H04W12/80

CLEANING UP HANGING LAWFUL INTERCEPTION RESOURCES FROM A TRIGGERED POINT OF INTERCEPTION WHEN A TRIGGERING FUNCTION FAILS
20220295290 · 2022-09-15 ·

A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.

FACILITATION OF SMART COMMUNICATIONS HUB TO SUPPORT UNMANNED AIRCRAFT FOR 5G OR OTHER NEXT GENERATION NETWORK
20220303760 · 2022-09-22 ·

Unmanned aircraft systems (UASs) can be supported by a smart communications hub. Network slices can be utilized to provide services to a UAS that has provided its remote identification number to a network node. After the UAS has been authenticated, by an authentication network slice, based on policies hosted at a service capabilities exposure function (SCEF), the UAS can utilize services provided by other network slices. Additionally, or alternatively, a user equipment associated with the UAS can be provided with suggested services hosted on other slices to which the UAS has not been previously subscribed.

FACILITATION OF SMART COMMUNICATIONS HUB TO SUPPORT UNMANNED AIRCRAFT FOR 5G OR OTHER NEXT GENERATION NETWORK
20220303760 · 2022-09-22 ·

Unmanned aircraft systems (UASs) can be supported by a smart communications hub. Network slices can be utilized to provide services to a UAS that has provided its remote identification number to a network node. After the UAS has been authenticated, by an authentication network slice, based on policies hosted at a service capabilities exposure function (SCEF), the UAS can utilize services provided by other network slices. Additionally, or alternatively, a user equipment associated with the UAS can be provided with suggested services hosted on other slices to which the UAS has not been previously subscribed.

Method and system for removing redundant received data flows of interception in IMS domains

The disclosure relates to a method in a Lawful Intercept, LI, management system for removing redundant content of communication, CC flows. Said LI management system is capable of receiving and handling one or more CC flows generated from intercepted target communication sessions. Each CC flow comprises a flow of data packets, each data packet comprising a flow identity of the CC flow. The flow identity comprises an address of a sending intercept access point, IAP, at least one target identifier, TID, and a communication session Correlation Identifier, CI. The method enables the LI management system to forward only one CC flow of CC flows having identical TID and CI, respectively, but different sending intercept access points.

Method and system for removing redundant received data flows of interception in IMS domains

The disclosure relates to a method in a Lawful Intercept, LI, management system for removing redundant content of communication, CC flows. Said LI management system is capable of receiving and handling one or more CC flows generated from intercepted target communication sessions. Each CC flow comprises a flow of data packets, each data packet comprising a flow identity of the CC flow. The flow identity comprises an address of a sending intercept access point, IAP, at least one target identifier, TID, and a communication session Correlation Identifier, CI. The method enables the LI management system to forward only one CC flow of CC flows having identical TID and CI, respectively, but different sending intercept access points.

METHODS FOR PROVIDING REGULATION COMPLIANT PRIVACY AND RELATED APPARATUSES
20220086620 · 2022-03-17 ·

A method of operating a network device in a serving network for providing regulation compliant privacy in a communications network is provided. Operations of such methods include obtaining a concealed subscription identifier from a user equipment, UE, that is associated with a home network, HN, obtaining a permanent subscription identifier that is associated with the concealed subscription identifier from the HN, determining whether the concealed subscription identifier from the UE corresponds to the permanent subscription identifier from the HN, and responsive to determining that the concealed subscription identifier from the UE corresponds to the permanent subscription identifier from the HN, performing further operations to provide service to the UE.

Systems and methods for intercepting network traffic

A system described herein may provide a technique for intercepting user equipment (“UE”) traffic based on granular characteristics specified by a law enforcement agency (“LEA”) or other authorized requestor. The granular characteristics may indicated a content type, keywords, and/or other characteristics that the requestor may desire to intercept. Traffic attributes, which may be different from the granular characteristics, may be identified based on the granular characteristics. Network components suited to intercepting traffic having the identified attributes may be provisioned to intercept the traffic.

Systems and methods for intercepting network traffic

A system described herein may provide a technique for intercepting user equipment (“UE”) traffic based on granular characteristics specified by a law enforcement agency (“LEA”) or other authorized requestor. The granular characteristics may indicated a content type, keywords, and/or other characteristics that the requestor may desire to intercept. Traffic attributes, which may be different from the granular characteristics, may be identified based on the granular characteristics. Network components suited to intercepting traffic having the identified attributes may be provisioned to intercept the traffic.

Techniques for associating geolocation measurements in electronic intelligence (ELINT) applications or other applications

A method includes obtaining multiple geolocation measurements, where each geolocation measurement is generated using cross-ambiguity function (CAF) detection. The geolocation measurements are associated with at least one signal from at least one signal source and received by multiple receivers. The method also includes associating related geolocation measurements to form at least one collection of related geolocation measurements, where each collection of related geolocation measurements is associated with a common one of the at least one signal received by at least some of the receivers. The method further includes performing geolocation using the at least one collection of related geolocation measurements to identify one or more geolocations of the at least one signal source.

Systems and Methods for Intercept Directing in a Monitoring System
20220086598 · 2022-03-17 · ·

Various embodiments of the present invention provide systems and method for supporting target intercept directing.