摘要:
A method for receiving identity information for a mobile communication device is provided. The method comprises a memory module on the mobile communication device receiving, over a wireless communication link, a device identifier and an authentication key to replace identity information that had previously been provided to the memory module. The memory module may be one of a subscriber identity module (SIM), a universal integrated circuit card (UICC), a universal subscriber identity module (USIM), or a removable identity module (R-UIM).
摘要:
In Software-Defined Network (SDN), a trust controller and trust processor exchange hardware-trust data over an SDN southbound interface to maintain hardware-trust. A flow controller transfers a Flow Description Table (FDT) modification to the data-plane machine over the southbound interface. The flow controller transfers an FDT modification notice to the trust controller which transfers FDT security data over the southbound interface to authorize the FDT change in the SDN data-plane machine. The data-plane machine authorizes the FDT modification based on the FDT security data from the trust controller. The data-plane machine modifies the FDT in response to the successful authorization and processes user data traffic using the modified FDT. The trust controller may also transfer a Threat Description Table (TDT) to the data-plane machine to filter the user traffic for other threats.
摘要:
A method of establishing trusted operability between virtualized states of a Network Functions Virtualization (NFV) system providing a network service and operating in a virtual computing environment is disclosed. The method comprises receiving, by a physical server, a request to execute a trusted process, wherein the physical server comprises a processor with at least one core processing unit. The method further comprises assigning, by a trusted hypervisor, the execution of the trusted process to a first virtual server on a first core processing unit, dedicating physical portions of cache, memory, and disk storage to the first core processing unit; and executing the trusted process. The method further comprises receiving, by the physical server, a request to execute an untrusted process and assigning, by the trusted hypervisor, the execution of the untrusted process to a second virtual server on a second core processing unit, and restricting access to the trusted process.
摘要:
A wireless communication system receives device-hosted content delivery data structures that identify device-hosted media content. The wireless system transfers the data structures to a content distribution network. The wireless system receives network-hosted content delivery data structures from the content distribution network indicating network-hosted media content and the device-hosted media content and real-time data-rates for the network-hosted media content and the device-hosted media content. The wireless system receives the network-hosted media content and the device-hosted media content. The wireless system transfers the network-hosted content delivery data structures and multicasts the network-hosted media content and the device-hosted media content.
摘要:
A Network Function Virtualization (NFV) Management and Orchestration (MANO) data communication system drives an NFV Infrastructure (NFVI) to support a Network Service (NS). The NFV MANO system exchanges hardware trust data with a hardware-trusted subsystem in the NFVI to maintain hardware trust with the NFVI subsystem. The NFV MANO system exchanges NS data with an operations system and responsively exchanges network data to drive the NFVI to execute a Virtual Network Function (VNF) externally to the hardware-trusted subsystem to support the NS. The NFV MANO system also exchanges trust data for the NS with the operations system and responsively exchanges network data with the hardware-trusted subsystem to drive the subsystem to execute the VNF to support the NS.
摘要:
A communication network allocates internal Internet Protocol (IP) addresses to wireless communication devices and translates between external IP addresses and the internal IP addresses to transfer data communications between the wireless communication devices and data communication systems. The communication network receives discovery requests for the wireless communication devices and responsively transfers discovery responses describing the IP address allocations and translations for individual wireless communication devices. The communication network receives content delivery footprint data indicating the IP address allocations and translations for the wireless communication devices and transfers the content delivery footprint data to a content distribution network.