×

Methods and apparatus to configure virtual private mobile networks for security

  • US 10,069,799 B2
  • Filed: 06/27/2016
  • Issued: 09/04/2018
  • Est. Priority Date: 06/21/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • provisioning first and second virtual private mobile networks within a wireless network, the first virtual private mobile network to process communications associated with a first type of security event and the second virtual private mobile network to process communications associated with a second type of security event;

    after provisioning the first and second virtual private mobile networks, determining whether a first communication from user equipment corresponds to the first type of security event or the second type of security even;

    transmitting, via a first base transceiver station, an instruction to cause the user equipment to communicatively couple to the first virtual private mobile network when the first communication corresponds to the first type of security event, or to communicatively couple to the second virtual private mobile network when the first communication corresponds to the second type of security event;

    instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station, and through the first virtual private mobile network when the first communication corresponds to the first type of security event; and

    instructing the user equipment to transmit the second communication through the second base transceiver station, and through the second virtual private mobile network when the first communication corresponds to the second type of security event, the first and second virtual private mobile networks being isolated in a wireless spectrum from other portions of the wireless network, wherein the first type of security event and the second type of security event are different types of security events and at least one of the first type of security event and the second type of security event is at least one of a virus, a network worm, a denial of service attack, an unsupported feature on the user equipment, a vulnerability on the user equipment, and a malicious application on the user equipment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×