Methods and apparatus to configure virtual private mobile networks for security
First Claim
1. A method comprising:
- provisioning first and second virtual private mobile networks within a wireless network, the first virtual private mobile network to process communications associated with a first type of security event and the second virtual private mobile network to process communications associated with a second type of security event;
after provisioning the first and second virtual private mobile networks, determining whether a first communication from user equipment corresponds to the first type of security event or the second type of security even;
transmitting, via a first base transceiver station, an instruction to cause the user equipment to communicatively couple to the first virtual private mobile network when the first communication corresponds to the first type of security event, or to communicatively couple to the second virtual private mobile network when the first communication corresponds to the second type of security event;
instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station, and through the first virtual private mobile network when the first communication corresponds to the first type of security event; and
instructing the user equipment to transmit the second communication through the second base transceiver station, and through the second virtual private mobile network when the first communication corresponds to the second type of security event, the first and second virtual private mobile networks being isolated in a wireless spectrum from other portions of the wireless network, wherein the first type of security event and the second type of security event are different types of security events and at least one of the first type of security event and the second type of security event is at least one of a virus, a network worm, a denial of service attack, an unsupported feature on the user equipment, a vulnerability on the user equipment, and a malicious application on the user equipment.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus to configure virtual private mobile networks are disclosed. Example methods include provisioning a virtual private mobile network within a wireless network, and, after provisioning the virtual private mobile network, determining whether a first communication from a user equipment matches a security event profile. When the first communication matches the profile, the example methods include transmitting, from the wireless network via a first base transceiver station, an instruction to cause the user equipment to be communicatively coupled to the virtual private mobile network. The example methods further include instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station and through the virtual private mobile network. In the example methods, the virtual private mobile network is isolated in a wireless spectrum from other portions of the network.
-
Citations
17 Claims
-
1. A method comprising:
-
provisioning first and second virtual private mobile networks within a wireless network, the first virtual private mobile network to process communications associated with a first type of security event and the second virtual private mobile network to process communications associated with a second type of security event; after provisioning the first and second virtual private mobile networks, determining whether a first communication from user equipment corresponds to the first type of security event or the second type of security even; transmitting, via a first base transceiver station, an instruction to cause the user equipment to communicatively couple to the first virtual private mobile network when the first communication corresponds to the first type of security event, or to communicatively couple to the second virtual private mobile network when the first communication corresponds to the second type of security event; instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station, and through the first virtual private mobile network when the first communication corresponds to the first type of security event; and instructing the user equipment to transmit the second communication through the second base transceiver station, and through the second virtual private mobile network when the first communication corresponds to the second type of security event, the first and second virtual private mobile networks being isolated in a wireless spectrum from other portions of the wireless network, wherein the first type of security event and the second type of security event are different types of security events and at least one of the first type of security event and the second type of security event is at least one of a virus, a network worm, a denial of service attack, an unsupported feature on the user equipment, a vulnerability on the user equipment, and a malicious application on the user equipment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
a processor; and memory including machine readable instructions that, when executed by the processor, cause the processor to perform operations including; provisioning first and second virtual private mobile networks within a wireless network, the first virtual private mobile network to process communications associated with a first type of security event and the second virtual private mobile network to process communications associated with a second type of security event, the first type of security event and the second type of security event being different types of security events, and at least one of the first type of security event and the second type of security event is at least one of a virus, a network worm, a denial of service attack, an unsupported feature on the user equipment, a vulnerability on the user equipment, and a malicious application on the user equipment; after provisioning the first and second virtual private mobile networks, determining whether a first communication from user equipment corresponds to the first type of security event or the second type of security event, transmitting, via a first base transceiver station, an instruction to cause the user equipment to communicatively couple to the first virtual private mobile network when the first communication corresponds to the first type of security event, or to communicatively couple to the second virtual private mobile network when the first communication corresponds to the second type of security event; instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station, and through the first virtual private mobile network when the first communication corresponds to the first type of security event; and instructing the user equipment to transmit the second communication through the second base transceiver station, and through the second virtual private mobile network when the first communication corresponds to the second type of security event, the first and second virtual private mobile networks being isolated in a wireless spectrum from other portions of the wireless network. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A tangible computer readable medium including computer readable instructions that, when executed, cause a machine to perform operations comprising:
-
provisioning first and second virtual private mobile networks for security within a wireless network, the first virtual private mobile network to process communications associated with a first type of security event and the second virtual private mobile network to process communications associated with a second type of security event, the first type of security event and the second type of security event being different types of security events, and at least one of the first type of security event and the second type of security event is at least one of a virus, a network worm, a denial of service attack, an unsupported feature on the user equipment, a vulnerability on the user equipment, and a malicious application on the user equipment; after the first and second virtual private mobile networks are provisioned, determining whether a first communication from user equipment corresponds to the first type of security event or the second type of security event; transmitting, via a first base transceiver station, an instruction to cause the user equipment to communicatively couple to the first virtual private mobile network when the first communication corresponds to the first type of security event, or to communicatively couple to the second virtual private mobile network when the first communication corresponds to the second type of security event; instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station, and through the first virtual private mobile network when the first communication corresponds to the first type of security event; and instructing the user equipment to transmit the second communication through the second base transceiver station, and through the second virtual private mobile network when the first communication corresponds to the second type of security event, the first and second virtual private mobile networks being isolated in a wireless spectrum from other portions of the wireless network. - View Dependent Claims (15, 16, 17)
-
Specification