METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY
First Claim
1. A method to configure a virtual private mobile network, the method comprising:
- identifying, in a wireless network, a communication from a user equipment that matches a security event profile;
transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network; and
enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network.
47 Citations
20 Claims
-
1. A method to configure a virtual private mobile network, the method comprising:
-
identifying, in a wireless network, a communication from a user equipment that matches a security event profile; transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network; and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus to configure a virtual private mobile network, the apparatus comprising:
-
a network manager to; identify available network elements within a wireless network to provision a virtual private mobile network; and configure a portion of a control plane and a portion of a data plane of the identified network elements for the virtual private mobile network; and a security processor to; provision the virtual private mobile network for security to process communications securely isolated from other portions of the wireless network; and a device migrator to communicatively couple user equipment to the virtual private mobile network. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A tangible machine-accessible medium having instructions stored thereon that, when executed, cause a machine to at least:
-
identify, in a wireless network, a communication from a user equipment that matches a security event profile; transmit, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network; and enable the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network. - View Dependent Claims (18, 19, 20)
-
Specification