发明名称 Key storage and retrieval in a breakout component at the edge of a mobile data network
摘要 Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. These services may require the use of keys. Keys are stored and retrieved from a non-volatile key storage in a way that assures subsystems that need the keys have access to the keys. The keys retrieved from the non-volatile key storage are stored in a shared memory in the requesting subsystem, which allows any applications that requires access to the keys to directly access the keys in the shared memory.
申请公布号 US9001718(B2) 申请公布日期 2015.04.07
申请号 US201213681358 申请日期 2012.11.19
申请人 International Business Machines Corporation 发明人 Billau Ronald L.;Di Luoffo Vincenzo V.;Grady Philip E.;Van Leeuwen George W.
分类号 H04B7/00;H04W4/00;H04W12/04;H04W40/02;H04W40/32 主分类号 H04B7/00
代理机构 Martin & Associates, LLC 代理人 Martin & Associates, LLC ;Martin Derek P.
主权项 1. A method for processing data packets in a mobile data network that includes a radio access network coupled to a core network, the method comprising: a plurality of antennas sending and receiving network messages between user equipment and a plurality of basestations in the radio access network, each basestation communicating with a corresponding one of the plurality of antennas; providing a breakout component in one of the plurality of basestations, the breakout component comprising: a system controller that controls function of the breakout component;a service processor that monitors the breakout component and provides control functions for the breakout component;a security subsystem that includes a key mechanism for storing keys to a non-volatile key storage and retrieving keys from the non-volatile key storage, wherein the keys are written to the non-volatile key storage in the security subsystem with a corresponding key identifier and a corresponding secret value during manufacture of the breakout component, the security subsystem comprising a tamper detection mechanism that detects tampering of the breakout component, and in response to a detected tampering of the breakout component, erases the keys in the non-volatile key storage;a telco breakout system that performs: defining an existing first data path in the radio access network for non-broken out data;defining a second data path for broken out data;identifying first data received from a corresponding basestation as data to be broken out;sending the first data on the second data path;forwarding other data that is not broken out on the first data path; andperforming a plurality of services with respect to internet protocol (IP) data sent to the user equipment in response to an IP data request in the first data from the user equipment; writing the keys to the non-volatile key storage in the security subsystem during manufacture of the breakout component with each key having a corresponding key identifier and a corresponding secret value; when an application running on a first subsystem system in the breakout component requires access to a key stored in the non-volatile key storage, the application requesting access to the key from the first subsystem using the key identifier and secret value corresponding to the key, and in response to the request by the application to access the key, the first subsystem retrieving the key from the security subsystem and writing the key to a shared memory in the first subsystem; the application accessing the key in the shared memory; detecting tampering of the breakout component; and in response to a detected tampering of the breakout component, erasing the keys in the non-volatile key storage.
地址 Armonk NY US