US20170230428A1 - Session initiation protocol (sip) communications over trusted hardware - Google Patents

Session initiation protocol (sip) communications over trusted hardware Download PDF

Info

Publication number
US20170230428A1
US20170230428A1 US15/496,465 US201715496465A US2017230428A1 US 20170230428 A1 US20170230428 A1 US 20170230428A1 US 201715496465 A US201715496465 A US 201715496465A US 2017230428 A1 US2017230428 A1 US 2017230428A1
Authority
US
United States
Prior art keywords
sip
hardware
ims
trusted
trust
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/496,465
Inventor
Lyle Walter Paczkowski
Arun Rajagopal
Ronald R. Marquardt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sprint Communications Co LP
Original Assignee
Sprint Communications Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sprint Communications Co LP filed Critical Sprint Communications Co LP
Priority to US15/496,465 priority Critical patent/US20170230428A1/en
Assigned to SPRINT COMMUNICATIONS COMPANY L.P. reassignment SPRINT COMMUNICATIONS COMPANY L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PACZKOWSKI, LYLE WALTER, RAJAGOPAL, ARUN, MARQUARDT, RONALD R.
Publication of US20170230428A1 publication Critical patent/US20170230428A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L65/1006
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1045Proxies, e.g. for session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • H04W28/22Negotiating communication rate

Definitions

  • IP Internet Protocol
  • the communication devices exchange IP packets for data services like internet access, media streaming, and file transfers.
  • the communication devices are coupled to various IP access networks that are interconnected to one another over communication interfaces like core IP networks or direct communication links.
  • the IP access networks may be wireless to provide user mobility.
  • Long Term Evolution (LTE) Networks are exemplary wireless IP access networks.
  • Session Initiation Protocol is a popular form of signaling to control the exchange of IP packets between communication devices for media streaming and other data transfer services.
  • the communication devices register their IP addresses with the SIP systems over the IP access networks.
  • the SIP control systems resolve names and numbers for the communication devices to their registered IP addresses.
  • the SIP control systems use the registered IP addresses to exchange SIP messaging for the IP communications sessions.
  • the end-user devices then exchange IP packets over the IP access networks and their communication interfaces.
  • IMSs Internet Multimedia Subsystems
  • Hardware trust systems ensure communication network security and control.
  • the hardware trust systems maintain physical separation between trusted hardware and untrusted hardware.
  • the trust systems control software access to the trusted hardware but allow interaction between open and secure software components through secure bus interfaces, memories, time slices, and switching circuits.
  • the trust systems establish trust with one another by using secret keys embedded in their hardware to generate hash results for remote verification by other trust systems also knowing the secret keys and the hash algorithms.
  • NFV Network Function Virtualization
  • NFV servers process virtual machines that operate as communication network elements such as gateways, controllers, databases, and the like.
  • the NFV servers exchange data packets with other network elements like Ethernet switches and Internet Protocol (IP) routers to support data services like mobile internet access, user messaging, and media transfers.
  • IP Internet Protocol
  • the NFV servers implement hypervisors and context switching to operate in a time-sliced manner.
  • the NFV servers typically separate different virtual networks and/or services in the different NFV time slices.
  • a server system exchanges trust signaling with a first access network, establishes hardware trust with the first access network, and determines that the first access network has established hardware trust with a communication interface to a second access network.
  • the server system exchanges Session Initiation Protocol (SIP) signaling with a SIP system, establishes hardware trust with the SIP system, and determines that the SIP system has established hardware trust with the second access network and a second communication device.
  • SIP Session Initiation Protocol
  • the server system exchanges SIP signaling with a first communication device and establishes hardware trust with the first communication device.
  • the server system receives a SIP Invite requesting a communication session between the first communication device and the second communication device over hardware-trusted systems, and based on the hardware trust, the server system responsively forwards the SIP Invite to the SIP system for delivery to the second communication device.
  • FIGS. 1-3 illustrate a communication system to establish data communication bearers over trusted hardware between communication devices.
  • FIG. 4 illustrates an Internet Multimedia Subsystem (IMS) to control data communication sessions over trusted hardware between Session Initiation Protocol (SIP) communication devices.
  • IMS Internet Multimedia Subsystem
  • FIG. 5 illustrates a Network Function Virtualization (NFV) communication system having a Long Term Evolution (LTE) network and an Internet Multimedia Subsystem (IMS) to establish data bearers over trusted hardware and proper NFV time-slices for LTE User Equipment (UE).
  • NFV Network Function Virtualization
  • LTE Long Term Evolution
  • IMS Internet Multimedia Subsystem
  • FIG. 6 illustrates an Enterprise Internet Protocol (IP) network and an Internet Multimedia Subsystem (IMS) to establish data bearers over trusted hardware for user computers.
  • IP Internet Protocol
  • IMS Internet Multimedia Subsystem
  • FIGS. 1-3 illustrate communication system 100 to establish data bearers 141 - 142 over trusted hardware between communication devices 101 - 102 .
  • Communication system 100 comprises communication devices 101 - 102 , access networks 111 - 112 , communication interface 113 , server system 121 , and Session Initiation Protocol (SIP) signaling system 122 .
  • FIG. 1 is exemplary, and in some examples, systems 121 - 122 could be the same system, and access networks 101 - 102 could be the same network.
  • Communication devices 101 - 102 comprise phones, tablet computers, servers, intelligent machines, and/or some other apparatus having a SIP transceiver.
  • Access networks 111 - 112 comprise wireless communication networks, fiber/coax communication networks, satellite communication systems, and/or some other data linkage between communication devices 101 - 102 .
  • portions of access networks 111 - 112 use Network Function Virtualization (NFV) server systems running access network virtual machines. Exemplary NFV configurations and operations for communication system 100 are described with respect to FIG. 3 and FIG. 5 .
  • NFV Network Function Virtualization
  • Communication interface 113 comprises one or more data communication networks, systems, or links.
  • communication interface 113 comprises a core IP network.
  • communication interface 113 comprises a direct physical coupling like fiber cabling, backplane interfaces, and the like.
  • communication interface 113 might include an IP router or Ethernet switch.
  • communication interface 113 is a virtual link between virtual machines running on an NFV server system.
  • Server system 121 comprises a computer system having processing circuitry, memory devices, and communication transceivers that perform SIP proxy services.
  • SIP signaling system 122 comprises a computer system having processing circuitry, memory devices, and communication transceivers that perform SIP proxy services.
  • server system 121 and SIP signaling system 122 each comprise an Internet Multimedia Subsystem (IMS).
  • IMS Internet Multimedia Subsystem
  • server system 121 and SIP signaling system 122 use NFV server systems running SIP and/or IMS virtual machines.
  • Communication device 101 and access network 111 communicate over data bearer 141 .
  • Access network 111 and access network 112 communicate over communication interface 113 .
  • Access network 112 and communication device 102 communicate over data bearer 142 .
  • Data bearers 141 - 142 might be wireless communication links, fiber/coax communication links, satellite communication links, and/or some other communication media between communication devices 101 - 102 .
  • data bearers 141 - 142 are virtual links between virtual machines running on an NFV server system.
  • Signaling links 131 - 135 might be wireless communication links, fiber/coax communication links, satellite communication links, and/or some other communication media. Portions of signaling links 131 - 135 may traverse portions of communication interface 113 and data bearers 141 - 142 . In addition, one or more signaling links 131 - 135 may be virtual links between virtual machines that are running on an NFV server system.
  • signaling messages are enumerated with the same reference numerals as the signaling links that they traverse.
  • a SIP message that traverses signaling links 131 - 132 is referred to as SIP message 131 / 132 .
  • SIP message 131 / 132 a SIP message that traverses signaling links 131 - 132 .
  • additional signaling occurs in a supporting and contemporaneous manner to that described herein to implement data bearers, but for clarity, the discussion focuses on innovative aspects of the signaling.
  • Communication system 100 exchanges SIP signaling to establish, request, and report hardware trust.
  • Communication system 100 exchanges SIP signaling having hardware trust requirements to indicate that only trusted hardware should be used for the communication path.
  • This hardware trust data could be described in a separate SIP trust header contained in various SIP messages, such as: REGISTRATION, INVITE, ACK, CANCEL, BYE, OPTIONS, REFER, and Provisional Acknowledgement (PRACK).
  • PRACK Provisional Acknowledgement
  • the hardware trust data could also be noted through a trust code or flag located in another SIP header, and then specific hardware trust data and requirements could be specified in the accompanying Session Description Protocol (SDP) file.
  • SDP Session Description Protocol
  • Server system 121 exchanges trust signaling 132 with access network 111 and responsively establishes hardware trust with access network 111 .
  • the trust signaling uses Diameter, SIP, or some other data communication protocol.
  • Server system 121 typically establishes hardware trust with one or more network elements in access network 111 that have trust software modules.
  • the trust software modules assert physical control over data access to network element hardware, such as microprocessors, bus interfaces, memories, communication ports, and the like.
  • the trust software modules direct the hardware to read secret keys physically embedded in the hardware itself, such as a code stored in non-volatile read-only circuit.
  • the trust software modules transfer encoded versions of the secret keys to server system 121 to maintain hardware trust.
  • server system 121 might repeatedly transfer random numbers to a network element in access network 111 .
  • the trust module in the network element would perform a one-way hash on the random numbers with its secret key and return the hash results to server system 121 .
  • Server system 121 compares the received hash results to its own self-generated hash results to verify the hardware trust of the network element.
  • the trusted network element could then be used as a trust proxy to establish and maintain trust with other network elements in access network 111 and report this hardware trust to server system 121 .
  • Server system 121 exchanges SIP signaling 133 with SIP signaling system 122 and responsively establishes hardware trust with SIP signaling system 122 .
  • the SIP signaling could be for REGISTRATION, OPTIONS, or PRACK.
  • Server system 121 typically establishes hardware trust with SIP servers in SIP signaling system 122 that have trust software modules.
  • the trust software modules assert physical control over data access to SIP server hardware, such as microprocessors, bus interfaces, memories, communication ports, and the like.
  • the trust software modules direct the hardware to read secret keys physically embedded in the hardware itself, such as a code stored in non-volatile read-only circuit.
  • the trust software modules transfer encoded versions of the secret keys to server system 121 to maintain hardware trust.
  • Server system 121 could repeatedly transfer random numbers to an IMS server in SIP signaling system 122 .
  • the trust module in the IMS server would perform a one-way hash on the random numbers with its secret key and return the hash results to server system 121 .
  • Server system 121 compares the received hash results to its own self-generated hash results to verify the hardware trust of the IMS server.
  • the trusted IMS server could then be used as a trust proxy to establish and maintain trust with other SIP servers in SIP signaling system 122 and report this hardware trust to server system 121 .
  • Access networks 111 - 112 typically perform hardware trust verification with communication interface 113 .
  • Server system 121 exchanges trust signaling 132 with access network 111 and responsively determines that access network 111 has established hardware trust with communication interface 113 to access network 112 .
  • access network 111 is a trust proxy for communication interface 113 .
  • SIP signaling system 122 typically performs hardware trust verification with access network 112 .
  • Server system 121 exchanges SIP signaling 133 with SIP signaling system 122 and responsively determines that SIP signaling system 122 has established hardware trust with access network 112 .
  • the SIP signaling could be for REGISTRATION, OPTIONS, or PRACK.
  • SIP signaling system 122 is a trust proxy for access network 112 .
  • SIP signaling system 122 typically performs hardware trust verification with communication device 102 .
  • Server system 121 exchanges SIP signaling 133 with SIP signaling system 122 and responsively determines that SIP signaling system 122 has established hardware trust with communication device 102 .
  • the SIP signaling could be for REGISTRATION, OPTIONS, or PRACK.
  • SIP signaling system 122 is a trust proxy for communication device 102 .
  • Server system 121 exchanges SIP signaling 131 / 132 with communication device 101 and responsively establishes hardware trust with communication device 101 .
  • the SIP signaling is typically SIP Registration signaling.
  • Server system 121 typically establishes hardware trust with circuitry in communication device 101 that processes a trust software module.
  • the trust software module asserts physical control over data access to device 101 hardware, such as microprocessors, bus interfaces, memories, communication ports, and the like.
  • the trust software module directs the device hardware to read a secret key physically embedded in the hardware.
  • the trust software module transfers encoded versions of the secret key to server system 121 to maintain hardware trust.
  • Server system 121 might repeatedly transfer random numbers to a microprocessor core in communication device 101 .
  • the trust module executing in the microprocessor core would perform a one-way hash on the random numbers with the microprocessor core's secret key and return the hash results to server system 121 .
  • Server system 121 compares the received hash results to its own self-generated hash results to verify the hardware trust of the microprocessor core.
  • the trusted microprocessor core could then be used as a trust proxy to establish and maintain trust with other components in communication device 101 and report this hardware trust to server system 121 .
  • Server system 121 receives SIP Invite 131 / 132 from communication device 101 over access network 111 .
  • SIP Invite 131 / 132 requests a media communication session between communication device 101 and communication device 102 over trusted hardware systems.
  • One or more hardware trust requirements may be included in a Session Description Protocol (SDP) file in SIP Invite 131 / 132 .
  • SIP Invite 131 / 132 includes NFV requirements, such as an ordered list of required NFV time-slices (or network IDs associated with the NFV time-slices).
  • Server system 121 processes standard networking data to determine that communication device 101 can exchange data communications with communications device 102 from end-to-end over access networks 111 - 112 and communication interface 113 .
  • server system 121 In response to the trusted hardware requirement in SIP Invite 131 / 132 , server system 121 processes signaling data records to determine that system 121 currently has established hardware trust with communication device 101 and access network 111 . Server system 121 also processes signaling data records to determine that trusted access network 111 currently has established hardware trust with communication interface 113 . Server system 121 processes signaling data records to determine that trusted SIP signaling system 122 currently has established hardware trust with access network 112 and with communication device 102 . Server system 121 may process signaling data records to determine that trusted access network 112 currently has established hardware trust with communication interface 113 .
  • server system 121 Based on this hardware trust of the end-to-end communication path, server system 121 responsively transfers SIP Invite 133 / 134 / 135 for the communication session to communication device 102 over SIP signaling system 122 and access network 112 .
  • One or more hardware trust requirements may be included in an SDP file in SIP Invite 133 / 134 / 135 .
  • server system 121 also verifies that proper NFV time slices are available for the communication session before forwarding SIP Invite 133 / 134 / 135 .
  • Server system 121 may then receive SIP OK 133 / 134 / 135 from communication device 102 over access network 112 and SIP signaling system 122 .
  • Server system 121 responsively transfers a communication request to access network 111 to establish a data link from communication device 101 to access network 112 over the trusted hardware.
  • a Proxy Call State Control Function (P-CSCF) in server system 121 could transfer a Diameter message to a Policy Charging and Rules Function (PCRF) in the access network 111 to establish a live-video data bearer 141 between communication device 101 and communication interface 113 during a specific NFV time-slice.
  • P-CSCF Proxy Call State Control Function
  • PCRF Policy Charging and Rules Function
  • Server system 121 exchanges trust signaling with access network 111 ( 201 ).
  • Server system 121 establishes hardware trust with access network 111 and determines that access network 111 has established hardware trust with communication interface 113 to access network 112 .
  • Server system 121 exchanges Session Initiation Protocol (SIP) signaling with SIP system 122 ( 202 ).
  • SIP Session Initiation Protocol
  • Server system 121 establishes hardware trust with SIP system 122 .
  • Server system 121 determines that SIP system 122 has established hardware trust with access network 112 and communication device 102 .
  • Server system 121 exchanges SIP signaling with communication device 101 and establishes hardware trust with communication device 101 ( 203 ).
  • SIP Session Initiation Protocol
  • Server system 121 receives a SIP Invite requesting a communication session between communication device 101 and communication device 102 over trusted hardware systems, and based on the established hardware trust, server system 121 responsively forwards the SIP Invite to SIP system 122 for delivery to communication device 102 ( 204 ). Note that if the end-to-end communication path has current hardware trust, then server system 121 forwards the SIP Invite having the hardware trust requirement. If the end-to-end communication path does not have current hardware trust, then server system 121 does not forward the SIP Invite having the hardware trust requirement—although server system 121 may take remedial measures.
  • server system 121 may send a different SIP message (possibly a modified Invite) to SIP signaling system 122 that requests the establishment and reporting of hardware trust with communication device 102 . Once this hardware trust is reported, then server system 121 forwards the SIP Invite for the communication session to SIP system 122 for delivery to communication device 102 . Likewise, if access network 112 has not yet established trust, then server system 121 may send a different SIP message (possibly a modified Invite) to SIP signaling system 122 to establish and report hardware trust with access network 112 . Once this hardware trust is reported, then server system 121 forwards the SIP Invite for the communication session to SIP system 122 for delivery to communication device 102 . These hardware trust requests and reports could be transported in a SIP trust header, data flag in another SIP header, and/or information in an SDP file.
  • NFV Network Function Virtualization
  • access networks 111 - 112 are coupled through communication interface 113 that comprises virtual machine gateways and links that run on a shared and trusted NFV server system.
  • communication interface 113 comprises virtual machine gateways and links that run on a shared and trusted NFV server system.
  • portions of access network 111 and access network 112 may run on the same NFV server during different NFV time slices.
  • communication system 100 exchanges SIP signaling to establish, request, and report NFV data.
  • Communication system 100 exchanges SIP signaling having NFV requirements that indicate NFV time slices that should be used for the communication path.
  • This NFV data could be described in a separate SIP NFV header contained in various SIP messages, such as: REGISTRATION, INVITE, ACK, CANCEL, BYE, OPTIONS, REFER, and Provisional Acknowledgement (PRACK).
  • PRACK Provisional Acknowledgement
  • the NFV data could also be noted through an NFV code or flag located in another SIP header, and then specific NFV data and requirements could be specified in the accompanying Session Description Protocol (SDP) file.
  • SDP Session Description Protocol
  • access networks 111 - 112 exchange trust signaling to establish hardware trust with one another.
  • trust software in access networks 111 - 112 direct their respective hardware to read their hardware keys and transfer hashed products of their hardware keys.
  • the trust software in access networks 111 - 112 then direct their hardware to compare the received hash products to their self-generated hash products to verify hardware trust of one another.
  • Access network 111 and communication device 101 exchange trust and NFV signaling.
  • the trust signaling establishes hardware trust between device 101 and network 111 .
  • the NFV signaling indicates NFV data like available NFV time-slices and their corresponding characteristics. For example, the NFV signaling may indicate that NFV network “X 27 ” should be used for sensitive SIP-based communications.
  • Access network 112 and communication device 102 exchange trust signaling to establish hardware trust with one another.
  • Access network 112 and communication device 102 exchange NFV signaling to indicate NFV data.
  • Access network 111 and server system 121 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for device 101 and network 111 , report the hardware trust between access networks 111 - 112 , and report the hardware trust between access network 111 and communication device 101 .
  • Access network 112 and SIP system 122 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for device 102 and network 112 , report the hardware trust between access networks 111 - 112 , and report the hardware trust between access network 112 and communication device 102 .
  • Server system 121 and communication device 101 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for device 101 and network 111 , and report the hardware trust between access network 111 and communication device 101 .
  • SIP system 122 and communication device 102 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for device 102 and network 112 , and report the hardware trust between access network 112 and communication device 102 .
  • Server system 121 and SIP system 122 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for devices 101 - 102 and networks 111 - 112 , and report the hardware trust between access network 111 and communication device 101 , access network 111 and server system 121 , access network 111 and access network 112 , access network 112 and communication device 102 , access network 112 and SIP system 122 , server system 121 and communication device 101 , and SIP system 122 and communication device 102 .
  • Server system 121 sorts and associates the trust data and the NFV data for subsequent SIP Invite processing.
  • Server system 121 subsequently receives a SIP Invite for a communication session between communication device 101 and communication device 102 having a hardware trust requirement and an NFV time-slice requirement.
  • the hardware trust requirement could be denoted by a separate SIP trust header, trust data flag in another SIP header, and/or trust information in an SDP file.
  • the NFV time-slice requirement could be denoted by a separate SIP NFV header, NFV data flag in another SIP header, and/or NFV information in an SDP file.
  • Server system 121 processes networking data to determine that communication devices 101 - 102 can exchange data communications over access networks 111 - 112 .
  • Server system 121 processes the hardware trust requirement and the associated signaling data to determine that the data communication path formed by communication devices 101 - 102 and access networks 111 - 112 currently has end-to-end hardware trust.
  • Server system 121 processes the NFV time-slice requirement and the associated NFV signaling data to determine that the data communication path formed by communication devices 101 - 102 and access networks 111 - 112 currently uses accepted NFV time slices.
  • the time slice requirement in the SIP Invite may indicate that only NFV time-slices with a specified hardware-trust rating be used, and based on the NFV data, server system 121 could verify that the data path uses NFV time-slices having the specified hardware-trust rating.
  • server system 121 transfers the SIP Invite with the hardware trust and NFV time-slice requirements to SIP system 122 .
  • SIP system 122 transfers the SIP Invite with the hardware trust and NFV time-slice requirements to communication device 102 .
  • SIP system 122 receives a SIP OK having hardware trust and NFV time-slice requirements from communication device 102 and transfers the SIP OK to server system 121 . Responsive to the SIP OK with the hardware trust and NFV time-slice requirements, SIP system 122 transfers a communication request to access network 112 to establish a data bearer from communication device 102 to access network 111 over trusted hardware and using the proper NFV time-slice. Access network 112 confirms the trusted data bearer and proper NFV time-slice with communication device 102 .
  • Server system 121 receives the SIP OK having the hardware trust NFV time-slice requirements from SIP system 122 and transfers the SIP OK to communication device 101 . Responsive to the SIP OK with the hardware trust NFV time-slice requirements, server system 121 transfers a communication request to access network 111 to establish a trusted data bearer from communication device 101 to access network 112 using the appropriate NFV time-slice. Access network 111 confirms the trusted data bearer and NFV time-slice with communication device 101 . Communication device 101 and communication device 102 then exchange data communications from end-to-end over access networks 111 - 112 using trusted hardware and proper NFV time-slices.
  • server system 121 forwards the SIP Invite having the hardware trust and NFV time-slice requirements to communication device 102 only if the end-to-end communication path has the current hardware trust and uses the proper NFV time-slices. If the end-to-end communication path does not have current hardware trust, then server system 121 may take remedial measures not shown on FIG. 3 . For example, if communication device 102 has not yet established trust, then server system 121 may send a SIP message (possibly a modified Invite) that requests trusted SIP system 122 to establish and report hardware trust with communication device 102 .
  • SIP message possibly a modified Invite
  • server system 121 forwards the SIP Invite for the communication session between devices 101 - 102 to SIP system 122 for delivery to communication device 102 .
  • server system 121 may send a SIP message (possibly a modified Invite) to SIP signaling system 122 to establish and report hardware trust with access network 112 .
  • server system 121 forwards the SIP Invite for the communication session to SIP system 122 for delivery to communication device 102 .
  • server system 121 may take remedial measures not shown on FIG. 3 .
  • server system 121 may send an NFV message to access network 111 to enable particular types of NFV time slices (or network IDs) for communication device 101 .
  • Server system 121 may send a SIP message to SIP system 122 to direct access network 112 to enable particular types of NFV time slices for communication device 102 .
  • server system 121 forwards the SIP Invite for the communication session between devices 101 - 102 to SIP system 122 for delivery to communication device 102 .
  • These NFV requests, establishments, and reports are transported in SIP NFV headers, other SIP headers, and/or SDP files.
  • FIG. 4 illustrates communication system 400 having Internet Multimedia Subsystem (IMS) 430 and IMS 440 to control data communication sessions over trusted hardware between Session Initiation Protocol (SIP) communication devices 411 and 421 .
  • Communication system 400 is an example of communication system 100 , although system 100 may vary from the specific details of this example.
  • IMS 430 includes Proxy Call State Control Function (P-CSCF) 431 , Interrogating CSCF (I-CSCF) 432 , Serving CSCF (S-CSCF) 433 , Home Subscriber System (HSS) 434 , Application Server (AS) 435 , and Border Gateway Control Function (BGCF) 436 .
  • IMS 440 includes P-CSCF 441 , I-CSCF 442 , S-CSCF 443 , HSS 444 , AS 445 , and BGCF 446 .
  • access networks 410 and 420 exchange SIP Registration signaling to establish hardware trust with one another and with their shared communication interface.
  • Access network 410 and SIP device 411 exchange SIP Registration signaling to establish hardware trust with one another.
  • Access network 420 and SIP device 421 exchange SIP Registration signaling to establish hardware trust with one another.
  • Access network 410 and Proxy Call State Control Function (P-CSCF) 431 in IMS 430 exchange SIP Registration signaling to establish hardware trust with one another.
  • Access network 410 and P-CSCF 431 exchange SIP Registration signaling to report the hardware trust between access networks 410 and 420 and between access network 410 and SIP device 411 .
  • P-CSCF 431 transfers the trust data for association and use in Home Subscriber System (HSS) 434 and Application Server (AS) 435 .
  • HSS Home Subscriber System
  • AS Application Server
  • Access network 420 and P-CSCF 441 in IMS 440 exchange SIP Registration signaling to establish hardware trust with one another.
  • Access network 420 and P-CSCF 441 exchange SIP Registration signaling to report the hardware trust between access networks 420 and 410 and between access network 420 and SIP device 421 .
  • P-CSCF 441 transfers the trust data for association and use in HSS 444 and AS 445 .
  • S-CSCF 433 in IMS 430 and SIP device 411 exchange SIP Registration messages to establish hardware trust with one another and to report the hardware trust between SIP device 411 and access network 410 .
  • S-CSCF 443 in IMS 440 and SIP device 421 exchange SIP Registration messages to establish hardware trust with one another and to report the hardware trust between SIP device 421 and access network 420 .
  • S-CSCF 433 transfers the trust data for association and use in HSS 434 and AS 435 .
  • S-CSCF 443 transfers the trust data for association and use in HSS 444 and AS 445 .
  • BGCF 436 in IMS 430 and BGCF 446 in IMS 440 exchange SIP Registration messages to establish hardware trust with one another.
  • BGCF 436 and BGCF 446 exchange SIP Registration messages to report the hardware trust between: access network 410 and SIP device 411 , access network 410 and IMS 430 , access network 410 and access network 420 , access network 420 and SIP device 421 , access network 420 and IMS 440 , IMS 430 and SIP device 411 , and IMS 440 and SIP device 421 .
  • BGCF 436 transfers the trust data for association and use in HSS 434 and AS 435 .
  • BGCF 446 transfers the trust data for association and use in HSS 444 and AS 445 .
  • SIP device 411 transfers a SIP Invite to P-CSCF 431 for a media session between SIP devices 411 and 421 .
  • the SIP Invite has a hardware trust header requiring data bearers over trusted hardware, and additional trust requirements are specified in an attached SDP file.
  • P-CSCF 431 forwards the SIP Invite to I-CSCF 432 —which forwards the Invite to S-CSCF 433 .
  • S-CSCF 433 forwards the SIP Invite to AS 435 .
  • AS 435 determines that SIP device 411 and SIP device 421 can exchange data communications over an end-to-end communication path formed by: SIP device 411 , access network 410 , access network 420 , and SIP device 421 .
  • AS 435 accesses HSS 434 to determine the current trust status for SIP devices 411 and 420 and access networks 410 and 420 . Since the end-to-end communication path has current hardware trust, AS 435 directs S-CSCF 433 to forward the SIP Invite with the hardware trust header through BGCFs 436 and 446 to S-CSCF 443 in IMS 440 .
  • S-CSCF 443 forwards the SIP Invite to AS 445 .
  • AS 445 determines that SIP device 411 and SIP device 421 can exchange data communications over an end-to-end communication path formed by: SIP device 411 , access network 410 , access network 420 , and SIP device 421 .
  • AS 445 accesses HSS 444 to determine the current trust status for SIP devices 411 and 420 and access networks 410 and 420 . Since the end-to-end communication path has current hardware trust, AS 445 directs S-CSCF 443 to forward the SIP Invite with the hardware trust header to SIP device 421 through I-CSCF 442 , P-CSCF 441 , and access network 420 .
  • SIP device 421 processes the SIP Invite having the hardware trust header and SDP trust data to generate a corresponding SIP OK message.
  • the SIP OK also has a hardware trust header and SDP trust data.
  • the SDP data may indicate the trust protocol version being used to generate and process the trust data.
  • SIP device 421 may indicate that it uses a different but compatible version of the hardware trust protocol.
  • SIP device 421 transfers the SIP OK back through the proxy signaling channel back to SIP device 411 through elements 420 - 441 - 442 - 443 - 445 - 446 - 436 - 433 - 435 - 432 - 431 - 410 .
  • AS 445 directs S-CSCF 443 to transfer a communication request through P-CSCF 441 to access network 441 to establish a data bearer from SIP device 421 to access network 410 over trusted hardware.
  • Access network 420 confirms the trusted data bearer with SIP device 421 .
  • AS 435 directs S-CSCF 433 to transfer a communication request through P-CSCF 431 to access network 410 to establish a data bearer from SIP device 411 to access network 420 over trusted hardware.
  • Access network 410 confirms the trusted data bearer with SIP device 411 .
  • SIP devices 411 and 421 then exchange data communications using trusted hardware from end-to-end over access networks 410 and 420 .
  • AS 435 forwards the SIP Invite having the hardware trust header only if the end-to-end communication path has current hardware trust. If the end-to-end communication path does not have current hardware trust, then AS 435 takes remedial measures. If SIP device 421 has not yet established its hardware trust, then AS 435 sends a SIP message to AS 445 through S-CSCF 433 , BGCF 436 , BGCF 446 , and S-CSCF 443 . The SIP message requests IMS 440 to establish and report hardware trust with SIP device 421 .
  • AS 435 directs S-CSCF 433 to forward the SIP Invite for the communication session between devices 411 and 421 to IMS 440 for delivery to SIP device 421 . If access network 420 has not yet established its hardware trust, then AS 435 sends a SIP message to AS 445 through S-CSCF 433 , BGCF 436 , BGCF 446 , and S-CSCF 443 . The SIP message requests IMS 440 to establish and report hardware trust with access network 420 .
  • AS 435 directs S-CSCF 433 to forward the SIP Invite for the communication session between devices 411 and 421 to IMS 440 for delivery to SIP device 421 .
  • the hardware trust request, establishment, and report data are transported in SIP trust headers.
  • FIG. 5 illustrates Network Function Virtualization (NFV) communication system 500 to establish data bearers over trusted hardware during proper NFV time slices for LTE User Equipment (UE) 501 .
  • NFV communication system 500 is an example of communication systems 100 and 400 , although systems 100 and 400 may vary from the specific details of this example.
  • NFV communication system 500 comprises UE 501 , antenna system 502 , and NFV server system 503 .
  • NFV server system 503 comprises hardware 504 , LTE virtual machines 510 , and IMS virtual machines 530 .
  • Hardware 504 comprises data processing circuitry, memory devices, and Input/Output (I/O) communication interfaces.
  • Hardware 504 includes trust system 505 and NFV system 506 .
  • Trust system 505 comprises trust software and portions of hardware 504 to control access to and provide remote hardware verification for hardware 504 .
  • NFV system 506 comprises hypervisor software and portions of hardware 504 to execute virtual machines 510 and 530 in various NFV time slices.
  • LTE virtual machines 510 include eNodeB 511 , Mobility Management Entity (MME) 512 , Home Subscriber System (HSS) 513 , Serving Gateway (S-GW) 514 , Packet Data Network Gateway (P-GW) 515 , and Policy Charging and Rules Function (PCRF) 516 .
  • IMS virtual machines 530 include P-CSCF 531 , I-CSCF 532 , S-CSCF 533 , HSS 534 , AS 535 , and BGCF 536 .
  • Hardware trust is first established across system 500 .
  • AS 535 directs S-CSCF 533 to exchange SIP signaling with another IMS through BGCF 536 to establish hardware trust and discover any access networks and UEs that are trusted by the trusted IMS.
  • P-GW 515 exchanges LTE signaling to establish hardware trust with S-GW 514
  • SGW 514 exchanges LTE signaling to establish hardware trust with eNodeB 511
  • eNodeB 511 exchanges LTE signaling to establish hardware trust with antenna system 502 .
  • P-GW 515 also exchanges LTE signaling to establish hardware trust with another access network.
  • NFV system 506 collects NFV data for virtual machines 510 and 530 indicating their NVF time slices and the characteristics of the time slices. For example, the NFV time slices may be classified by trust level, cost level, Virtual Private Network ID, Access Point Name, domain name, and the like. NFV system 506 collects NFV data for UE 501 indicating proper NVF time slices characteristics for UE 501 .
  • UE 501 attaches to eNodeB 511 , and MME 512 exchanges Non-Access Stratum (NAS) information with UE 501 to establish hardware trust of UE 501 and to exchange NFV data.
  • MME 512 retrieves an IMS APN from HSS 513 for UE 501 where the APN uses hardware trust verifications and NFV time-slices that are suitable for UE 501 .
  • MME 512 implements an IMS signaling bearer for trusted UE 501 to P-CSCF 531 through P-GW 515 .
  • AS 535 directs S-CSCF 533 to exchange SIP signaling through P-CSCF 531 with P-GW 515 to establish hardware trust and gather NFV data.
  • AS 535 also directs S-CSCF 533 to exchange SIP signaling through P-CSCF 531 with P-GW 515 to discover the hardware trust and NFV data for UE 501 and other LTE virtual machines 510 .
  • AS 535 associates the resulting trust and NFV data in HSS 534 .
  • S-CSCF 533 and UE 501 exchange SIP Registration messages to establish hardware trust with one another and to report the NFV data and hardware trust for UE 501 and LTE virtual machines 510 .
  • S-CSCF 533 transfers the trust and NFV data for association and use in HSS 534 and AS 535 .
  • UE 501 transfers a SIP Invite over the IMS bearer through LTE virtual machines 510 to P-CSCF 531 .
  • the SIP Invite is for a media session between UE 501 and another device (not shown).
  • the SIP Invite has a hardware trust header requiring data bearers over trusted hardware, and additional trust requirements are specified in an attached SDP file.
  • the SIP Invite also has an NFV header requiring data bearers during particular NFV slices, and additional NFV requirements are specified in the attached SDP file.
  • P-CSCF 531 forwards the SIP Invite to S-CSCF 533 through I-CSCF 532 . Based on the SIP trust header and/or the NFV header, S-CSCF 533 forwards the SIP Invite to AS 535 .
  • AS 535 determines that UE 501 and the other device can exchange data communications over an end-to-end communication path including UE 501 , antenna system 502 , NFV server system 503 , the other access network, and the other communication device.
  • AS 535 accesses HSS 434 to determine the current trust status for UE 501 , antenna system 502 , and, NFV server system 503 .
  • AS 535 accesses HSS 434 to determine the current NFV time-slices for LTE virtual machines 510 and IMS virtual machines 530 that support the communication path.
  • AS 535 may access HSS 534 or query the other IMS to determine the current trust and NFV status for the other communication device and the other access network. Since the end-to-end communication path has current hardware trust and uses proper NFV time-slices, AS 535 directs S-CSCF 533 to forward the SIP Invite with the hardware trust header and NFV header through BGCF 536 to the other IMS and on to the other device.
  • the other communication device responds with a SIP OK for the communication session that is transferred to AS 535 through BGCF 536 and S-CSCF 533 .
  • AS 535 directs S-CSCF 533 to transfer a communication request through P-CSCF 531 to PCRF 516 to establish a data bearer from UE 501 to the other access network over trusted hardware and during proper NFV time-slices.
  • PCRF 516 transfers the data bearer request to P-GW 515 along with pertinent APN and Quality-of-Service (QoS) data.
  • PGW 515 sends LTE create bearer signaling to S-GW 514
  • S-GW 514 sends LTE create bearer signaling to MME 512 .
  • MME 512 sends LTE create bearer signaling to eNodeB 511 which establishes a data bearer to UE 501 .
  • UE 501 then exchanges data communications over communication system 500 responsive to SIP signaling and using trusted hardware and proper NFV slices.
  • FIG. 6 illustrates Enterprise Internet Protocol (IP) network 610 and an Internet Multimedia Subsystem (IMS) to establish data bearers over trusted hardware for user computers.
  • Communication system 600 is an example of communication systems 100 and 400 , although systems 100 and 400 may vary from the specific details of this example.
  • IP network 610 includes Local Area Network (LAN) 611 , Authorization database 612 , Customer Edge (CE) router 613 , Dynamic Host Control Protocol (DHCP) server 614 , Provider Edge (PE) router 615 , Domain Name Service (DNS) server 616 .
  • IMS 630 includes P-CSCF 631 , I-CSCF 632 , S-CSCF 633 , HSS 634 , AS 635 , and BGCF 636 .
  • Hardware trust is first established across system 600 .
  • AS 635 directs S-CSCF 633 to exchange SIP signaling with another IMS through BGCF 636 to establish hardware trust and discover any access networks and UEs that are trusted by the trusted IMS.
  • PE router 615 exchanges trust signaling to establish hardware trust with CE router 613 .
  • CE router 613 exchanges trust signaling to establish hardware trust with LAN 611 .
  • LAN 611 exchanges trust signaling to establish hardware trust with user computer 601 .
  • PE router 615 also exchanges trust signaling to establish hardware trust with another PE router for another enterprise IP network.
  • AS 635 directs S-CSCF 633 to exchange SIP signaling through P-CSCF 631 with PE router 615 to establish hardware trust.
  • AS 635 also directs S-CSCF 633 to exchange SIP signaling through P-CSCF 631 with PE router 615 to discover the hardware trust of user computer 601 and IP network 610 .
  • AS 635 associates the resulting trust data in HSS 634 .
  • User computer 601 obtains access to IP network 612 from authorization database 612 .
  • User computer 601 obtains an origination IP address from DHCP server 614 .
  • User computer 601 resolves a destination name to a destination IP address through DNS server 616 .
  • User computer 603 and S-CSCF 633 exchange SIP Registration messages to establish hardware trust with one another and to report the hardware trust between user computer 601 and IP network 610 .
  • S-CSCF 633 transfers the trust data for association and use in HSS 634 and AS 635 .
  • User computer 601 transfers a SIP Invite over IP network 610 to P-CSCF 631 in IMS 630 .
  • the SIP Invite is for a media session between user computer 601 and a remote server device (not shown).
  • the SIP Invite has a hardware trust header requiring data bearers over trusted hardware, and additional trust requirements are specified in an attached SDP file.
  • P-CSCF 631 forwards the SIP Invite to S-CSCF 633 through I-CSCF 632 . Based on the SIP trust header, S-CSCF 633 forwards the SIP Invite to AS 635 .
  • AS 635 determines that user computer 601 and the remote server can exchange data communications over an end-to-end communication path including user computer 601 and IP network 630 , the other access network, and the remote server.
  • AS 635 accesses HSS 634 to determine the current trust status for user computer 601 and IP network 610 .
  • AS 635 may access HSS 634 or query the other IMS to determine the current trust status for the remote server and the other access network. Since the end-to-end communication path currently has hardware trust, AS 635 directs S-CSCF 633 to forward the SIP Invite with the hardware trust header through BGCF 636 to the other IMS and on to the remote server.
  • the remote server responds with a SIP OK for the communication session that is transferred to AS 635 through BGCF 636 and S-CSCF 633 .
  • AS 635 directs S-CSCF 633 to transfer a communication request through P-CSCF 631 to PE router 631 to allow a data bearer from user computer 601 to the other access network over trusted hardware.
  • User computer 601 then exchanges data communications over IP network 610 responsive to SIP signaling and using trusted hardware.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A server system exchanges trust signaling with a first access network, establishes hardware trust with the first access network, and determines that the first access network has established hardware trust with a communication interface to a second access network. The server system exchanges Session Initiation Protocol (SIP) signaling with a SIP system, establishes hardware trust with the SIP system, and determines that the SIP system has established hardware trust with the second access network and a second communication device. The server system exchanges SIP signaling with a first communication device and establishes hardware trust with the first communication device. The server system receives a SIP Invite requesting a communication session between the first communication device and the second communication device over hardware-trusted systems, and based on the established hardware trust, the server system responsively forwards the SIP Invite to the SIP system for delivery to the second communication device.

Description

    RELATED CASES
  • This patent application is a continuation of U.S. patent application Ser. No. 14/630,978 that was filed on Feb. 25, 2015 and is entitled “SESSION INITIATION PROTOCOL (SIP) COMMUNICATIONS OVER TRUSTED HARDWARE.” U.S. patent application Ser. No. 14/630,978 is hereby incorporated by reference into this patent application.
  • TECHNICAL BACKGROUND
  • Internet Protocol (IP) is popular form of packet communications to exchange data between communication devices. The communication devices exchange IP packets for data services like internet access, media streaming, and file transfers. The communication devices are coupled to various IP access networks that are interconnected to one another over communication interfaces like core IP networks or direct communication links. The IP access networks may be wireless to provide user mobility. Long Term Evolution (LTE) Networks are exemplary wireless IP access networks.
  • Session Initiation Protocol (SIP) is a popular form of signaling to control the exchange of IP packets between communication devices for media streaming and other data transfer services. The communication devices register their IP addresses with the SIP systems over the IP access networks. The SIP control systems resolve names and numbers for the communication devices to their registered IP addresses. The SIP control systems use the registered IP addresses to exchange SIP messaging for the IP communications sessions. The end-user devices then exchange IP packets over the IP access networks and their communication interfaces. Internet Multimedia Subsystems (IMSs) are exemplary SIP control systems.
  • Hardware trust systems ensure communication network security and control. The hardware trust systems maintain physical separation between trusted hardware and untrusted hardware. The trust systems control software access to the trusted hardware but allow interaction between open and secure software components through secure bus interfaces, memories, time slices, and switching circuits. The trust systems establish trust with one another by using secret keys embedded in their hardware to generate hash results for remote verification by other trust systems also knowing the secret keys and the hash algorithms.
  • Communication networks also employ Network Function Virtualization (NFV) to improve service quality. NFV servers process virtual machines that operate as communication network elements such as gateways, controllers, databases, and the like. The NFV servers exchange data packets with other network elements like Ethernet switches and Internet Protocol (IP) routers to support data services like mobile internet access, user messaging, and media transfers. The NFV servers implement hypervisors and context switching to operate in a time-sliced manner. The NFV servers typically separate different virtual networks and/or services in the different NFV time slices.
  • Unfortunately, the trust systems and the NFV systems are not effectively integrated with the SIP systems.
  • Technical Overview
  • A server system exchanges trust signaling with a first access network, establishes hardware trust with the first access network, and determines that the first access network has established hardware trust with a communication interface to a second access network. The server system exchanges Session Initiation Protocol (SIP) signaling with a SIP system, establishes hardware trust with the SIP system, and determines that the SIP system has established hardware trust with the second access network and a second communication device. The server system exchanges SIP signaling with a first communication device and establishes hardware trust with the first communication device. The server system receives a SIP Invite requesting a communication session between the first communication device and the second communication device over hardware-trusted systems, and based on the hardware trust, the server system responsively forwards the SIP Invite to the SIP system for delivery to the second communication device.
  • DESCRIPTION OF THE DRAWINGS
  • FIGS. 1-3 illustrate a communication system to establish data communication bearers over trusted hardware between communication devices.
  • FIG. 4 illustrates an Internet Multimedia Subsystem (IMS) to control data communication sessions over trusted hardware between Session Initiation Protocol (SIP) communication devices.
  • FIG. 5 illustrates a Network Function Virtualization (NFV) communication system having a Long Term Evolution (LTE) network and an Internet Multimedia Subsystem (IMS) to establish data bearers over trusted hardware and proper NFV time-slices for LTE User Equipment (UE).
  • FIG. 6 illustrates an Enterprise Internet Protocol (IP) network and an Internet Multimedia Subsystem (IMS) to establish data bearers over trusted hardware for user computers.
  • DETAILED DESCRIPTION
  • FIGS. 1-3 illustrate communication system 100 to establish data bearers 141-142 over trusted hardware between communication devices 101-102. Communication system 100 comprises communication devices 101-102, access networks 111-112, communication interface 113, server system 121, and Session Initiation Protocol (SIP) signaling system 122. FIG. 1 is exemplary, and in some examples, systems 121-122 could be the same system, and access networks 101-102 could be the same network.
  • Communication devices 101-102 comprise phones, tablet computers, servers, intelligent machines, and/or some other apparatus having a SIP transceiver.
  • Access networks 111-112 comprise wireless communication networks, fiber/coax communication networks, satellite communication systems, and/or some other data linkage between communication devices 101-102. In some examples, portions of access networks 111-112 use Network Function Virtualization (NFV) server systems running access network virtual machines. Exemplary NFV configurations and operations for communication system 100 are described with respect to FIG. 3 and FIG. 5.
  • Communication interface 113 comprises one or more data communication networks, systems, or links. In some examples, communication interface 113 comprises a core IP network. In other examples, communication interface 113 comprises a direct physical coupling like fiber cabling, backplane interfaces, and the like. In some examples, communication interface 113 might include an IP router or Ethernet switch. In some examples, communication interface 113 is a virtual link between virtual machines running on an NFV server system.
  • Server system 121 comprises a computer system having processing circuitry, memory devices, and communication transceivers that perform SIP proxy services. Likewise, SIP signaling system 122 comprises a computer system having processing circuitry, memory devices, and communication transceivers that perform SIP proxy services. In some examples, server system 121 and SIP signaling system 122 each comprise an Internet Multimedia Subsystem (IMS). In some examples, server system 121 and SIP signaling system 122 use NFV server systems running SIP and/or IMS virtual machines.
  • Communication device 101 and access network 111 communicate over data bearer 141. Access network 111 and access network 112 communicate over communication interface 113. Access network 112 and communication device 102 communicate over data bearer 142. Data bearers 141-142 might be wireless communication links, fiber/coax communication links, satellite communication links, and/or some other communication media between communication devices 101-102. In some cases, data bearers 141-142 are virtual links between virtual machines running on an NFV server system.
  • Communication device 101 and access network 111 communicate over signaling link 131. Access network 111 and server system 121 communicate over signaling link 132. Server system 121 and SIP signaling system 122 communicate over signaling link 133. SIP signaling system 122 and access network 112 communicate over signaling link 134. Access network 112 and communication device 102 communicate over signaling link 135. Signaling links 131-135 might be wireless communication links, fiber/coax communication links, satellite communication links, and/or some other communication media. Portions of signaling links 131-135 may traverse portions of communication interface 113 and data bearers 141-142. In addition, one or more signaling links 131-135 may be virtual links between virtual machines that are running on an NFV server system.
  • In the following discussion, signaling messages are enumerated with the same reference numerals as the signaling links that they traverse. For example, a SIP message that traverses signaling links 131-132 is referred to as SIP message 131/132. Note that additional signaling occurs in a supporting and contemporaneous manner to that described herein to implement data bearers, but for clarity, the discussion focuses on innovative aspects of the signaling.
  • Communication system 100 exchanges SIP signaling to establish, request, and report hardware trust. Communication system 100 exchanges SIP signaling having hardware trust requirements to indicate that only trusted hardware should be used for the communication path. This hardware trust data could be described in a separate SIP trust header contained in various SIP messages, such as: REGISTRATION, INVITE, ACK, CANCEL, BYE, OPTIONS, REFER, and Provisional Acknowledgement (PRACK). The hardware trust data could also be noted through a trust code or flag located in another SIP header, and then specific hardware trust data and requirements could be specified in the accompanying Session Description Protocol (SDP) file.
  • Server system 121 exchanges trust signaling 132 with access network 111 and responsively establishes hardware trust with access network 111. The trust signaling uses Diameter, SIP, or some other data communication protocol. Server system 121 typically establishes hardware trust with one or more network elements in access network 111 that have trust software modules. The trust software modules assert physical control over data access to network element hardware, such as microprocessors, bus interfaces, memories, communication ports, and the like. The trust software modules direct the hardware to read secret keys physically embedded in the hardware itself, such as a code stored in non-volatile read-only circuit. The trust software modules transfer encoded versions of the secret keys to server system 121 to maintain hardware trust.
  • For example, server system 121 might repeatedly transfer random numbers to a network element in access network 111. The trust module in the network element would perform a one-way hash on the random numbers with its secret key and return the hash results to server system 121. Server system 121 then compares the received hash results to its own self-generated hash results to verify the hardware trust of the network element. The trusted network element could then be used as a trust proxy to establish and maintain trust with other network elements in access network 111 and report this hardware trust to server system 121.
  • Server system 121 exchanges SIP signaling 133 with SIP signaling system 122 and responsively establishes hardware trust with SIP signaling system 122. The SIP signaling could be for REGISTRATION, OPTIONS, or PRACK. Server system 121 typically establishes hardware trust with SIP servers in SIP signaling system 122 that have trust software modules. The trust software modules assert physical control over data access to SIP server hardware, such as microprocessors, bus interfaces, memories, communication ports, and the like. The trust software modules direct the hardware to read secret keys physically embedded in the hardware itself, such as a code stored in non-volatile read-only circuit. The trust software modules transfer encoded versions of the secret keys to server system 121 to maintain hardware trust.
  • Server system 121 could repeatedly transfer random numbers to an IMS server in SIP signaling system 122. The trust module in the IMS server would perform a one-way hash on the random numbers with its secret key and return the hash results to server system 121. Server system 121 then compares the received hash results to its own self-generated hash results to verify the hardware trust of the IMS server. The trusted IMS server could then be used as a trust proxy to establish and maintain trust with other SIP servers in SIP signaling system 122 and report this hardware trust to server system 121.
  • Access networks 111-112 typically perform hardware trust verification with communication interface 113. Server system 121 exchanges trust signaling 132 with access network 111 and responsively determines that access network 111 has established hardware trust with communication interface 113 to access network 112. Thus, access network 111 is a trust proxy for communication interface 113.
  • SIP signaling system 122 typically performs hardware trust verification with access network 112. Server system 121 exchanges SIP signaling 133 with SIP signaling system 122 and responsively determines that SIP signaling system 122 has established hardware trust with access network 112. The SIP signaling could be for REGISTRATION, OPTIONS, or PRACK. Thus, SIP signaling system 122 is a trust proxy for access network 112.
  • SIP signaling system 122 typically performs hardware trust verification with communication device 102. Server system 121 exchanges SIP signaling 133 with SIP signaling system 122 and responsively determines that SIP signaling system 122 has established hardware trust with communication device 102. The SIP signaling could be for REGISTRATION, OPTIONS, or PRACK. Thus, SIP signaling system 122 is a trust proxy for communication device 102.
  • Server system 121 exchanges SIP signaling 131/132 with communication device 101 and responsively establishes hardware trust with communication device 101. The SIP signaling is typically SIP Registration signaling. Server system 121 typically establishes hardware trust with circuitry in communication device 101 that processes a trust software module. The trust software module asserts physical control over data access to device 101 hardware, such as microprocessors, bus interfaces, memories, communication ports, and the like. The trust software module directs the device hardware to read a secret key physically embedded in the hardware. The trust software module transfers encoded versions of the secret key to server system 121 to maintain hardware trust. Server system 121 might repeatedly transfer random numbers to a microprocessor core in communication device 101. The trust module executing in the microprocessor core would perform a one-way hash on the random numbers with the microprocessor core's secret key and return the hash results to server system 121. Server system 121 then compares the received hash results to its own self-generated hash results to verify the hardware trust of the microprocessor core. The trusted microprocessor core could then be used as a trust proxy to establish and maintain trust with other components in communication device 101 and report this hardware trust to server system 121.
  • Server system 121 receives SIP Invite 131/132 from communication device 101 over access network 111. SIP Invite 131/132 requests a media communication session between communication device 101 and communication device 102 over trusted hardware systems. One or more hardware trust requirements may be included in a Session Description Protocol (SDP) file in SIP Invite 131/132. In some examples, SIP Invite 131/132 includes NFV requirements, such as an ordered list of required NFV time-slices (or network IDs associated with the NFV time-slices). Server system 121 processes standard networking data to determine that communication device 101 can exchange data communications with communications device 102 from end-to-end over access networks 111-112 and communication interface 113.
  • In response to the trusted hardware requirement in SIP Invite 131/132, server system 121 processes signaling data records to determine that system 121 currently has established hardware trust with communication device 101 and access network 111. Server system 121 also processes signaling data records to determine that trusted access network 111 currently has established hardware trust with communication interface 113. Server system 121 processes signaling data records to determine that trusted SIP signaling system 122 currently has established hardware trust with access network 112 and with communication device 102. Server system 121 may process signaling data records to determine that trusted access network 112 currently has established hardware trust with communication interface 113.
  • Based on this hardware trust of the end-to-end communication path, server system 121 responsively transfers SIP Invite 133/134/135 for the communication session to communication device 102 over SIP signaling system 122 and access network 112. One or more hardware trust requirements may be included in an SDP file in SIP Invite 133/134/135. In some examples, server system 121 also verifies that proper NFV time slices are available for the communication session before forwarding SIP Invite 133/134/135.
  • Server system 121 may then receive SIP OK 133/134/135 from communication device 102 over access network 112 and SIP signaling system 122. Server system 121 responsively transfers a communication request to access network 111 to establish a data link from communication device 101 to access network 112 over the trusted hardware. For example, a Proxy Call State Control Function (P-CSCF) in server system 121 could transfer a Diameter message to a Policy Charging and Rules Function (PCRF) in the access network 111 to establish a live-video data bearer 141 between communication device 101 and communication interface 113 during a specific NFV time-slice.
  • Referring to FIG. 2, an exemplary operation of communication system 100 is described. Server system 121 exchanges trust signaling with access network 111 (201). Server system 121 establishes hardware trust with access network 111 and determines that access network 111 has established hardware trust with communication interface 113 to access network 112. Server system 121 exchanges Session Initiation Protocol (SIP) signaling with SIP system 122 (202). Server system 121 establishes hardware trust with SIP system 122. Server system 121 determines that SIP system 122 has established hardware trust with access network 112 and communication device 102. Server system 121 exchanges SIP signaling with communication device 101 and establishes hardware trust with communication device 101 (203).
  • Server system 121 receives a SIP Invite requesting a communication session between communication device 101 and communication device 102 over trusted hardware systems, and based on the established hardware trust, server system 121 responsively forwards the SIP Invite to SIP system 122 for delivery to communication device 102 (204). Note that if the end-to-end communication path has current hardware trust, then server system 121 forwards the SIP Invite having the hardware trust requirement. If the end-to-end communication path does not have current hardware trust, then server system 121 does not forward the SIP Invite having the hardware trust requirement—although server system 121 may take remedial measures.
  • If communication device 102 has not yet established trust, then server system 121 may send a different SIP message (possibly a modified Invite) to SIP signaling system 122 that requests the establishment and reporting of hardware trust with communication device 102. Once this hardware trust is reported, then server system 121 forwards the SIP Invite for the communication session to SIP system 122 for delivery to communication device 102. Likewise, if access network 112 has not yet established trust, then server system 121 may send a different SIP message (possibly a modified Invite) to SIP signaling system 122 to establish and report hardware trust with access network 112. Once this hardware trust is reported, then server system 121 forwards the SIP Invite for the communication session to SIP system 122 for delivery to communication device 102. These hardware trust requests and reports could be transported in a SIP trust header, data flag in another SIP header, and/or information in an SDP file.
  • Referring to FIG. 3, an exemplary Network Function Virtualization (NFV) configuration and operation of communication system 100 is described, although system 100 may vary from this specific NFV example. In this NFV example, access networks 111-112 are coupled through communication interface 113 that comprises virtual machine gateways and links that run on a shared and trusted NFV server system. For example, portions of access network 111 and access network 112 may run on the same NFV server during different NFV time slices.
  • In this example, communication system 100 exchanges SIP signaling to establish, request, and report NFV data. Communication system 100 exchanges SIP signaling having NFV requirements that indicate NFV time slices that should be used for the communication path. This NFV data could be described in a separate SIP NFV header contained in various SIP messages, such as: REGISTRATION, INVITE, ACK, CANCEL, BYE, OPTIONS, REFER, and Provisional Acknowledgement (PRACK). The NFV data could also be noted through an NFV code or flag located in another SIP header, and then specific NFV data and requirements could be specified in the accompanying Session Description Protocol (SDP) file.
  • In operation, access networks 111-112 exchange trust signaling to establish hardware trust with one another. For example, trust software in access networks 111-112 direct their respective hardware to read their hardware keys and transfer hashed products of their hardware keys. The trust software in access networks 111-112 then direct their hardware to compare the received hash products to their self-generated hash products to verify hardware trust of one another.
  • Access network 111 and communication device 101 exchange trust and NFV signaling. The trust signaling establishes hardware trust between device 101 and network 111. The NFV signaling indicates NFV data like available NFV time-slices and their corresponding characteristics. For example, the NFV signaling may indicate that NFV network “X27” should be used for sensitive SIP-based communications. Access network 112 and communication device 102 exchange trust signaling to establish hardware trust with one another. Access network 112 and communication device 102 exchange NFV signaling to indicate NFV data.
  • Access network 111 and server system 121 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for device 101 and network 111, report the hardware trust between access networks 111-112, and report the hardware trust between access network 111 and communication device 101. Access network 112 and SIP system 122 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for device 102 and network 112, report the hardware trust between access networks 111-112, and report the hardware trust between access network 112 and communication device 102.
  • Server system 121 and communication device 101 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for device 101 and network 111, and report the hardware trust between access network 111 and communication device 101. SIP system 122 and communication device 102 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for device 102 and network 112, and report the hardware trust between access network 112 and communication device 102.
  • Server system 121 and SIP system 122 exchange SIP Registration signaling to establish hardware trust with one another, report NFV data for devices 101-102 and networks 111-112, and report the hardware trust between access network 111 and communication device 101, access network 111 and server system 121, access network 111 and access network 112, access network 112 and communication device 102, access network 112 and SIP system 122, server system 121 and communication device 101, and SIP system 122 and communication device 102.
  • Server system 121 sorts and associates the trust data and the NFV data for subsequent SIP Invite processing. Server system 121 subsequently receives a SIP Invite for a communication session between communication device 101 and communication device 102 having a hardware trust requirement and an NFV time-slice requirement. The hardware trust requirement could be denoted by a separate SIP trust header, trust data flag in another SIP header, and/or trust information in an SDP file. Likewise, the NFV time-slice requirement could be denoted by a separate SIP NFV header, NFV data flag in another SIP header, and/or NFV information in an SDP file.
  • Server system 121 processes networking data to determine that communication devices 101-102 can exchange data communications over access networks 111-112. Server system 121 processes the hardware trust requirement and the associated signaling data to determine that the data communication path formed by communication devices 101-102 and access networks 111-112 currently has end-to-end hardware trust. Server system 121 processes the NFV time-slice requirement and the associated NFV signaling data to determine that the data communication path formed by communication devices 101-102 and access networks 111-112 currently uses accepted NFV time slices. For example, the time slice requirement in the SIP Invite may indicate that only NFV time-slices with a specified hardware-trust rating be used, and based on the NFV data, server system 121 could verify that the data path uses NFV time-slices having the specified hardware-trust rating.
  • Based on the hardware trust and NFV requirements as compared to the current hardware trust and NFV time-slices for the end-to-end communication path, server system 121 transfers the SIP Invite with the hardware trust and NFV time-slice requirements to SIP system 122. Based on the hardware trust requirement and the NFV time-slice requirement as compared to its own trust and NFV data records, SIP system 122 transfers the SIP Invite with the hardware trust and NFV time-slice requirements to communication device 102.
  • SIP system 122 receives a SIP OK having hardware trust and NFV time-slice requirements from communication device 102 and transfers the SIP OK to server system 121. Responsive to the SIP OK with the hardware trust and NFV time-slice requirements, SIP system 122 transfers a communication request to access network 112 to establish a data bearer from communication device 102 to access network 111 over trusted hardware and using the proper NFV time-slice. Access network 112 confirms the trusted data bearer and proper NFV time-slice with communication device 102.
  • Server system 121 receives the SIP OK having the hardware trust NFV time-slice requirements from SIP system 122 and transfers the SIP OK to communication device 101. Responsive to the SIP OK with the hardware trust NFV time-slice requirements, server system 121 transfers a communication request to access network 111 to establish a trusted data bearer from communication device 101 to access network 112 using the appropriate NFV time-slice. Access network 111 confirms the trusted data bearer and NFV time-slice with communication device 101. Communication device 101 and communication device 102 then exchange data communications from end-to-end over access networks 111-112 using trusted hardware and proper NFV time-slices.
  • Note that server system 121 forwards the SIP Invite having the hardware trust and NFV time-slice requirements to communication device 102 only if the end-to-end communication path has the current hardware trust and uses the proper NFV time-slices. If the end-to-end communication path does not have current hardware trust, then server system 121 may take remedial measures not shown on FIG. 3. For example, if communication device 102 has not yet established trust, then server system 121 may send a SIP message (possibly a modified Invite) that requests trusted SIP system 122 to establish and report hardware trust with communication device 102. Once this hardware trust is reported by SIP system 122, then server system 121 forwards the SIP Invite for the communication session between devices 101-102 to SIP system 122 for delivery to communication device 102. Likewise, if access network 112 has not yet established trust, then server system 121 may send a SIP message (possibly a modified Invite) to SIP signaling system 122 to establish and report hardware trust with access network 112. Once this hardware trust is reported, then server system 121 forwards the SIP Invite for the communication session to SIP system 122 for delivery to communication device 102. These hardware trust requests, establishments, and reports are transported in SIP trust headers, other SIP headers, and/or SDP files.
  • If the end-to-end communication path uses an improper NFV time-slice, then server system 121 may take remedial measures not shown on FIG. 3. For example, server system 121 may send an NFV message to access network 111 to enable particular types of NFV time slices (or network IDs) for communication device 101. Server system 121 may send a SIP message to SIP system 122 to direct access network 112 to enable particular types of NFV time slices for communication device 102. Once the corrected NFV time-slice data is reported by access network 111 and/or SIP system 122, then server system 121 forwards the SIP Invite for the communication session between devices 101-102 to SIP system 122 for delivery to communication device 102. These NFV requests, establishments, and reports are transported in SIP NFV headers, other SIP headers, and/or SDP files.
  • FIG. 4 illustrates communication system 400 having Internet Multimedia Subsystem (IMS) 430 and IMS 440 to control data communication sessions over trusted hardware between Session Initiation Protocol (SIP) communication devices 411 and 421. Communication system 400 is an example of communication system 100, although system 100 may vary from the specific details of this example. IMS 430 includes Proxy Call State Control Function (P-CSCF) 431, Interrogating CSCF (I-CSCF) 432, Serving CSCF (S-CSCF) 433, Home Subscriber System (HSS) 434, Application Server (AS) 435, and Border Gateway Control Function (BGCF) 436. IMS 440 includes P-CSCF 441, I-CSCF 442, S-CSCF 443, HSS 444, AS 445, and BGCF 446.
  • In operation, access networks 410 and 420 exchange SIP Registration signaling to establish hardware trust with one another and with their shared communication interface. Access network 410 and SIP device 411 exchange SIP Registration signaling to establish hardware trust with one another. Access network 420 and SIP device 421 exchange SIP Registration signaling to establish hardware trust with one another.
  • Access network 410 and Proxy Call State Control Function (P-CSCF) 431 in IMS 430 exchange SIP Registration signaling to establish hardware trust with one another. Access network 410 and P-CSCF 431 exchange SIP Registration signaling to report the hardware trust between access networks 410 and 420 and between access network 410 and SIP device 411. P-CSCF 431 transfers the trust data for association and use in Home Subscriber System (HSS) 434 and Application Server (AS) 435.
  • Access network 420 and P-CSCF 441 in IMS 440 exchange SIP Registration signaling to establish hardware trust with one another. Access network 420 and P-CSCF 441 exchange SIP Registration signaling to report the hardware trust between access networks 420 and 410 and between access network 420 and SIP device 421. P-CSCF 441 transfers the trust data for association and use in HSS 444 and AS 445.
  • S-CSCF 433 in IMS 430 and SIP device 411 exchange SIP Registration messages to establish hardware trust with one another and to report the hardware trust between SIP device 411 and access network 410. S-CSCF 443 in IMS 440 and SIP device 421 exchange SIP Registration messages to establish hardware trust with one another and to report the hardware trust between SIP device 421 and access network 420. S-CSCF 433 transfers the trust data for association and use in HSS 434 and AS 435. S-CSCF 443 transfers the trust data for association and use in HSS 444 and AS 445.
  • BGCF 436 in IMS 430 and BGCF 446 in IMS 440 exchange SIP Registration messages to establish hardware trust with one another. BGCF 436 and BGCF 446 exchange SIP Registration messages to report the hardware trust between: access network 410 and SIP device 411, access network 410 and IMS 430, access network 410 and access network 420, access network 420 and SIP device 421, access network 420 and IMS 440, IMS 430 and SIP device 411, and IMS 440 and SIP device 421. BGCF 436 transfers the trust data for association and use in HSS 434 and AS 435. BGCF 446 transfers the trust data for association and use in HSS 444 and AS 445.
  • SIP device 411 transfers a SIP Invite to P-CSCF 431 for a media session between SIP devices 411 and 421. The SIP Invite has a hardware trust header requiring data bearers over trusted hardware, and additional trust requirements are specified in an attached SDP file. P-CSCF 431 forwards the SIP Invite to I-CSCF 432—which forwards the Invite to S-CSCF 433. Based on the SIP trust header, S-CSCF 433 forwards the SIP Invite to AS 435. AS 435 determines that SIP device 411 and SIP device 421 can exchange data communications over an end-to-end communication path formed by: SIP device 411, access network 410, access network 420, and SIP device 421. AS 435 accesses HSS 434 to determine the current trust status for SIP devices 411 and 420 and access networks 410 and 420. Since the end-to-end communication path has current hardware trust, AS 435 directs S-CSCF 433 to forward the SIP Invite with the hardware trust header through BGCFs 436 and 446 to S-CSCF 443 in IMS 440.
  • Based on the SIP trust header, S-CSCF 443 forwards the SIP Invite to AS 445. AS 445 determines that SIP device 411 and SIP device 421 can exchange data communications over an end-to-end communication path formed by: SIP device 411, access network 410, access network 420, and SIP device 421. AS 445 accesses HSS 444 to determine the current trust status for SIP devices 411 and 420 and access networks 410 and 420. Since the end-to-end communication path has current hardware trust, AS 445 directs S-CSCF 443 to forward the SIP Invite with the hardware trust header to SIP device 421 through I-CSCF 442, P-CSCF 441, and access network 420.
  • SIP device 421 processes the SIP Invite having the hardware trust header and SDP trust data to generate a corresponding SIP OK message. The SIP OK also has a hardware trust header and SDP trust data. For example, the SDP data may indicate the trust protocol version being used to generate and process the trust data. SIP device 421 may indicate that it uses a different but compatible version of the hardware trust protocol. SIP device 421 transfers the SIP OK back through the proxy signaling channel back to SIP device 411 through elements 420-441-442-443-445-446-436-433-435-432-431-410.
  • Responsive to the SIP OK, AS 445 directs S-CSCF 443 to transfer a communication request through P-CSCF 441 to access network 441 to establish a data bearer from SIP device 421 to access network 410 over trusted hardware. Access network 420 confirms the trusted data bearer with SIP device 421. Responsive to the SIP OK, AS 435 directs S-CSCF 433 to transfer a communication request through P-CSCF 431 to access network 410 to establish a data bearer from SIP device 411 to access network 420 over trusted hardware. Access network 410 confirms the trusted data bearer with SIP device 411. SIP devices 411 and 421 then exchange data communications using trusted hardware from end-to-end over access networks 410 and 420.
  • Note that AS 435 forwards the SIP Invite having the hardware trust header only if the end-to-end communication path has current hardware trust. If the end-to-end communication path does not have current hardware trust, then AS 435 takes remedial measures. If SIP device 421 has not yet established its hardware trust, then AS 435 sends a SIP message to AS 445 through S-CSCF 433, BGCF 436, BGCF 446, and S-CSCF 443. The SIP message requests IMS 440 to establish and report hardware trust with SIP device 421. Once this hardware trust is reported back to AS 435, then AS 435 directs S-CSCF 433 to forward the SIP Invite for the communication session between devices 411 and 421 to IMS 440 for delivery to SIP device 421. If access network 420 has not yet established its hardware trust, then AS 435 sends a SIP message to AS 445 through S-CSCF 433, BGCF 436, BGCF 446, and S-CSCF 443. The SIP message requests IMS 440 to establish and report hardware trust with access network 420. Once this hardware trust is reported back to AS 435, then AS 435 directs S-CSCF 433 to forward the SIP Invite for the communication session between devices 411 and 421 to IMS 440 for delivery to SIP device 421. The hardware trust request, establishment, and report data are transported in SIP trust headers.
  • FIG. 5 illustrates Network Function Virtualization (NFV) communication system 500 to establish data bearers over trusted hardware during proper NFV time slices for LTE User Equipment (UE) 501. NFV communication system 500 is an example of communication systems 100 and 400, although systems 100 and 400 may vary from the specific details of this example. NFV communication system 500 comprises UE 501, antenna system 502, and NFV server system 503. NFV server system 503 comprises hardware 504, LTE virtual machines 510, and IMS virtual machines 530. Hardware 504 comprises data processing circuitry, memory devices, and Input/Output (I/O) communication interfaces. Hardware 504 includes trust system 505 and NFV system 506.
  • Trust system 505 comprises trust software and portions of hardware 504 to control access to and provide remote hardware verification for hardware 504. NFV system 506 comprises hypervisor software and portions of hardware 504 to execute virtual machines 510 and 530 in various NFV time slices. LTE virtual machines 510 include eNodeB 511, Mobility Management Entity (MME) 512, Home Subscriber System (HSS) 513, Serving Gateway (S-GW) 514, Packet Data Network Gateway (P-GW) 515, and Policy Charging and Rules Function (PCRF) 516. IMS virtual machines 530 include P-CSCF 531, I-CSCF 532, S-CSCF 533, HSS 534, AS 535, and BGCF 536.
  • Hardware trust is first established across system 500. AS 535 directs S-CSCF 533 to exchange SIP signaling with another IMS through BGCF 536 to establish hardware trust and discover any access networks and UEs that are trusted by the trusted IMS. P-GW 515 exchanges LTE signaling to establish hardware trust with S-GW 514, and SGW 514 exchanges LTE signaling to establish hardware trust with eNodeB 511. eNodeB 511 exchanges LTE signaling to establish hardware trust with antenna system 502. P-GW 515 also exchanges LTE signaling to establish hardware trust with another access network.
  • NFV system 506 collects NFV data for virtual machines 510 and 530 indicating their NVF time slices and the characteristics of the time slices. For example, the NFV time slices may be classified by trust level, cost level, Virtual Private Network ID, Access Point Name, domain name, and the like. NFV system 506 collects NFV data for UE 501 indicating proper NVF time slices characteristics for UE 501.
  • UE 501 attaches to eNodeB 511, and MME 512 exchanges Non-Access Stratum (NAS) information with UE 501 to establish hardware trust of UE 501 and to exchange NFV data. MME 512 retrieves an IMS APN from HSS 513 for UE 501 where the APN uses hardware trust verifications and NFV time-slices that are suitable for UE 501. MME 512 implements an IMS signaling bearer for trusted UE 501 to P-CSCF 531 through P-GW 515.
  • AS 535 directs S-CSCF 533 to exchange SIP signaling through P-CSCF 531 with P-GW 515 to establish hardware trust and gather NFV data. AS 535 also directs S-CSCF 533 to exchange SIP signaling through P-CSCF 531 with P-GW 515 to discover the hardware trust and NFV data for UE 501 and other LTE virtual machines 510. AS 535 associates the resulting trust and NFV data in HSS 534. S-CSCF 533 and UE 501 exchange SIP Registration messages to establish hardware trust with one another and to report the NFV data and hardware trust for UE 501 and LTE virtual machines 510. S-CSCF 533 transfers the trust and NFV data for association and use in HSS 534 and AS 535.
  • UE 501 transfers a SIP Invite over the IMS bearer through LTE virtual machines 510 to P-CSCF 531. The SIP Invite is for a media session between UE 501 and another device (not shown). The SIP Invite has a hardware trust header requiring data bearers over trusted hardware, and additional trust requirements are specified in an attached SDP file. The SIP Invite also has an NFV header requiring data bearers during particular NFV slices, and additional NFV requirements are specified in the attached SDP file. P-CSCF 531 forwards the SIP Invite to S-CSCF 533 through I-CSCF 532. Based on the SIP trust header and/or the NFV header, S-CSCF 533 forwards the SIP Invite to AS 535.
  • AS 535 determines that UE 501 and the other device can exchange data communications over an end-to-end communication path including UE 501, antenna system 502, NFV server system 503, the other access network, and the other communication device. AS 535 accesses HSS 434 to determine the current trust status for UE 501, antenna system 502, and, NFV server system 503. AS 535 accesses HSS 434 to determine the current NFV time-slices for LTE virtual machines 510 and IMS virtual machines 530 that support the communication path.
  • AS 535 may access HSS 534 or query the other IMS to determine the current trust and NFV status for the other communication device and the other access network. Since the end-to-end communication path has current hardware trust and uses proper NFV time-slices, AS 535 directs S-CSCF 533 to forward the SIP Invite with the hardware trust header and NFV header through BGCF 536 to the other IMS and on to the other device.
  • The other communication device responds with a SIP OK for the communication session that is transferred to AS 535 through BGCF 536 and S-CSCF 533. Responsive to the SIP OK, AS 535 directs S-CSCF 533 to transfer a communication request through P-CSCF 531 to PCRF 516 to establish a data bearer from UE 501 to the other access network over trusted hardware and during proper NFV time-slices. PCRF 516 transfers the data bearer request to P-GW 515 along with pertinent APN and Quality-of-Service (QoS) data. PGW 515 sends LTE create bearer signaling to S-GW 514, and S-GW 514 sends LTE create bearer signaling to MME 512. MME 512 sends LTE create bearer signaling to eNodeB 511 which establishes a data bearer to UE 501. UE 501 then exchanges data communications over communication system 500 responsive to SIP signaling and using trusted hardware and proper NFV slices.
  • FIG. 6 illustrates Enterprise Internet Protocol (IP) network 610 and an Internet Multimedia Subsystem (IMS) to establish data bearers over trusted hardware for user computers. Communication system 600 is an example of communication systems 100 and 400, although systems 100 and 400 may vary from the specific details of this example. IP network 610 includes Local Area Network (LAN) 611, Authorization database 612, Customer Edge (CE) router 613, Dynamic Host Control Protocol (DHCP) server 614, Provider Edge (PE) router 615, Domain Name Service (DNS) server 616. IMS 630 includes P-CSCF 631, I-CSCF 632, S-CSCF 633, HSS 634, AS 635, and BGCF 636.
  • Hardware trust is first established across system 600. AS 635 directs S-CSCF 633 to exchange SIP signaling with another IMS through BGCF 636 to establish hardware trust and discover any access networks and UEs that are trusted by the trusted IMS. PE router 615 exchanges trust signaling to establish hardware trust with CE router 613. CE router 613 exchanges trust signaling to establish hardware trust with LAN 611. LAN 611 exchanges trust signaling to establish hardware trust with user computer 601. PE router 615 also exchanges trust signaling to establish hardware trust with another PE router for another enterprise IP network.
  • AS 635 directs S-CSCF 633 to exchange SIP signaling through P-CSCF 631 with PE router 615 to establish hardware trust. AS 635 also directs S-CSCF 633 to exchange SIP signaling through P-CSCF 631 with PE router 615 to discover the hardware trust of user computer 601 and IP network 610. AS 635 associates the resulting trust data in HSS 634.
  • User computer 601 obtains access to IP network 612 from authorization database 612. User computer 601 obtains an origination IP address from DHCP server 614. User computer 601 resolves a destination name to a destination IP address through DNS server 616. User computer 603 and S-CSCF 633 exchange SIP Registration messages to establish hardware trust with one another and to report the hardware trust between user computer 601 and IP network 610. S-CSCF 633 transfers the trust data for association and use in HSS 634 and AS 635.
  • User computer 601 transfers a SIP Invite over IP network 610 to P-CSCF 631 in IMS 630. The SIP Invite is for a media session between user computer 601 and a remote server device (not shown). The SIP Invite has a hardware trust header requiring data bearers over trusted hardware, and additional trust requirements are specified in an attached SDP file. P-CSCF 631 forwards the SIP Invite to S-CSCF 633 through I-CSCF 632. Based on the SIP trust header, S-CSCF 633 forwards the SIP Invite to AS 635.
  • AS 635 determines that user computer 601 and the remote server can exchange data communications over an end-to-end communication path including user computer 601 and IP network 630, the other access network, and the remote server. AS 635 accesses HSS 634 to determine the current trust status for user computer 601 and IP network 610. AS 635 may access HSS 634 or query the other IMS to determine the current trust status for the remote server and the other access network. Since the end-to-end communication path currently has hardware trust, AS 635 directs S-CSCF 633 to forward the SIP Invite with the hardware trust header through BGCF 636 to the other IMS and on to the remote server.
  • The remote server responds with a SIP OK for the communication session that is transferred to AS 635 through BGCF 636 and S-CSCF 633. Responsive to the SIP OK, AS 635 directs S-CSCF 633 to transfer a communication request through P-CSCF 631 to PE router 631 to allow a data bearer from user computer 601 to the other access network over trusted hardware. User computer 601 then exchanges data communications over IP network 610 responsive to SIP signaling and using trusted hardware.
  • The above description and associated figures teach the best mode of the invention. The following claims specify the scope of the invention. Note that some aspects of the best mode may not fall within the scope of the invention as specified by the claims. Those skilled in the art will appreciate that the features described above can be combined in various ways to form multiple variations of the invention. As a result, the invention is not limited to the specific embodiments described above, but only by the following claims and their equivalents.

Claims (20)

What is claimed is:
1. A method of operating an Internet Protocol Multimedia Subsystem (IMS) to process Session Initiation Protocol (SIP) signaling to facilitate hardware-trusted data communications, the method comprising:
the IMS exchanging SIP Registration messages with SIP devices and responsively establishing hardware trust with at least some of the SIP devices;
the IMS receiving a SIP Invite message from a first one of the SIP devices requesting a hardware-trusted communication session with a second one of the SIP devices;
the IMS determining if the second SIP device is hardware trusted;
the IMS blocking the SIP Invite message when the second SIP device is not hardware-trusted; and
the IMS forwarding the SIP Invite message when the second SIP device is hardware-trusted.
2. The method of claim 1 further comprising:
the IMS determining if the first SIP device is hardware trusted;
the IMS blocking the SIP Invite message when the first SIP device is not hardware-trusted; and wherein
the IMS forwarding the SIP Invite message when the second SIP device is hardware-trusted comprises the IMS forwarding the SIP Invite message when the first SIP device and the second SIP device are both hardware-trusted.
3. The method of claim 1 further comprising:
the IMS exchanging trust messages with access communication networks and responsively establishing hardware trust with at least some of the access communication networks, wherein one of the access communication networks serves the first SIP device;
the IMS determining if the access communication network serving the first SIP device is hardware trusted;
the IMS blocking the SIP Invite message when the access communication network serving the first SIP device is not hardware-trusted; and wherein
the IMS forwarding the SIP Invite message when the second SIP device is hardware-trusted comprises the IMS forwarding the SIP Invite message when the second SIP device and the access communication network serving the first SIP device are both hardware-trusted.
4. The method of claim 1 further comprising:
the IMS exchanging trust messages with access communication networks and responsively establishing hardware trust with at least some of the access communication networks, wherein one of the access communication networks serves the second SIP device;
the IMS determining if the access communication network serving the second SIP device is hardware trusted;
the IMS blocking the SIP Invite message when the access communication network serving the second SIP device is not hardware-trusted; and wherein
the IMS forwarding the SIP Invite message when the second SIP device is hardware-trusted comprises the IMS forwarding the SIP Invite message when the second SIP device and the access communication network serving the second SIP device are both hardware-trusted.
5. The method of claim 1 further comprising:
the IMS exchanging trust messages with other Internet Protocol Multimedia Subsystems (IMS's) and responsively establishing hardware trust with some of the other IMS's, wherein one of the other IMS's serves the second SIP device;
the IMS determining if the other IMS serving the second SIP device is hardware trusted;
the IMS blocking the SIP Invite message when the other IMS serving the second SIP device is not hardware-trusted; and wherein
the IMS forwarding the SIP Invite message when the second SIP device is hardware-trusted comprises the IMS forwarding the SIP Invite message when the second SIP device and the other IMS serving the second SIP device are both hardware-trusted.
6. The method of claim 1 wherein the SIP Invite message comprises a Session Description Protocol (SDP) file having a requirement for the hardware-trusted data communications.
7. The method of claim 1 wherein the IMS resides in a Network Function Virtualization (NFV) computer system.
8. The method of claim 1 wherein the IMS comprises a Call State Control Function (CSCF).
9. The method of claim 1 wherein the IMS comprises a Border Gateway Control Function (BGCF).
10. The method of claim 1 wherein at least one of the first SIP device and the second SIP device comprise wireless communication devices.
11. An Internet Protocol Multimedia Subsystem (IMS) to process Session Initiation Protocol (SIP) signaling to facilitate hardware-trusted data communications, the IMS comprising:
a Call State Control Function (CSCF) configured to exchange SIP Registration messages with SIP devices to establish hardware trust with some of the SIP devices, receive a SIP Invite message from a first one of the SIP devices requesting a hardware-trusted communication session with a second one of the SIP devices, determine if the second SIP device is hardware trusted, block the SIP Invite message when the second SIP device is not hardware-trusted, and forward the SIP Invite message through a Border Gateway Control Function (BGCF) when the second SIP device is hardware-trusted; and
the BGCF is configured to forward the SIP Invite message.
12. The IMS of claim 11 further comprising the CSCF configured to determine if the first SIP device is hardware trusted, block the SIP Invite message when the first SIP device is not hardware-trusted, and forward the SIP Invite message to the BGCP when the first SIP device and the second SIP device are both hardware-trusted.
13. The IMS of claim 11 further comprising:
the CSCF configured to exchange trust messages with access communication networks to establish hardware trust with some of the access communication networks, wherein at least one of the access communication networks serves the first SIP device; and
the CSCF configured to determine if the access communication network serving the first SIP device is hardware trusted, block the SIP Invite message when the access communication network serving the first SIP device is not hardware-trusted, and forward the SIP Invite message when the second SIP device and the access communication network serving the first SIP device are both hardware-trusted.
14. The IMS of claim 11 further comprising:
the CSCF configured to exchange trust messages with access communication networks to establish hardware trust with at least some of the access communication networks, wherein one of the access communication networks serves the second SIP device; and
the CSCF configured to determine if the access communication network serving the second SIP device is hardware trusted, block the SIP Invite message when the access communication network serving the second SIP device is not hardware-trusted, and forward the SIP Invite message when the second SIP device and the access communication network serving the second SIP device are both hardware-trusted.
15. The IMS of claim 11 further comprising:
the CSCF configured to exchange trust messages with other Internet Protocol Multimedia Subsystems (IMS's) to establish hardware trust with at least some of the other IMS's, wherein one of the other IMS's serves the second SIP device;
the CSCF configured to determine if the other IMS serving the second SIP device is hardware trusted, block the SIP Invite message when the other IMS serving the second SIP device is not hardware-trusted, and forward the SIP Invite message when the second SIP device and the other IMS serving the second SIP device are both hardware-trusted.
16. The IMS of claim 11 wherein the SIP Invite message comprises a Session Description Protocol (SDP) file having a requirement for the hardware-trusted data communications.
17. The IMS of claim 11 wherein the Call State Control Function (CSCF) comprises a Proxy-CSCF.
18. The IMS of claim 11 wherein the Call State Control Function (CSCF) resides in a Network Function Virtualization (NFV) computer system.
19. The IMS of claim 11 wherein the Border Gateway Control Function (CSCF) resides in a Network Function Virtualization (NFV) computer system.
20. The IMS of claim 11 wherein at least one of the first SIP device and the second SIP device comprise wireless communication devices.
US15/496,465 2015-02-25 2017-04-25 Session initiation protocol (sip) communications over trusted hardware Abandoned US20170230428A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/496,465 US20170230428A1 (en) 2015-02-25 2017-04-25 Session initiation protocol (sip) communications over trusted hardware

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/630,978 US9667665B1 (en) 2015-02-25 2015-02-25 Session initiation protocol (SIP) communications over trusted hardware
US15/496,465 US20170230428A1 (en) 2015-02-25 2017-04-25 Session initiation protocol (sip) communications over trusted hardware

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/630,978 Continuation US9667665B1 (en) 2015-02-25 2015-02-25 Session initiation protocol (SIP) communications over trusted hardware

Publications (1)

Publication Number Publication Date
US20170230428A1 true US20170230428A1 (en) 2017-08-10

Family

ID=58738513

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/630,978 Active 2035-12-03 US9667665B1 (en) 2015-02-25 2015-02-25 Session initiation protocol (SIP) communications over trusted hardware
US15/496,465 Abandoned US20170230428A1 (en) 2015-02-25 2017-04-25 Session initiation protocol (sip) communications over trusted hardware

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/630,978 Active 2035-12-03 US9667665B1 (en) 2015-02-25 2015-02-25 Session initiation protocol (SIP) communications over trusted hardware

Country Status (1)

Country Link
US (2) US9667665B1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9979699B1 (en) * 2015-09-08 2018-05-22 Sprint Communications Company L.P. System and method of establishing trusted operability between networks in a network functions virtualization environment
US10044572B1 (en) 2015-11-02 2018-08-07 Sprint Communications Company L.P. Dynamic addition of network function services
US10250498B1 (en) 2016-10-03 2019-04-02 Sprint Communications Company L.P. Session aggregator brokering of data stream communication
US10348488B1 (en) 2017-08-25 2019-07-09 Sprint Communications Company L.P. Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network
US10542115B1 (en) 2015-10-01 2020-01-21 Sprint Communications Company L.P. Securing communications in a network function virtualization (NFV) core network
CN111092842A (en) * 2018-10-23 2020-05-01 中国移动通信集团有限公司 Information processing method, server, network element and storage medium
US20220300614A1 (en) * 2019-11-01 2022-09-22 T-Mobile Innovations Llc Data communication service in a trusted execution environment (tee) at the network edge
US20230269580A1 (en) * 2022-02-18 2023-08-24 Qualcomm Incorporated Securing Media Stream Communications

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9667665B1 (en) * 2015-02-25 2017-05-30 Spring Communications Company L.P. Session initiation protocol (SIP) communications over trusted hardware
CN109995721B (en) * 2017-12-29 2021-10-22 华为技术有限公司 Service request processing method, device and communication system
CN110113623B (en) * 2019-04-18 2021-07-27 浙江工业大学 Audio and video slice transmission platform based on SIP protocol

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050058125A1 (en) * 2003-09-11 2005-03-17 Nokia Corporation IP-based services for circuit-switched networks
US20130286944A1 (en) * 2008-01-24 2013-10-31 At&T Intellectual Property I, L.P. System and Method of Providing IMS Services to Users on Terminating Non IMS Devices
US20140181267A1 (en) * 2012-12-22 2014-06-26 Edgewater Networks, Inc. Methods and systems to split equipment control between local and remote processing units
US9667665B1 (en) * 2015-02-25 2017-05-30 Spring Communications Company L.P. Session initiation protocol (SIP) communications over trusted hardware

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8705518B1 (en) 2003-02-24 2014-04-22 At&T Intellectual Property Ii, L.P. Apparatus and method for controlling services and operations in converged communications networks
US8200827B1 (en) 2004-10-25 2012-06-12 Juniper Networks, Inc. Routing VoIP calls through multiple security zones
US8194640B2 (en) 2004-12-31 2012-06-05 Genband Us Llc Voice over IP (VoIP) network infrastructure components and method
US20060182130A1 (en) 2005-01-24 2006-08-17 Polycom, Inc. Method and system for establishing an audio/video communication session across zones
US8027251B2 (en) 2005-11-08 2011-09-27 Verizon Services Corp. Systems and methods for implementing protocol-aware network firewall
US8176525B2 (en) 2006-09-29 2012-05-08 Rockstar Bidco, L.P. Method and system for trusted contextual communications
US8302186B2 (en) 2007-06-29 2012-10-30 Verizon Patent And Licensing Inc. System and method for testing network firewall for denial-of-service (DOS) detection and prevention in signaling channel
US8514841B2 (en) * 2007-11-30 2013-08-20 Broadsoft, Inc. IP-based call content intercept using repeaters
US8498208B2 (en) * 2009-07-20 2013-07-30 Qualcomm Incorporated Turning on flows in network initiated QoS
US9277021B2 (en) * 2009-08-21 2016-03-01 Avaya Inc. Sending a user associated telecommunication address
US8538926B2 (en) 2011-03-08 2013-09-17 Rackspace Us, Inc. Massively scalable object storage system for storing object replicas
US9113486B2 (en) * 2011-08-12 2015-08-18 Alcatel Lucent Method and apparatus for controlling wireless uplink sessions
US9119111B2 (en) * 2011-08-12 2015-08-25 Alcatel Lucent Method and apparatus for controlling wireless uplink sessions
US8627076B2 (en) * 2011-09-30 2014-01-07 Avaya Inc. System and method for facilitating communications based on trusted relationships
EP2815544A4 (en) 2012-02-14 2015-11-25 Neutral Tandem Inc D B A Inteliquent Systems and methods for facilitation of communications sessions amongst a plurality of networks
US8649770B1 (en) 2012-07-02 2014-02-11 Sprint Communications Company, L.P. Extended trusted security zone radio modem
US8667607B2 (en) 2012-07-24 2014-03-04 Sprint Communications Company L.P. Trusted security zone access to peripheral devices
US8752140B1 (en) 2012-09-11 2014-06-10 Sprint Communications Company L.P. System and methods for trusted internet domain networking
KR101954733B1 (en) 2012-10-26 2019-03-06 삼성전자주식회사 System-on-chip processing secured contents and mobile device comprising the same
US9467103B2 (en) * 2013-11-25 2016-10-11 The Aerospace Corporation System linearization assembly and method for use in modifying distortion components

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050058125A1 (en) * 2003-09-11 2005-03-17 Nokia Corporation IP-based services for circuit-switched networks
US20130286944A1 (en) * 2008-01-24 2013-10-31 At&T Intellectual Property I, L.P. System and Method of Providing IMS Services to Users on Terminating Non IMS Devices
US20140181267A1 (en) * 2012-12-22 2014-06-26 Edgewater Networks, Inc. Methods and systems to split equipment control between local and remote processing units
US9667665B1 (en) * 2015-02-25 2017-05-30 Spring Communications Company L.P. Session initiation protocol (SIP) communications over trusted hardware

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9979699B1 (en) * 2015-09-08 2018-05-22 Sprint Communications Company L.P. System and method of establishing trusted operability between networks in a network functions virtualization environment
US10542115B1 (en) 2015-10-01 2020-01-21 Sprint Communications Company L.P. Securing communications in a network function virtualization (NFV) core network
US11363114B1 (en) 2015-10-01 2022-06-14 Sprint Communications Company L.P. Securing communications in a network function virtualization (NFV) core network
US10044572B1 (en) 2015-11-02 2018-08-07 Sprint Communications Company L.P. Dynamic addition of network function services
US10250498B1 (en) 2016-10-03 2019-04-02 Sprint Communications Company L.P. Session aggregator brokering of data stream communication
US10536373B1 (en) 2016-10-03 2020-01-14 Sprint Communications Company L.P. Session aggregator brokering of data stream communication
US10348488B1 (en) 2017-08-25 2019-07-09 Sprint Communications Company L.P. Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network
US10790965B1 (en) 2017-08-25 2020-09-29 Sprint Communications Company L.P. Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network
CN111092842A (en) * 2018-10-23 2020-05-01 中国移动通信集团有限公司 Information processing method, server, network element and storage medium
US20220300614A1 (en) * 2019-11-01 2022-09-22 T-Mobile Innovations Llc Data communication service in a trusted execution environment (tee) at the network edge
US20230269580A1 (en) * 2022-02-18 2023-08-24 Qualcomm Incorporated Securing Media Stream Communications

Also Published As

Publication number Publication date
US9667665B1 (en) 2017-05-30

Similar Documents

Publication Publication Date Title
US9667665B1 (en) Session initiation protocol (SIP) communications over trusted hardware
US11956284B2 (en) System and method for determining trust for SIP messages
US9491243B2 (en) Methods and apparatus for providing session policy during a registration of a device
EP2647170B1 (en) Dynamic assignment of a serving network node
US20240121278A1 (en) Voice Service Restoration After Element Failure
US10244004B2 (en) Managing interaction constraints
KR100928247B1 (en) Method and system for providing secure communication between communication networks
US8499340B2 (en) IMS network identity management
US8688840B2 (en) Media transmission method and apparatus in a communication system
US9326141B2 (en) Internet protocol multimedia subsystem (IMS) authentication for non-IMS subscribers
US20180006998A1 (en) Multiple parallel webrtc accesses to ims
CN113162886A (en) PBX registration method, equipment and system
KR101612772B1 (en) Method and apparatus for media security
Chiang et al. Network‐initiated simultaneous mobility in voice over 3GPP‐WLAN

Legal Events

Date Code Title Description
AS Assignment

Owner name: SPRINT COMMUNICATIONS COMPANY L.P., KANSAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PACZKOWSKI, LYLE WALTER;RAJAGOPAL, ARUN;MARQUARDT, RONALD R.;SIGNING DATES FROM 20150223 TO 20150225;REEL/FRAME:042333/0631

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION