Methods and apparatus to configure virtual private mobile networks for security

    公开(公告)号:US10069799B2

    公开(公告)日:2018-09-04

    申请号:US15194037

    申请日:2016-06-27

    Abstract: Methods and apparatus to configure virtual private mobile networks are disclosed. Example methods include provisioning a virtual private mobile network within a wireless network, and, after provisioning the virtual private mobile network, determining whether a first communication from a user equipment matches a security event profile. When the first communication matches the profile, the example methods include transmitting, from the wireless network via a first base transceiver station, an instruction to cause the user equipment to be communicatively coupled to the virtual private mobile network. The example methods further include instructing the user equipment to transmit a second communication through a second base transceiver station that is physically separate from the first base transceiver station and through the virtual private mobile network. In the example methods, the virtual private mobile network is isolated in a wireless spectrum from other portions of the network.

    METHODS AND APPARATUS TO MIGRATE A MOBILE DEVICE FROM A FIRST VIRTUAL PRIVATE MOBILE NETWORK TO A SECOND VIRTUAL PRIVATE MOBILE NETWORK TO REDUCE LATENCY
    12.
    发明申请
    METHODS AND APPARATUS TO MIGRATE A MOBILE DEVICE FROM A FIRST VIRTUAL PRIVATE MOBILE NETWORK TO A SECOND VIRTUAL PRIVATE MOBILE NETWORK TO REDUCE LATENCY 审中-公开
    将移动设备从第一虚拟私有移动网络转移到第二虚拟私有移动网络以减少延迟的方法和装置

    公开(公告)号:US20160353345A1

    公开(公告)日:2016-12-01

    申请号:US15231406

    申请日:2016-08-08

    Abstract: Methods and apparatus to migrate a mobile device from a first virtual private mobile network to a second virtual private mobile network are disclosed. An example apparatus includes a processor and a memory including instructions that cause the processor to perform operations including determining, based on a set of latency routing rules, that a communication transmitted via the first virtual private mobile network is a latency sensitive communication. In response to determining the communication is a latency sensitive communication, the mobile device that originated the latency sensitive communication is identified. The mobile device is communicating via the first virtual private mobile network. Example operations also include migrating the mobile device from the first virtual private mobile network to the second virtual private mobile network wherein the second virtual private mobile network is configured to reduce the latency of the latency sensitive communication.

    Abstract translation: 公开了将移动设备从第一虚拟专用移动网络迁移到第二虚拟专用移动网络的方法和装置。 示例性设备包括处理器和存储器,其包括使得处理器执行操作的指令,包括基于一组等待时间路由规则来确定经由第一虚拟专用移动网络发送的通信是等待时间敏感通信。 响应于确定通信是延迟敏感通信,识别发起等待时间敏感通信的移动设备。 移动设备正在经由第一虚拟专用移动网络进行通信。 示例性操作还包括将移动设备从第一虚拟专用移动网络迁移到第二虚拟专用移动网络,其中第二虚拟专用移动网络被配置为减少等待时间敏感通信的等待时间。

    METHODS AND APPARATUS TO IDENTIFY AN INTERNET PROTOCOL ADDRESS BLACKLIST BOUNDARY
    14.
    发明申请
    METHODS AND APPARATUS TO IDENTIFY AN INTERNET PROTOCOL ADDRESS BLACKLIST BOUNDARY 审中-公开
    识别互联网协议地址黑名单边界的方法和设备

    公开(公告)号:US20150312269A1

    公开(公告)日:2015-10-29

    申请号:US14792938

    申请日:2015-07-07

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify candidate boundaries of Internet protocol addresses associated with a malicious Internet protocol address. An example method includes collecting, with a processor, netflow data associated with the Internet protocol addresses within a netblock having a lower boundary Internet protocol address and an upper boundary Internet protocol address, generating, with the processor, a first window of Internet protocol addresses numerically lower than the malicious Internet protocol address, generating, with the processor, a second window of Internet protocol addresses numerically higher than the malicious Internet protocol address, for respective Internet protocol addresses in the first and second windows, calculating, with the processor, occurrence counts associated with behavior features, and identifying candidate boundaries within the netblock based on divergence values caused by the behavior features.

    Abstract translation: 公开了方法,装置,系统和制品,以识别与恶意因特网协议地址相关联的因特网协议地址的候选边界。 一个示例性方法包括与处理器一起收集与具有较低边界因特网协议地址和上限网络协议地址的网络块内的因特网协议地址相关联的网络流数据,其中处理器以数字方式生成互联网协议地址的第一窗口 低于恶意互联网协议地址,利用处理器,为第一和第二窗口中的各个互联网协议地址生成数字上高于恶意互联网协议地址的互联网协议地址的第二窗口,与处理器一起计算发生次数 与行为特征相关联,并且基于由行为特征引起的发散值来识别网络块内的候选边界。

Patent Agency Ranking