication, the given user equipment obtaining a set of keys to enable the given user equipment to access the first communication network.Type: GrantFiled: April 4, 2019Date of Patent: August 8, 2023Assignee: Nokia Technologies OyInventors: Suresh Nair, Anja Jerichow, Nagendra S Bykampadi
-
Publication number: 20230247433Abstract: Techniques for detecting and isolating rogue network entities in a communication network are provided. For example, a method comprises receiving from at least one network entity in a communication network a message identifying one or more network entities suspected of malicious activity operating within the communication network, and initiating one or more remedial actions within the communication network to prevent the one or more network entities suspected of malicious activity operating within the communication network from accessing other network entities in the communication network.Type: ApplicationFiled: June 24, 2021Publication date: August 3, 2023Inventors: Saurabh KHARE, Narasimha Rao PULIPATI, Nagendra BYKAMPADI, Suresh NAIR
-
Publication number: 20230232234Abstract: Example embodiments of the present disclosure relate to partial integrity protection in telecommunication systems. According to embodiments of the present disclosure, there is provided a solution for implementing partial integrity protection. The terminal device receives configuration of the partial integrity protection and applies the integrity protection on a portion of data packets which are communicated between communication devices. In this way, the communication devices can always provide integrity protection for services, regardless of their bit rate. Thus, security of communication can be improved. It also allows to provide integrity protection with limited impacts to power consumption and overheating.Type: ApplicationFiled: May 14, 2020Publication date: July 20, 2023Inventors: Benoist Sébire, Samuli Turtinen, Chunli Wu, Suresh Nair
-
Patent number: 11659387Abstract: Techniques for preventing sequence number leakage during user equipment authentication in a communication network are provided. For example, a method comprises obtaining a permanent identifier and an authentication sequence value that are unique to user equipment, concealing the permanent identifier and the authentication sequence value, and sending the concealed permanent identifier and the authentication sequence value in a registration message from the user equipment to a communication network. Then, advantageously, in response to receipt of an authentication failure message from the communication network, the user equipment can send a response message to the communication network containing a failure cause indication without a re-synchronization token.Type: GrantFiled: July 30, 2020Date of Patent: May 23, 2023Assignee: Nokia Technologies OyInventors: Suresh Nair, Ranganathan Mavureddi Dhanasekaran, Anja Jerichow
-
Publication number: 20230073757Abstract: An apparatus and a method for reallocation of global unique temporary identifier (GUTI) in 5G networks are disclosed. The method includes receiving, at a user equipment, a first message from a network, the first message including a first global unique temporary identifier and additional information, at least the first global unique temporary identifier being as-signed to the user equipment; receiving a first data transmission including the first global unique temporary identifier from the network; in response to receiving the first data transmission, deriving, at the user equipment, a second global unique temporary identifier based on the first global unique temporary identifier and the additional information; and receiving a second data transmission including the second global unique temporary identifier from the network.Type: ApplicationFiled: February 4, 2021Publication date: March 9, 2023Applicant: NOKIA TECHNOLOGIES OYInventors: Devaki CHANDRAMOULI, Srinivasan SELVAGANAPATHY, Hannu Petri HIETALAHTI, Suresh NAIR, Philippe Godin