US 11,991,190 B2
Counteractions against suspected identity imposture
Suresh Nair, Whippany, NJ (US); Anja Jerichow, Grafing bei München (DE); and Nagendra S Bykampadi, Bangalore (IN)
Assigned to NOKIA TECHNOLOGIES OY, Espoo (FI)
Appl. No. 17/603,528
Filed by Nokia Technologies Oy, Espoo (FI)
PCT Filed Apr. 7, 2020, PCT No. PCT/EP2020/059880
§ 371(c)(1), (2) Date Oct. 13, 2021,
PCT Pub. No. WO2020/212202, PCT Pub. Date Oct. 22, 2020.
Claims priority of application No. 201941015116 (IN), filed on Apr. 15, 2019.
Prior Publication US 2022/0217161 A1, Jul. 7, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1416 (2013.01) [H04L 63/0876 (2013.01); H04L 63/1425 (2013.01); H04L 63/20 (2013.01)] 1 Claim
OG exemplary drawing
 
1. An apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to:
establish a user equipment context for a user equipment registered with the apparatus, the user equipment context being associated with an identity of the user equipment;
determine that a plurality of network messages comprising the identity of the user equipment as sender fail a network message integrity process; and
trigger at least one of: 1) sending a paging message to the user equipment, or 2) initiating an authentication process with a sender of the network messages, and deletion the user equipment context as a response to successful completion of the authentication process,
wherein the apparatus is configured to trigger the sending of the paging message, and wherein the apparatus is configured to process a response from the user equipment to the paging message, and where the response passes the network message integrity process, the apparatus is configured to do a non-access stratum re-keying of the user equipment to create a fresh non-access stratum security context from a current context.