×

Key storage and retrieval in a breakout component at the edge of a mobile data network

  • US 9,001,718 B2
  • Filed: 11/19/2012
  • Issued: 04/07/2015
  • Est. Priority Date: 12/19/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for processing data packets in a mobile data network that includes a radio access network coupled to a core network, the method comprising:

  • a plurality of antennas sending and receiving network messages between user equipment and a plurality of basestations in the radio access network, each basestation communicating with a corresponding one of the plurality of antennas;

    providing a breakout component in one of the plurality of basestations, the breakout component comprising;

    a system controller that controls function of the breakout component;

    a service processor that monitors the breakout component and provides control functions for the breakout component;

    a security subsystem that includes a key mechanism for storing keys to a non-volatile key storage and retrieving keys from the non-volatile key storage, wherein the keys are written to the non-volatile key storage in the security subsystem with a corresponding key identifier and a corresponding secret value during manufacture of the breakout component, the security subsystem comprising a tamper detection mechanism that detects tampering of the breakout component, and in response to a detected tampering of the breakout component, erases the keys in the non-volatile key storage;

    a telco breakout system that performs;

    defining an existing first data path in the radio access network for non-broken out data;

    defining a second data path for broken out data;

    identifying first data received from a corresponding basestation as data to be broken out;

    sending the first data on the second data path;

    forwarding other data that is not broken out on the first data path; and

    performing a plurality of services with respect to internet protocol (IP) data sent to the user equipment in response to an IP data request in the first data from the user equipment;

    writing the keys to the non-volatile key storage in the security subsystem during manufacture of the breakout component with each key having a corresponding key identifier and a corresponding secret value;

    when an application running on a first subsystem system in the breakout component requires access to a key stored in the non-volatile key storage, the application requesting access to the key from the first subsystem using the key identifier and secret value corresponding to the key, and in response to the request by the application to access the key, the first subsystem retrieving the key from the security subsystem and writing the key to a shared memory in the first subsystem;

    the application accessing the key in the shared memory;

    detecting tampering of the breakout component; and

    in response to a detected tampering of the breakout component, erasing the keys in the non-volatile key storage.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×