Multi-access distributed edge security in mobile networks
First Claim
1. A system, comprising:
- a processor configured to;
monitor network traffic on a service provider network at a security platform to identify a new session, wherein the security platform monitors wireless interfaces including a plurality of interfaces for a control protocol and user data traffic in a mobile core network for a 5G network to provide multi-access distributed edge security for the 5G network, and wherein the service provider network includes the 5G network or a converged 5G network, wherein the monitoring of the network traffic comprises to;
identify data type SmContextCreateData and/or data type PduSessionCreateData in the network traffic;
extract subscription and/or equipment identifier information for user traffic associated with the new session at the security platform, wherein the subscription and/or equipment identifier information is identified by a Subscription Permanent Identifier (SUPI), a General Public Subscription Identifier (GPSI), and/or a Permanent Equipment Identifier (PEI), wherein the extracting of the subscription and/or equipment identifier information comprises to;
extract the subscription and/or equipment identifier information from the data type SmContextCreateData and/or data type PduSessionCreateData;
determine a security policy to apply at the security platform to the new session based on the subscription and/or equipment identifier information; and
block the new session from accessing a resource based on the security policy; and
a memory coupled to the processor and configured to provide the processor with instructions.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for providing multi-access distributed edge security in mobile networks (e.g., service provider networks for mobile subscribers, such as for 5G networks) are disclosed. In some embodiments, a system/process/computer program product for multi-access distributed edge security in mobile networks in accordance with some embodiments includes monitoring network traffic on a service provider network at a security platform to identify a new session, wherein the service provider network includes a 5G network or a converged 5G network; extracting subscription and/or equipment identifier information for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the subscription and/or equipment identifier information.
47 Citations
16 Claims
-
1. A system, comprising:
-
a processor configured to; monitor network traffic on a service provider network at a security platform to identify a new session, wherein the security platform monitors wireless interfaces including a plurality of interfaces for a control protocol and user data traffic in a mobile core network for a 5G network to provide multi-access distributed edge security for the 5G network, and wherein the service provider network includes the 5G network or a converged 5G network, wherein the monitoring of the network traffic comprises to; identify data type SmContextCreateData and/or data type PduSessionCreateData in the network traffic; extract subscription and/or equipment identifier information for user traffic associated with the new session at the security platform, wherein the subscription and/or equipment identifier information is identified by a Subscription Permanent Identifier (SUPI), a General Public Subscription Identifier (GPSI), and/or a Permanent Equipment Identifier (PEI), wherein the extracting of the subscription and/or equipment identifier information comprises to; extract the subscription and/or equipment identifier information from the data type SmContextCreateData and/or data type PduSessionCreateData; determine a security policy to apply at the security platform to the new session based on the subscription and/or equipment identifier information; and block the new session from accessing a resource based on the security policy; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
monitoring network traffic on a service provider network at a security platform to identify a new session, wherein the security platform monitors wireless interfaces including a plurality of interfaces for a control protocol and user data traffic in a mobile core network for a 5G network to provide multi-access distributed edge security for the 5G network, and wherein the service provider network includes the 5G network or a converged 5G network, wherein the monitoring of the network traffic comprises; identifying data type SmContextCreateData and/or data type PduSessionCreateData in the network traffic; extracting subscription and/or equipment identifier information for user traffic associated with the new session at the security platform, wherein the subscription and/or equipment identifier information is identified by a Subscription Permanent Identifier (SUPI), a General Public Subscription Identifier (GPSI), and/or a Permanent Equipment Identifier (PEI), wherein the extracting of the subscription and/or equipment identifier information comprises; extracting the subscription and/or equipment identifier information from the data type SmContextCreateData and/or data type PduSessionCreateData; determining a security policy to apply at the security platform to the new session based on the subscription and/or equipment identifier information; and blocking the new session from accessing a resource based on the security policy. - View Dependent Claims (12, 13)
-
-
14. A computer program product, the computer program product being embodied in a tangible non-transitory computer readable storage medium and comprising computer instructions for:
-
monitoring network traffic on a service provider network at a security platform to identify a new session, wherein the security platform monitors wireless interfaces including a plurality of interfaces for a control protocol and user data traffic in a mobile core network for a 5G network to provide multi-access distributed edge security for the 5G network, and wherein the service provider network includes the 5G network or a converged 5G network, wherein the monitoring of the network traffic comprises; identifying data type SmContextCreateData and/or data type PduSessionCreateData in the network traffic; extracting subscription and/or equipment identifier information for user traffic associated with the new session at the security platform, wherein the subscription and/or equipment identifier information is identified by a Subscription Permanent Identifier (SUPI), a General Public Subscription Identifier (GPSI), and/or a Permanent Equipment Identifier (PEI), wherein the extracting of the subscription and/or equipment identifier information comprises; extracting the subscription and/or equipment identifier information from the data type SmContextCreateData and/or data type PduSessionCreateData; determining a security policy to apply at the security platform to the new session based on the subscription and/or equipment identifier information; and blocking the new session from accessing a resource based on the security policy. - View Dependent Claims (15)
-
-
16. A system, comprising:
-
a processor configured to; monitor network traffic on a service provider network at a security platform to identify a new session, wherein the security platform monitors wireless interfaces including a plurality of interfaces for a control protocol and user data traffic in a mobile core network for a 5G network to provide multi-access distributed edge security for the 5G network, and wherein the service provider network includes the 5G network or a converged 5G network, wherein the monitoring of the network traffic comprises to; identify data type SmContextCreateData and/or data type PduSessionCreateData in the network traffic; extract network access identifier information for user traffic associated with the new session at the security platform, wherein the network access identifier information is identified by a Network Access Identifier (NAI) related information, wherein the NAI is associated with a user identity submitted by a client during a network access authentication, wherein the extracting of the network access identifier information comprises to; extract the network access identifier information from the data type SmContextCreateData and/or data type PduSessionCreateData; determine a security policy to apply at the security platform to the new session based on the network access identifier information; and block the new session from accessing a resource based on the security policy; and a memory coupled to the processor and configured to provide the processor with instructions.
-
Specification