摘要:
A method, network node and non-transitory computer readable media having stored thereon instructions for correlating a remote attestation quote with a virtualized network function (VNF) resource allocation event. The method comprises obtaining a set of VNF components (VNFCs) that require remote attestation. The method comprises obtaining an attestation quote for each VNFC of the set of VNFCs, the attestation quote ensuring that instances of each VNFC are used in a legitimate context. The method comprises correlating each attestation quote with the VNF resource allocation event.
摘要:
A security management system including a first TEE and a common TEE is provided. The first TEE is a secured environment for data associated with a first entity. The common TEE is a secured environment for data associated with any one of a plurality of entities. First anonymization parameters are shared between the first TEE and the common TEE. The first anonymization parameters are based at least in part on at least one privacy requirement of the first entity and at least one utility requirement of the security management system. The security management system includes processing circuitry configured to: anonymize first data associated with the first entity based at least in part on the first anonymization parameters, analyze at least the anonymized first data for performing data investigation, and generate analysis results based at least in part on the analysis of at least the anonymized first data.
摘要:
There are provided methods and corresponding systems for supporting protected collection of measurement data, representative of usage of network capabilities within a communication network, related to at least two logical and/or physical entities or nodes, also referred to as managed entities, managed by a management system associated with the communication network. By way of example, there is provided a method comprising the step of combining (S1) measurement data related to a set of at least two of the managed entities according to a controllable and/or detectable pattern. The controllable pattern is defining at least the order of managed entities in which the combining of measurement data is to be performed. The method also comprises enabling (S2) the combined measurement data to be collected for validation of existence of the controllable pattern in the combined measurement data.
摘要:
A system (200) is disclosed for managing a communication network subscription identifier associated with a device. The system comprises a Core Network node (210) configured to provide a subscription identifier for the device to a Device Management node with management responsibility for the device. The system further comprises a Verification node (230) configured to receive from the Device Management node the subscription identifier and a characteristic of the device, and to bind the subscription identifier to the characteristic such that the subscription identifier is uniquely associated with the characteristic. The system further comprises a Network Access node configured to obtain the subscription identifier from the device. The Verification node (230), Network Access node (220) and Core Network node (210) are configured to cooperate to verify that the device from which the Network Access node obtained the subscription identifier is in possession of the characteristic that is bound to the subscription identifier.
摘要:
There is provided mechanisms for authenticating an OEM entity as manufacturer of a communication device comprising an identification module. A method is performed by a network entity. The method comprises providing, towards the identification module, a challenge of a challenge- response authentication procedure. The method comprises obtaining, from the identification module, a first response of the challenge-response authentication procedure. The method comprises providing, towards the OEM entity and upon having obtained the response, the challenge. The method comprises obtaining, from the OEM entity, a second response of the challenge-response authentication procedure. The method comprises authenticating the OEM entity as the manufacturer of the communication device only when the second response matches the first response.
摘要:
There is provided mechanisms for deployment of components of a distributed application on destination runtime environments. A method is performed by a source runtime environment. The method comprises providing, with the components residing on the source runtime environment, public key fingerprints between the components, such that each component has its own public key and its own private key and is provided with a public key fingerprint of at least one other of the components. The method comprises providing migrating each of the components from the source runtime environment to its destination runtime environment for deployment of each component on its destination runtime environment.
摘要:
A method, performed by a virtualization platform of a node having a virtual trusted platform module, vTPM, for booting a virtual machine, VM in a trusted state, comprises measuring (S11) by the vTPM or a dedicated component of the virtualization platform an initial executable code (IEC) prior to a boot sequence of the VM and processing (S12) the initial measurement; measuring (S13) by the initial executable code, a second executable code during the boot sequence of the VM to provide (S14) a second measurement associated with the second executable code of the VM to the vTPM; and subsequently extending (S15) by the vTPM the processed initial measurement with the second measurement to obtain a first extended measurement.
摘要:
A method and encryption node (300) for providing encryption of a message m according to a selected encryption scheme. A noise computation engine (300a) in the encryption node (300) computes (3:1 ) a noise factor F as a function of a predefined integer parameter n of the selected encryption scheme and a random number r. When the message m is received (3:3) from a client (302) for encryption, an encryption engine (300b) in the encryption node (300), encrypts (3:4) the message m by computing a cipher text c as e = g m · F mod n 2 , where g is another predefined integer parameter of the selected encryption scheme. The cipher text c is then delivered (3:5) as an encryption of the message m, e.g. to the client (302) or to a cloud of processing resources (304).
摘要翻译:一种用于根据所选择的加密方案提供消息m的加密的方法和加密节点(300)。 加密节点(300)中的噪声计算引擎(300a)根据所选择的加密方案的预定整数参数n和随机数r来计算(3:1)噪声系数F。 当从客户端(302)接收到消息m(3:3)进行加密时,加密节点(300)中的加密引擎(300b)通过计算密文c来加密(3:4)消息m e = gm·F mod n2,其中g是所选加密方案的另一个预定义的整数参数。 密文C然后被传送(3:5)作为消息m的加密,例如。 到客户端(302)或处理资源云(304)。
摘要:
There is provided a method of an electronic device for providing a one-time proof of knowledge about a one-time signing key to a server without revealing the one- time signing key. The method comprises computing a hash as a hash function from the one-time signing key, and transmitting, to the server, the computed hash, an identity associated with the electronic device and a hash path of the hash. There is also provided a method of a server of a signing authority for issuing a time stamp signature. The method comprises receiving a message from an electronic device, the message including a hash, an identity associated with the electronic device and a hash path of the hash, checking whether the hash corresponds to a one-time signing key for a root hash included in a public certificate associated with the identity, checking whether an index corresponding to the hash path from the one-time signing key to the root hash corresponds to a correct time slot, and determining it to be proven that the electronic device is in possession of the correct one-time signing key when the checks are fulfilled. Electronic devices, servers, and computer programs are also disclosed.
摘要:
It is provided a method for adapting a communication device, the method is performed in a network and comprises the steps of: determining, based on acquired data, associated with the first communication device (100), that an adaptation of the first communication device (100) is required; comparing the required adaptation to a determined trust level of the first communication device (100); determining a suggested adaptation, based on the comparison; notifying the user of the device of the suggested adaptation; receiving a response to the notification from the user; and executing an adaptation based on the suggested adaptation and the received response.