Abstract:
A wireless access point receives data from a data appliance and transfers the data to a distributed ledger function. The distributed ledger function stores the data in a distributed ledger database, determines additional network access for the data appliance, and transfers an instruction indicating the additional network access to the wireless access point. The wireless access point receives the network access instruction, schedules the additional network access for the data appliance per the network access instruction, wirelessly transfers a network access schedule to the data appliance, wirelessly receives additional data from the data appliance per the network access schedule, and transfers the additional data to the distributed ledger function. The distributed ledger function stores the additional data in the distributed ledger database, determines future network access for the data appliance, and transfers another access instruction indicating the future network access for the data appliance to the wireless access point.
Abstract:
In a wireless communication network, Network Function (NF) circuitry determines an initial NF status and indicates the initial NF status to Network Exposure Function (NEF) circuitry. The NEF circuitry processes the initial NF status, and in response, determines an initial NF privilege based on the initial NF status and indicates the initial NF privilege to the NF circuitry. The NF circuitry delivers a wireless data service to a wireless User Equipment (UE) based on the initial NF privilege. The NF determines a current NF status and indicate the current NF status to the NEF circuitry. The NEF circuitry processes the current NF status, and in response, determines a current NF privilege based on the current NF status and indicates the current NF privilege to the NF circuitry. The NF circuitry delivers the wireless data service to the UE based the current NF privilege.
Abstract:
A Network Function Virtualization (NFV) data communication system implements hardware trusted Management and Orchestration (MANO). A Hardware (HW) trust server issues a HW trust challenge to a MANO system. The MANO system hashes its physically-embedded hardware trust key to generate a HW trust result and transfers the HW trust result to the HW trust server. The HW trust server validates the hardware trust result and transfers a HW trust certificate to the MANO system. The MANO system transfers the HW trust certificate and NFV MANO data to an NFV Infrastructure (NFVI). The NFVI validates the HW trust certificate. The NFVI exchanges user data responsive to the NFV MANO data when the HW trust certificate is valid. The NFVI isolates the NFV MANO data when the HW trust certificate is not valid.
Abstract:
A data communication system exchanges user data between a first System-On-Chip (SOC) and a second SOC. The SOCs hash and transfer their read-only hardware-trust keys and receive hardware-trust digital certificates. The SOCs exchange and validate the hardware-trust digital certificates. The first SOC encrypts user data and transfers the encrypted user data responsive to the hardware-trust validations. The second SOC receives the encrypted user data, decrypts the encrypted user data, and processes the decrypted user data responsive to the hardware-trust validations. In some examples, the second SOC encrypts and transfers other user data responsive to the hardware-trust validations, and the first SOC receives, decrypts, and processes the other user data responsive to the hardware-trust validations. The first and/or the second SOC could be wireless communication devices.
Abstract:
A computer system transitions a virtual machine from a host computer to a target computer having a security key. The host computer transfers a security phrase to the target computer. The target computer applies the security key to the security phrase to generate a security response. That target computer transfers the security response to the host computer. The host computer determines whether the target computer can support the virtual machine based on the security response from the target computer. If the target computer is capable of supporting the virtual machine, then the host computer initiates a transition of the virtual machine from the host computer to the target computer. The determination of whether the target computer can support the virtual machine may be further based on resource availability, time-slice availability, and the other virtual machines executing on the target computer.
Abstract:
A wireless relay serves User Equipment (UE) with hardware-trusted wireless data communications over Institute of Electrical and Electronics Engineers (IEEE) 802.11 links and Long Term Evolution (LTE) links. The wireless relay maintains hardware-trusted wireless backhaul links to a data network. The wireless relay broadcasts an IEEE 802.11 Service Set Identifier (SSID) and a Long-Term Evolution (LTE) Network Identifier (NID). The UE wirelessly transfers a hardware-trusted attachment request using the 802.11 SSID or the LTE NID. The wireless relay validates hardware-trust of the UE, and in response, establishes a hardware-trusted attachment of the UE. The wireless relay exchanges user data with the UE using hardware-trusted circuitry. The wireless relay exchanges the user data over hardware-trusted wireless backhaul links.
Abstract:
A Network Function Virtualization (NFV) Software Defined Network (SDN) maintains hardware trusted communications. A source trust controller and a target trust controller establish hardware trust with a trust server. The trust server exchanges information with the source trust controller that indicates the hardware trust for a target vSW. The source trust controller exchanges the information with the source vSW that indicates the hardware trust for the target vSW. The source vSW receives a Virtual Data Unit (VDU) from the source VNF for delivery to the target VNF over the target vSW, and before transfer, the source vSW verifies hardware trust of the target vSW based on the HT information. Responsive to the hardware trust verification, the source vSW transfers the VDU for the delivery to the target vSW. The target vSW transfers the VDU to the target VNF.
Abstract:
An Internet Protocol/Wave Division Multiplex (IP/WDM) network implements Hardware Root of Trust (HRoT) and Network Function Virtualization (NFV). An NFV server generates and transfers IP control data and WDM control data to IP/WDM machines. The IP/WDM machines exchange IP packets between IP ports and WDM interfaces based on the IP control data. The IP/WDM machines exchange the IP packets between the WDM interfaces and WDM ports based on the WDM control data. The IP/WDM machines transmit and receive the IP packets from the WDM ports using different optical wavelengths. The IP/WDM machines transfer HRoT data indicating the optical wavelengths used to exchange the IP packets and indicating encoded hardware keys physically-embedded on the IP/WDM machines. The NFV server receives the HRoT data and process the encoded hardware keys and the optical wavelengths to validate HRoT status of the IP/WDM machines.
Abstract translation:互联网协议/波分复用(IP / WDM)网络实现了信任硬件根(HRoT)和网络功能虚拟化(NFV)。 NFV服务器将IP控制数据和WDM控制数据生成并传输到IP / WDM机器。 IP / WDM机器根据IP控制数据在IP端口和WDM接口之间交换IP数据包。 IP / WDM机器根据WDM控制数据在WDM接口和WDM端口之间交换IP数据包。 IP / WDM机器使用不同的光波长从WDM端口发送和接收IP数据包。 IP / WDM机器传送指示用于交换IP数据包的光波长的HRoT数据,并指示物理嵌入在IP / WDM机器上的编码硬件密钥。 NFV服务器接收HRoT数据并处理编码的硬件密钥和光波长,以验证IP / WDM机器的HRoT状态。
Abstract:
A data communication system has data processing circuitry to transfer data communications. Trust modules establish and maintain network trust of the data processing circuitry. A Network Function Virtualization (NFV) system executes hypervisors to establish and maintain an NFV processing environment in the data processing circuitry. A Software Defined Network (SDN) system executes SDN applications, SDN controllers, and SDN data machines in the data processing circuitry during NFV slices to transfer the data communications. The data communication system maintains a data structure that associates, based on execution relationships, individual blocks of the data processing circuitry, the trust modules, the hypervisors, the NFV slices, the SDN applications, the SDN controllers, and the SDN data machines. The database may be queried for the hardware trust data related to specific NFV and SDN software modules.
Abstract:
A wireless communication device generates content-delivery data indicating stored media content, content-delivery interface capability, tethered media devices, and Internet Protocol (IP) address data for the wireless communication device and for the tethered media devices. The wireless communication device wirelessly transfers the content-delivery data to a wireless communication network for delivery to a content distribution network. The wireless communication device transfers at least a portion of the stored media content to the wireless communication network for subsequent content delivery.