Patent classifications
H04W12/80
Mobile assesstments for carrier-based blocking of contraband wireless devices
Aspects for initial mobile assessments for use in carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, a contractor performs an initial assessment at a correctional facility using memory and a rapid deployable network including a controller configured to regulate wireless transmissions from or to the facility. The system systematically gathers information from the facility as to authorized wireless devices. The controller allows wireless transmissions to and from authorized devices to pass between the wireless device and a remote location via the network. Conversely, the controller blocks transmissions to or from unauthorized devices. After the initial assessment and follow-up assessments, the contractor departs the facility and sends the identifying information of the unauthorized devices to at least one database for use in network carrier-level blocking of unauthorized transmissions.
Mobile assesstments for carrier-based blocking of contraband wireless devices
Aspects for initial mobile assessments for use in carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, a contractor performs an initial assessment at a correctional facility using memory and a rapid deployable network including a controller configured to regulate wireless transmissions from or to the facility. The system systematically gathers information from the facility as to authorized wireless devices. The controller allows wireless transmissions to and from authorized devices to pass between the wireless device and a remote location via the network. Conversely, the controller blocks transmissions to or from unauthorized devices. After the initial assessment and follow-up assessments, the contractor departs the facility and sends the identifying information of the unauthorized devices to at least one database for use in network carrier-level blocking of unauthorized transmissions.
Managing An Unmanned Aerial Vehicle Identity
In embodiments of systems and methods for managing an unmanned aerial vehicle (UAV) identity, a processor of a network computing device may generate an anonymity token that is associated with a digital certificate of a UAV, provide the anonymity token to the UAV for use in operations, receive a request to authenticate the UAV, wherein the request includes the anonymity token, determine whether the anonymity token included in the request is associated with the digital certificate, and send an indication that the UAV is authenticated responsive to the request in response to determining that the anonymity token included in the request is associated with the digital certificate.
Lawful intercept reporting in wireless networks using public safety relays
A relay device assists in enabling lawful intercept (LI) by reporting, to a LI entity associated with the cellular network, authenticated identities of remote UEs (such as remote UEs connected via proximity services) and identification information that may allow the LI entity to monitor traffic (and/or control statistics related to the traffic) associated with the remote UEs. The authentication of the remote UEs may be performed using a technique that does not require involvement of the cellular network.
Lawful intercept reporting in wireless networks using public safety relays
A relay device assists in enabling lawful intercept (LI) by reporting, to a LI entity associated with the cellular network, authenticated identities of remote UEs (such as remote UEs connected via proximity services) and identification information that may allow the LI entity to monitor traffic (and/or control statistics related to the traffic) associated with the remote UEs. The authentication of the remote UEs may be performed using a technique that does not require involvement of the cellular network.
System and method for decrypting communication exchanged on a wireless local area network
Systems and methods for obtaining authentication vectors issued, for use by a mobile communication terminal, by a Home Location Register (HLR) that serves a cellular communication network independently of any cooperation with the cellular network. Further to obtaining the authentication vectors, a terminal is caused to communicate over a WiFi WLAN using an encryption key derived from the obtained authentication vectors, e.g., per the EAP-SIM or EAP-AKA protocol. Since the encryption key is known, communication from the terminal is decrypted. The authentication vectors may be obtained by (i) an “impersonating” Visitor Location Register (VLR) server that does not serve the cellular network; (ii) an interrogation device which, by imitating a legitimate base station serving the cellular network, solicits the mobile communication terminal to associate with the interrogation device; or (iii) an SS7 probe, which obtains authentication vectors communicated from the HLR server to other entities on the SS7 network.
System and method for decrypting communication exchanged on a wireless local area network
Systems and methods for obtaining authentication vectors issued, for use by a mobile communication terminal, by a Home Location Register (HLR) that serves a cellular communication network independently of any cooperation with the cellular network. Further to obtaining the authentication vectors, a terminal is caused to communicate over a WiFi WLAN using an encryption key derived from the obtained authentication vectors, e.g., per the EAP-SIM or EAP-AKA protocol. Since the encryption key is known, communication from the terminal is decrypted. The authentication vectors may be obtained by (i) an “impersonating” Visitor Location Register (VLR) server that does not serve the cellular network; (ii) an interrogation device which, by imitating a legitimate base station serving the cellular network, solicits the mobile communication terminal to associate with the interrogation device; or (iii) an SS7 probe, which obtains authentication vectors communicated from the HLR server to other entities on the SS7 network.
Carrier-based blocking of contraband devices at a correctional facility
Aspects for carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, an entity (broadly referenced as a contractor) establishes a network at a correctional facility to collect raw data including telecommunications signaling and identifier data during a preconfiguration period. The data is then stored in a memory and processed by a processing system to determine devices that may be contraband. After the Department of Corrections (DOC) authorizes the activity by the contractor to control the devices, the contractor may send a list of contraband devices to the GSMA, the international carrier governing body, or an affiliate or designee thereof, to include in its database(s) this information. The carriers may prevent access by the contraband devices to remote networks by using a database from which an indicator can be provided when access is attempted.
Carrier-based blocking of contraband devices at a correctional facility
Aspects for carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, an entity (broadly referenced as a contractor) establishes a network at a correctional facility to collect raw data including telecommunications signaling and identifier data during a preconfiguration period. The data is then stored in a memory and processed by a processing system to determine devices that may be contraband. After the Department of Corrections (DOC) authorizes the activity by the contractor to control the devices, the contractor may send a list of contraband devices to the GSMA, the international carrier governing body, or an affiliate or designee thereof, to include in its database(s) this information. The carriers may prevent access by the contraband devices to remote networks by using a database from which an indicator can be provided when access is attempted.
CLEANING UP HANGING LAWFUL INTERCEPTION RESOURCES FROM A TRIGGERED POINT OF INTERCEPTION WHEN A TRIGGERING FUNCTION FAILS
A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.