×

Key storage and retrieval in a breakout component at the edge of a mobile data network

  • US 8,769,615 B2
  • Filed: 12/19/2011
  • Issued: 07/01/2014
  • Est. Priority Date: 12/19/2011
  • Status: Active Grant
First Claim
Patent Images

1. A mobile data network comprising:

  • a plurality of basestations, each basestation communicating with a corresponding antenna that transmits and receives radio signals to and from user equipment, wherein the plurality of basestations are part of a radio access network that communicates with a core network in the mobile data network, each basestation comprising;

    a breakout component that defines an existing first data path in the radio access network for non-broken out data, defines a second data path for broken out data, identifies first data corresponding to first user equipment received from a corresponding basestation as data to be broken out, sends the first data on the second data path, and forwards other data that is not broken out on the first data path, wherein the breakout component provides a first service with respect to internet protocol (IP) data sent to the first user equipment in response to an IP data request in the first data from the first user equipment, the breakout component comprising;

    a security subsystem that includes a key mechanism for storing keys to a non-volatile key storage and retrieving keys from the non-volatile key storage, wherein the keys are written to the non-volatile key storage in the security subsystem during manufacture of the breakout component; and

    a first subsystem, and when an application running on the first subsystem system requires access to a key stored in the non-volatile key storage, the application requests access to the key from the first subsystem, and in response to the request by the application to access the key, the first subsystem retrieves the key from the security subsystem using a key identifier corresponding to the key and writes the key to a shared memory in the first subsystem, wherein the application accesses the key in the shared memory.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×