Technologies for secure inter-virtual network function communication
First Claim
Patent Images
1. A computing device for secure inter-virtual network function communication, the computing device comprising:
- a processor;
a memory; and
a network function virtualization infrastructure module to;
(i) determine whether security has been established on the computing device for secure communication over at least one of an inter-virtual network function (VNF) communication network, an inter-virtual network function component (VNFC) communication network, or a VNF-VNFC communication network;
(ii) determine a cryptographic key for secure communication over the at least one of the inter-virtual network function (VNF) communication network, the inter-virtual network function component (VNFC) communication network, or the VNF-VNFC communication network based on a security policy of the computing device;
(iii) receive a communication from at least one of a first VNF of the computing device or a first VNFC of the computing device to be communicated to at least one of a second VNF or a second VNFC;
(iv) determine, based on the security policy, that the communication from the at least one of the first VNF or the first VNFC to the at least one of the second VNF or the second VNFC should be encrypted;
(v) encrypt the communication with the cryptographic key in response to the determination that the communication should be encrypted;
(vi) transmit the encrypted communication to the at least one of the second VNF or the second VNFC over the at least one of the inter-VNF, inter-VNFC, or VNF-VNFC network in response to a determination that the security has been established; and
(vii) prevent communication over the at least one of the inter-VNF, inter-VNFC, or VNF-VNFC communication network based on the security policy in response to a determination that the security has not been established.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies for secure inter-virtual network function communication include a computing device to determine a cryptographic key for secure communication over at least one of an inter-virtual network function (VNF) network, an inter-virtual network function component (VNFC) network, or a VNF-VNFC network based on a security policy of the computing device; and. The computing device securely communicates over at least one of the inter-VNF, inter-VNFC, or VNF-VNFC network based on the determined cryptographic key.
-
Citations
25 Claims
-
1. A computing device for secure inter-virtual network function communication, the computing device comprising:
-
a processor; a memory; and a network function virtualization infrastructure module to; (i) determine whether security has been established on the computing device for secure communication over at least one of an inter-virtual network function (VNF) communication network, an inter-virtual network function component (VNFC) communication network, or a VNF-VNFC communication network; (ii) determine a cryptographic key for secure communication over the at least one of the inter-virtual network function (VNF) communication network, the inter-virtual network function component (VNFC) communication network, or the VNF-VNFC communication network based on a security policy of the computing device; (iii) receive a communication from at least one of a first VNF of the computing device or a first VNFC of the computing device to be communicated to at least one of a second VNF or a second VNFC; (iv) determine, based on the security policy, that the communication from the at least one of the first VNF or the first VNFC to the at least one of the second VNF or the second VNFC should be encrypted; (v) encrypt the communication with the cryptographic key in response to the determination that the communication should be encrypted; (vi) transmit the encrypted communication to the at least one of the second VNF or the second VNFC over the at least one of the inter-VNF, inter-VNFC, or VNF-VNFC network in response to a determination that the security has been established; and (vii) prevent communication over the at least one of the inter-VNF, inter-VNFC, or VNF-VNFC communication network based on the security policy in response to a determination that the security has not been established. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. One or more machine-readable storage media comprising a plurality of instructions stored thereon that, in response to execution by a computing device, cause the computing device to:
-
determine whether security has been established on the computing device for secure communication over at least one of an inter-virtual network function (VNF) communication network, an inter-virtual network function component (VNFC) communication network, or a VNF-VNFC communication network determine a cryptographic key for secure communication over the at least one of the inter-virtual network function (VNF) communication network, the inter-virtual network function component (VNFC) communication network, or the VNF-VNFC communication network based on a security policy of the computing device; receive a communication from at least one of a first VNF of the computing device or a first VNFC of the computing device to be communicated to at least one of a second VNF or a second VNFC; determine, based on the security policy, that the communication from the at least one of the first VNF or the first VNFC to the at least one of the second VNF or the second VNFC should be encrypted; encrypt the communication with the cryptographic key in response to the determination that the communication should be encrypted; transmit the encrypted communication to the at least one of the second VNF or the second VNFC over the at least one of the inter-VNF, inter-VNFC, or VNF-VNFC network in response to a determination that the security has been established; and prevent communication over the at least one of the inter-VNF, inter-VNFC, or VNF-VNFC communication network based on the security policy in response to a determination that the security has not been established. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for secure inter-virtual network function communication by a computing device, the method comprising:
-
determining whether security has been established on the computing device for secure communication over at least one of an inter-virtual network function (VNF) communication network, an inter-virtual network function component (VNFC) communication network, or a VNF-VNFC communication network determining, by the computing device, a cryptographic key for secure communication over the at least one of the inter-virtual network function (VNF) communication network, the inter-virtual network function component (VNFC) communication network, or the VNF-VNFC communication network based on a security policy of the computing device; receiving a communication from at least one of a first VNF of the computing device or a first VNFC of the computing device to be communicated to at least one of a second VNF or a second VNFC; determining, based on the security policy, that the communication from the at least one of the first VNF or the first VNFC to the at least one of the second VNF or the second VNFC should be encrypted; encrypting the communication with the cryptographic key in response to the determination that the communication should be encrypted; transmitting the encrypted communication to the at least one of the second VNF or the second VNFC over the at least one of the inter-VNF, inter-VNFC, or VNF-VNFC network in response to a determination that the security has been established; and preventing communication over the at least one of the inter-VNF, inter-VNFC, or VNF-VNFC communication network based on the security policy in response to a determination that the security has not been established. - View Dependent Claims (25)
-
Specification