Patent classifications
H04W12/80
CARRIER-BASED BLOCKING OF TELECOMMUNICATION DEVICES AT CORRECTIONAL FACILITY
Aspects for carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, an entity (broadly referenced as a contractor) establishes a network at a correctional facility to collect raw data including telecommunications signaling and identifier data during a preconfiguration period. The data is then stored in a memory and processed by a processing system to determine devices that may be contraband. After the Department of Corrections (DOC) authorizes the activity by the contractor to control the devices, the contractor may send a list of contraband devices to the GSMA, the international carrier governing body, or an affiliate or designee thereof, to include in its database(s) this information. The carriers may prevent access by the contraband devices to remote networks by using a database from which an indicator can be provided when access is attempted.
CARRIER-BASED BLOCKING OF TELECOMMUNICATION DEVICES AT CORRECTIONAL FACILITY
Aspects for carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, an entity (broadly referenced as a contractor) establishes a network at a correctional facility to collect raw data including telecommunications signaling and identifier data during a preconfiguration period. The data is then stored in a memory and processed by a processing system to determine devices that may be contraband. After the Department of Corrections (DOC) authorizes the activity by the contractor to control the devices, the contractor may send a list of contraband devices to the GSMA, the international carrier governing body, or an affiliate or designee thereof, to include in its database(s) this information. The carriers may prevent access by the contraband devices to remote networks by using a database from which an indicator can be provided when access is attempted.
Systems, methods, and devices for privacy and control of traffic accessing PLMN service at a non-public network
Systems and methods are provided to control traffic accessing a public land mobile network service (PLMN) at a nonpublic network to perform local breakout for selected traffic.
Systems, methods, and devices for privacy and control of traffic accessing PLMN service at a non-public network
Systems and methods are provided to control traffic accessing a public land mobile network service (PLMN) at a nonpublic network to perform local breakout for selected traffic.
Lawful interception in mobile connect
A lawful interception, LI, intercept access point, IAP, function (135) in a mobile connect, MC, identity gateway, ID GW, function (107) receives, from a LI administrative function, ADMF (108), a request for activation of LI for a target identity, A, during a specified LI time interval. A detection is made, during the LI time interval, that the ID GW function (107) has at least started an authentication and authorization procedure for a service that the target identity, A, has requested and as a consequence of the detection obtaining, from the ID GW function (107), personal data pertaining to the target identity, A, and providing the obtained personal data pertaining to the target identity, A, to a LI mediation and delivery 10 function MF/DF (132), for example via an X2 interface.
Lawful interception in mobile connect
A lawful interception, LI, intercept access point, IAP, function (135) in a mobile connect, MC, identity gateway, ID GW, function (107) receives, from a LI administrative function, ADMF (108), a request for activation of LI for a target identity, A, during a specified LI time interval. A detection is made, during the LI time interval, that the ID GW function (107) has at least started an authentication and authorization procedure for a service that the target identity, A, has requested and as a consequence of the detection obtaining, from the ID GW function (107), personal data pertaining to the target identity, A, and providing the obtained personal data pertaining to the target identity, A, to a LI mediation and delivery 10 function MF/DF (132), for example via an X2 interface.
METHODS AND SYSTEMS FOR INTERCEPTING USER ACTIVITIES
Methods and systems for reporting a provisioning transaction in a wireless communication network are disclosed. According to an implementation, a lawful interception management system (LIMS) of the wireless communication network may receive, from a law enforcement agency (LEA), a request to track activities of a subscriber of services provided through the communication network. The request may be submitted through a third-party server located in a public network. LIMS may transmit the request to a communication service provider (CSP). Upon receiving the request, CSP may forward the request to one or more servers via dedicated interfaces respectively assigned. The one or more servers may be configured to intercept the provisioning transactions that occurred on different radio access networks, e.g., 2G/3G, 4G/LTE, or 5G. Once the provisioning transaction is intercepted, LIMS may be immediately notified via the dedicated interfaces. Information related to the provisioning transactions is reported to LEA.
METHODS AND SYSTEMS FOR INTERCEPTING USER ACTIVITIES
Methods and systems for reporting a provisioning transaction in a wireless communication network are disclosed. According to an implementation, a lawful interception management system (LIMS) of the wireless communication network may receive, from a law enforcement agency (LEA), a request to track activities of a subscriber of services provided through the communication network. The request may be submitted through a third-party server located in a public network. LIMS may transmit the request to a communication service provider (CSP). Upon receiving the request, CSP may forward the request to one or more servers via dedicated interfaces respectively assigned. The one or more servers may be configured to intercept the provisioning transactions that occurred on different radio access networks, e.g., 2G/3G, 4G/LTE, or 5G. Once the provisioning transaction is intercepted, LIMS may be immediately notified via the dedicated interfaces. Information related to the provisioning transactions is reported to LEA.
Systems and methods to provide lawful interception of infrastructure state in a manner known only to law enforcement
Described herein are systems and methods to provide lawful interception (LI) of infrastructure state in a manner known only to law enforcement. A bare-metal cloud (BMC) control module is provided to an end user to allow user configuration and management for a set of one or more physical resources that form a BMC instantiation for the end user. An LI policy and control module may be used for data traffic tracking or hardware monitoring inside the BMC instantiation upon one or more conditions are met. Upon activation, customizable hardware monitoring may be implemented unbeknownst to the end-user. Such a technique of offering customizable bare-metal level LI service unbeknownst to end-users may enable new kinds of infrastructure interception methods.
Systems and methods to provide lawful interception of infrastructure state in a manner known only to law enforcement
Described herein are systems and methods to provide lawful interception (LI) of infrastructure state in a manner known only to law enforcement. A bare-metal cloud (BMC) control module is provided to an end user to allow user configuration and management for a set of one or more physical resources that form a BMC instantiation for the end user. An LI policy and control module may be used for data traffic tracking or hardware monitoring inside the BMC instantiation upon one or more conditions are met. Upon activation, customizable hardware monitoring may be implemented unbeknownst to the end-user. Such a technique of offering customizable bare-metal level LI service unbeknownst to end-users may enable new kinds of infrastructure interception methods.