Search

US-20260128869-A1 - METHODS, SYSTEMS, AND PROCEDURES FOR QUANTUM SECURE ECOSYSTEMS

US20260128869A1US 20260128869 A1US20260128869 A1US 20260128869A1US-20260128869-A1

Abstract

Aspects of the subject disclosure may include, for example, receiving a first request from a first communication orchestrator of a first protected environment to provide a secure and authenticated connection between a first resource of the first protected environment and a second resource of a second protected environment, accessing first encryption information from the first communication orchestrator and second encryption information from a second communication orchestrator of the second protected environment, verifying a capability for secure quantum communications of an encryption technique of the first communication orchestrator and the second communication orchestrator according to the first encryption information and the second encryption information, and enabling the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications. Other embodiments are disclosed.

Inventors

  • William R. Trost
  • Daniel Solero
  • Michelle Barry
  • Brian Miles

Assignees

  • AT&T INTELLECTUAL PROPERTY I, L.P.

Dates

Publication Date
20260507
Application Date
20241113

Claims (20)

  1. 1 . A device, comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: accessing first encryption information from a first communication orchestrator of a first protected environment and second encryption information from a second communication orchestrator of a second protected environment; updating an encryption technique; verifying a capability for secure quantum communications of the encryption technique of the first communication orchestrator and the second communication orchestrator according to the first and second encryption information; and enabling the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications.
  2. 2 . The device of claim 1 , wherein the first communication orchestrator and the second communication orchestrator facilitate the secure and authenticated connection between a first resource of the first protected environment and a second resource of the second protected environment according to the secure and authenticated communication channel.
  3. 3 . The device of claim 1 , wherein the verifying the capability for secure quantum communications of the encryption technique further comprises determining whether the encryption technique is compromised.
  4. 4 . The device of claim 3 , wherein the operations further comprise updating the encryption technique responsive to determining the encryption technique is compromised.
  5. 5 . The device of claim 4 , wherein the updating the encryption technique further comprises installing a new version of encryption software.
  6. 6 . The device of claim 4 , wherein the updating the encryption technique further comprises installing a new encryption algorithm.
  7. 7 . The device of claim 1 , wherein the operations further comprise: receiving a request from a third resource to join a protected environment; and adding the third resource to a third protected environment of a plurality of available protected environments according to information associated with the third resource.
  8. 8 . The device of claim 7 , wherein the information associated with the third resource comprises the encryption technique.
  9. 9 . The device of claim 7 , wherein the third protected environment is selected according to a preferred encryption method.
  10. 10 . The device of claim 7 , wherein the third protected environment is selected according to a quality of service metric.
  11. 11 . The device of claim 1 , wherein the first protected environment comprises a data center.
  12. 12 . A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations for providing crypto-agile connectivity, the operations comprising: accessing first encryption information from a first communication orchestrator of a first protected environment and second encryption information from a second communication orchestrator of a second protected environment; updating an encryption technique; verifying a capability for secure quantum communications of the encryption technique of the first communication orchestrator and the second communication orchestrator according to the first and second encryption information; and enabling the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications, wherein communications are according to one of a peripheral component interconnect (PCI) encryption protocol, a security parameter index (SPI) encryption protocol, or a Health Insurance Portability and Accountability Act (HIPAA) encryption protocol.
  13. 13 . The non-transitory machine-readable medium of claim 12 , wherein the first communication orchestrator and the second communication orchestrator facilitate the secure and authenticated connection between a first resource of the first protected environment and a second resource of the second protected environment according to the secure and authenticated communication channel.
  14. 14 . The non-transitory machine-readable medium of claim 12 , wherein the verifying the capability for secure quantum communications of the encryption technique further comprises determining whether the encryption technique is compromised.
  15. 15 . The non-transitory machine-readable medium of claim 12 , wherein the first communication orchestrator and the second communication orchestrator facilitate the secure and authenticated connection between a first resource of the first protected environment and a second resource of the second protected environment according to the quantum communications.
  16. 16 . The non-transitory machine-readable medium of claim 12 , wherein the operations further comprise receiving a request from the second communication orchestrator of the second protected environment to provide the secure and authenticated connection between a first resource and a second resource.
  17. 17 . A method for providing crypto-agile connectivity, comprising: accessing, by a processing system including a processor, first encryption information from a first communication orchestrator of a first protected environment and second encryption information from a second communication orchestrator of a second protected environment; updating, by the processing system, an encryption technique; verifying, by the processing system, a capability for secure quantum communications of the encryption technique of the first communication orchestrator and the second communication orchestrator according to the first and second encryption information; and enabling, by the processing system, the first communication orchestrator and the second communication orchestrator to initiate a secure and authenticated communication channel via quantum communications.
  18. 18 . The method of claim 17 , wherein the verifying the capability for secure quantum communications of the encryption technique further comprises determining whether the encryption technique is compromised.
  19. 19 . The method of claim 17 , further comprising updating, by the processing system, the encryption technique responsive to determining the encryption technique is compromised.
  20. 20 . The method of claim 17 , wherein communications are according to one of a peripheral component interconnect (PCI) encryption protocol, a security parameter index (SPI) encryption protocol, or a Health Insurance Portability and Accountability Act (HIPAA) encryption protocol.

Description

CROSS REFERENCE TO RELATED APPLICATIONS This application is a continuation of U.S. patent application Ser. No. 17/959,016, filed on Oct. 3, 2022. All sections of the aforementioned application are incorporated herein by reference in their entirety. FIELD OF THE DISCLOSURE The subject disclosure relates to a methods, systems, and procedures for quantum secure ecosystems. BACKGROUND Modern telecommunications systems provide consumers with telephony capabilities while accessing a large variety of content. Consumers are no longer bound to specific locations when communicating with others or when enjoying multimedia content or accessing the varied resources available via the Internet. Network capabilities have expanded and have created additional interconnections and new opportunities for using mobile communication devices in a variety of situations. Intelligent devices offer new means for experiencing network interactions in ways that anticipate consumer desires and provide solutions to problems. BRIEF DESCRIPTION OF THE DRAWINGS Reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein: FIG. 1 is a block diagram illustrating an exemplary, non-limiting embodiment of a communications network in accordance with various aspects described herein. FIG. 2A is a block diagram illustrating an example, non-limiting embodiment of a system functioning within the communication network of FIG. 1 in accordance with various aspects described herein. FIG. 2B is a block diagram illustrating an example, non-limiting embodiment of a system functioning within the communication network of FIG. 1 in accordance with various aspects described herein. FIG. 2C depicts an illustrative embodiment of a method in accordance with various aspects described herein. FIG. 2D depicts an illustrative embodiment of a method in accordance with various aspects described herein. FIG. 2E depicts an illustrative embodiment of a method in accordance with various aspects described herein. FIG. 3 is a block diagram illustrating an example, non-limiting embodiment of a virtualized communication network in accordance with various aspects described herein. FIG. 4 is a block diagram of an example, non-limiting embodiment of a computing environment in accordance with various aspects described herein. FIG. 5 is a block diagram of an example, non-limiting embodiment of a mobile network platform in accordance with various aspects described herein. FIG. 6 is a block diagram of an example, non-limiting embodiment of a communication device in accordance with various aspects described herein. DETAILED DESCRIPTION The subject disclosure describes, among other things, illustrative embodiments for creating secure and authenticated communication channels between resources in different protected environments. A quantum secure environment orchestrator (QSEO) can provide crypto agility to a system. The QSEO can manage and apply a suite of post-quantum encryption algorithms to a crypto-agile architecture to facilitate secure transmissions between protected environments. The QSEO can determine if a first resource in a first protected environment and a second resource in a second protected environment agree to establish a secure and authenticated connection. The QSEO can ensure that a first communication orchestrator of the first protected environment and a second communication orchestrator of the second protected environment are each operating with a post-quantum security algorithm that is compatible and up to date. The first and second communication orchestrators can use the crypto-agile encryption algorithm to initiate the secure and authenticated communication channel and, in turn, facilitate a secure and authenticated connection between the first and second resources. Other embodiments are described in the subject disclosure. One or more aspects of the subject disclosure include a device including a processing system including a processor and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations. The operations can include receiving a first request from a first communication orchestrator of a first protected environment to provide a secure and authenticated connection between a first resource of the first protected environment and a second resource of a second protected environment. The operations can also include receiving a first request from a first communication orchestrator of a first protected environment to provide a secure and authenticated connection between a first resource of the first protected environment and a second resource of a second protected environment. The operations can further include receiving a first response from the second communication orchestrator of the second protected environment agreeing to accept the secure and authenticated connection between the first resource of the first protected environment and the second re