Methods and Systems for Bootstrapping an End-to-End Application Layer Session Security Keyset Based on a Subscriber Identity Master Security Credential
a subscriber identity and security credential technology, applied in the field of methods and systems, can solve the problems of insufficient security for many situations, insufficient scale to keep, and insufficient processing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012]Methods and systems for bootstrapping an end-to-end application layer session security keyset based on a subscriber identity master security credential are described herein. An application layer session may include any communication session between two computing devices (e.g., a client device and an application server system) that involves exchanging data between respective software modules (e.g., software applications) running on the computing devices. For example, the application layer session may involve communications that are associated with the application layer (i.e., Layer 7) of the Open Systems Interconnection model of networking (“the OSI model”) and that are exchanged (e.g., over a provider network) between software applications running on respective computing devices. In some examples, application layer sessions may refer, in whole or in part, to communications (e.g., packets, messages, data sequences, connections, etc.) and / or communication sessions that are assoc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


