US 12,015,923 B2
Methods, systems, and computer readable media for mitigating effects of access token misuse
Rajiv Krishan, Bangalore (IN); and Doki Satish Kumar Patro, Bangalore (IN)
Assigned to ORACLE INTERNATIONAL CORPORATION, Redwood Shores, CA (US)
Filed by Oracle International Corporation, Redwood Shores, CA (US)
Filed on Dec. 21, 2021, as Appl. No. 17/557,324.
Prior Publication US 2023/0199497 A1, Jun. 22, 2023
Int. Cl. H04L 9/00 (2022.01); H04L 9/40 (2022.01); H04W 12/084 (2021.01); H04W 12/122 (2021.01)
CPC H04W 12/122 (2021.01) [H04L 63/0281 (2013.01); H04W 12/084 (2021.01)] 18 Claims
OG exemplary drawing
 
1. A method for mitigating effects of access token misuse, the method comprising:
at a network function (NF) comprising at least one processor:
receiving, from a sender, a service request comprising an access token, wherein the access token includes an access token identifier and usage attributes indicating a message rate limit, wherein the access token comprises an OAuth 2.0 access token and the usage attributes indicating the message rate limit include a claim of the OAuth 2.0 access token specifying a message rate limit or a message count limit;
after the service request is received, updating a message rate value of a rate counter for indicating a received rate of service requests associated with the access token;
determining, using the message rate limit or the message count limit specified by the claim of the OAuth 2.0 access token, that the service request should be rejected, wherein determining, using the message rate limit or the message count limit specified by the claim of the OAuth 2.0 access token that the service request should be rejected includes comparing the message rate value and the message rate limit or the message count limit specified by the claim of the OAuth 2.0 access token and determining that the message rate value exceeds the message rate limit or the message count limit specified by the claim of the OAuth 2.0 access token; and
rejecting the service request.