×

Network function virtualization security and trust system

  • US 10,341,384 B2
  • Filed: 08/04/2015
  • Issued: 07/02/2019
  • Est. Priority Date: 07/12/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • an authentication server to authenticate an identity of a first network device and a second network device, the first network device executed to provide a first service for a third network device, and the second network device executed to provide a second service for the third network device, wherein the first service and the second service are provided over a network to the third network device,wherein the authentication server is configured to;

    initiate authentication of the identity of the first network device, the second network device, and the third network device, to create a chain of trusted devices in response to the third network device being initiated to operate using the first service and the second service before an integrity of the chain of trusted devices is verified, wherein the initiation of the authentication of the identity of the first network device and the second network device comprises a two factor authentication by the authentication server,receive an accumulated hash from the first network device, the accumulated hash sequentially built by cascading a hash sum through the second network device and the first network device,compare the accumulated hash against a predetermined hash representative of cooperative operation of the first service and the second service in the third network device,verify the integrity of the chain of trusted devices based on the comparison of the accumulated hash against the predetermined hash and by comparing monitored parameters in the third network device related to the cooperative operation of the first service and the second service with predetermined parameters of a federation of the first service and the second service, anddynamically adjust a level of the first service and the second service according to verification of the integrity of the chain of trusted devices.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×