摘要:
A Network Function Virtualization Infrastructure (NFVI) executes Virtual Network Functions (VNFs) to transfer the VNF boot data to a distributed ledger. The distributed ledger performs a distributed ledger transaction with the VNF boot data to commit the VNF boot data to distributed ledger memory in a blockchain format. The NFVI executes the network VNF to deliver a network communication service. The NFVI loses VNF boot functionality and transfers a VNF boot request to the distributed ledger. The distributed ledger performs a distributed ledger transaction with the VNF boot request and the VNF boot data to transfer VNF recovery data to the NFVI and to commit the VNF boot request and the VNF recovery data to the distributed ledger memory in the blockchain format. The NFVI processes the VNF recovery data to recover the VNF boot functionality. The NFVI executes the recovered VNF to deliver the network communication service.
摘要:
A method of storing device information, provisioning data, and event information using distributed ledger technology (DLT). a manufacturer creates a first block of a first category comprising wireless communication device information, the block stored in a non-transitory memory of the device, a wireless communication service provider provisions device on a network, a server maintained by the wireless communication service provider creates a second block of a second category comprising information associated with the provisioning of the device, an application executing on the device stores the second block by in the non-transitory memory, creating a chain of blocks, the application uses at least part of the chain of blocks to provide authentication of the device to the network, and the block foundry server creates at least one block of a third category.
摘要:
An electronic device. The electronic device comprises a memory comprising a confidential information region and a non-confidential information region, a processor, and an application stored in the memory. When executed by the processor, the application determines if a reboot has occurred after a most recent power-off boot, where a reboot takes place without removing power from the processor and memory and, in response to determining that the reboot occurred after the most recent power-off boot, prevents access of applications to the confidential information region in the memory.
摘要:
An electronic device comprises a processor, a permissive sector, a trusted security zone that is separate from the permissive sector, a hardware driver, a first trusted application, stored in the trusted security zone, that is configured to invoke the hardware driver in response to activation instructions, and a second trusted application, stored in the trusted security zone, that when executed on the processor, configures the processor to: amass information about an uncompromised state of the hardware driver, store the information about the uncompromised state of the hardware driver in the trusted security zone, and compare, in response to receipt of activation instructions by the first trusted application, the information about the uncompromised state of the hardware driver with a current state of the hardware driver, and perform an action in response to a result of the comparison.
摘要:
A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.
摘要:
A method of executing a trusted application on a trusted security zone enabled electronic device. The method comprises responsive to a trusted security subzone not being provisioned on the electronic device, generating, by a server, a temporary trust token, transmitting the temporary trust token to the electronic device, and comparing the temporary trust token with a plurality of trust tokens stored in the electronic device to determine the trustworthiness of the temporary trust token. The method further comprises responsive to the temporary trust token being determined to be trustworthy, provisioning the non-provisioned trusted security subzone on the electronic device to be a temporary trust enablement, transmitting the trusted application through an encrypted channel to the temporary trust enablement, executing the trusted application in the temporary trust enablement, and removing the trusted application, the temporary trust enablement, and the temporary trust token when the trusted application is completed.
摘要:
A method of boot-loading an electronic device. The method comprises boot-loading a trusted execution environment (TEE) in a trusted security zone of a processor of the electronic device, where the TEE boot-loads before a rich execution environment (REE) boot-loads, launching a boot-loader authentication application by the TEE in the trusted security zone, determining a signature value of an REE boot-loader by the boot-loader authentication application over the instructions of the REE boot-loader, comparing the signature value of the REE boot-loader to an authentication signature value stored in the TEE, and, in response to the signature value of the REE boot-loader not matching the authentication signature value, taking action by the boot-loader authentication application.
摘要:
A method of storing device information, provisioning data, and event information using distributed ledger technology (DLT). a manufacturer creates a first block of a first category comprising wireless communication device information, the block stored in a non-transitory memory of the device, a wireless communication service provider provisions device on a network, a server maintained by the wireless communication service provider creates a second block of a second category comprising information associated with the provisioning of the device, an application executing on the device stores the second block by in the non-transitory memory, creating a chain of blocks, the application uses at least part of the chain of blocks to provide authentication of the device to the network, and the block foundry server creates at least one block of a third category.
摘要:
Systems, methods, and software for operating communication systems are provided herein. In one example, method of operating a communication system to establish secure communications between a first user device communicating in a first communication network and a second user device communicating in a second communication network is presented. The method includes, responsive to a communication request received from the first user device, establishing a secure communication link between the first user device and a first security node. When a second security node has a security relationship established with the first security node, the method includes establishing the secure communication link for the secure communications between the first user device and the second user device using at least the security relationship between the first security node and the second security node, and exchanging the secure communications over the secure communication link.
摘要:
Systems and methods disclosed herein relate to the protection of a plurality of protected personas on a protected network that may be isolated from a telecommunication service provider's network that supports a portable electronic device. The plurality of personas may be generated by the owners and/or administrators of the network on which the personas reside. Activating a persona on a device, whether that device is owned and maintained by the business or businesses affiliated with the protected network, enables access to a plurality of data on the business's network and restricts access to at least some of the capabilities and functionality of the device available under the original persona. Data created or modified while the protected persona is activated on the device may not be accessed while the original persona is active and may be uploaded dynamically or manually to the protected network.