×

System, method, and computer program for inter-module communication in a network based on network function virtualization (NFV)

  • US 9,838,265 B2
  • Filed: 12/16/2014
  • Issued: 12/05/2017
  • Est. Priority Date: 12/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for communicating information in a communication network using network function virtualization (NFV-based communication network), said method comprising:

  • creating, by a computer system including a first entity of said NFV-based communication network, a communication in accordance with a predefined virtual network function (VNF) protocol, wherein said communication is generated in accordance with said VNF protocol to include;

    an identification of a sender of said communication, and an identification of a chain of receivers of said communication,authentication data that enables said sender to verify that only said chain of receivers can decrypt said communication,an identification of a procedure associated with said NFV-based communication network,an authorization of at least one of said sender and said chain of receivers to perform said procedure,a work-flow for the procedure that includes for each receiver in the chain of receivers;

    (a) one or more instructions to be executed by the receiver,(b) an indication of data to upload to the communication, and(c) an indication of a next receiver in the chain of receivers to which the communication is to be forwarded,a history for the procedure that tracks an execution status of the procedure;

    sending said communication through said computer system from said first entity of said NFV-based communication network, said first entity being said sender;

    receiving said communication by a second entity of said NFV-based communication network, said second entity being included within said computer system or within another computer system, and said second entity being a first receiver in the chain of receivers; and

    processing said communication, by said second entity through said computer system or through said other computer system including said second entity, based on said authorization.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×