Patent classifications
H04W12/80
Control mechanism for supporting services in mobile edge computing environment
An apparatus for use by a mobile edge control element or function, the apparatus comprising at least one processing circuitry, and at least one memory for storing instructions to be executed by the processing circuitry, wherein the at least one memory and the instructions are configured to, with the at least one processing circuitry, cause the apparatus at least: to participate in a mobile edge computing based communication of at least one communication element in a communication network, to prepare and send a special data packet to a core network control element or function, wherein the special data packet includes, as a packet source indication, an address information of the at least one communication element and, as a packet destination indication, an address information of the mobile edge control element or function, to receive and process an enriched data packet being based on the special data packet, the enriched data packet including subscriber related identification data for the at least one communication element, to collect the subscriber related identification data from the enriched data packet, and to conduct a communication related processing related to the at least one communication element using the collected subscriber related identification data.
Securing Method for Lawful Interception
A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.
Securing Method for Lawful Interception
A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.
Method, apparatus, and system for monitoring encrypted communication session
The disclosure relates to a method of supporting monitoring of an encrypted data communication session of a first device, the method comprising: receiving a signal for initiating a communication session with a second device; generating an encryption key for encryption of the communication session; determining whether a monitoring signal is received for the communication session; and transmitting information about the encryption key to the second device by using a predetermined packet based on the determination.
Method, apparatus, and system for monitoring encrypted communication session
The disclosure relates to a method of supporting monitoring of an encrypted data communication session of a first device, the method comprising: receiving a signal for initiating a communication session with a second device; generating an encryption key for encryption of the communication session; determining whether a monitoring signal is received for the communication session; and transmitting information about the encryption key to the second device by using a predetermined packet based on the determination.
Land mobile radios and methods for operating the same
Systems and methods for operating a Land Mobile Radio (“LMR”). The methods comprise: performing Near Field Communication (“NFC”) or Radio Frequency Identification (“RFID”) operations by the LMR and an external device; and sending from the LMR or receiving at the LMR information associated with the NFC or RFID operations via the packet switched LMR infrastructure. The information associated with the NFC or RFID operations includes, but is not limited to, check-in information for an incident event, check-out information for an incident, sensor data, authentication keys, verification keys, access codes, and LMR configuration (e.g. personality) information, LMR software code, and/or LMR firmware.
METHOD AND SYSTEM FOR VEHICLE LOCATION TRACKING USING V2X COMMUNICATION
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.
METHOD AND SYSTEM FOR VEHICLE LOCATION TRACKING USING V2X COMMUNICATION
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.
VERIFICATION OF LAWFUL INTERCEPTION DATA
A permissioned blockchain is used in a lawful interception, LI, context. Participants include a law enforcement agency, LEA, function, a LI mediation and delivery function, MF/DF, and an intercepting network function. A smart contract registered in the blockchain includes conditions associated with intercept related information, IRI, and/or communication content, CC, transactions. Registration is made in the blockchain of IRI and/or CC transactions performed by the participants during LI of a communication between two entities in a telecommunication network. The registered IRI and/or CC transactions are propagated among the participants and the smart contract is executed to verify whether or not the registered IRI and/or CC transactions are compliant with the smart contract. The participants are then informed about whether or not the registered IRI and/or CC transactions are compliant with the smart contract.
Service processing method and apparatus
The present invention discloses a service processing method and apparatus, and relates to the communications field. The method includes: receiving trigger information sent by an intermediary device; and assisting, based on the trigger information, the intermediary device in negotiating with UE and a network server, to enable the intermediary device to obtain a first key, where the first key is used by the intermediary device to decrypt ciphertexts sent by the UE and the network server, the ciphertext is obtained after the UE or the network server encrypts service information by using a second key, and the first key is corresponding to the second key. The present invention resolves a problem that an intermediary device cannot provide service optimization for user equipment and a network server because the intermediary device cannot decrypt ciphertext, and achieves an effect of expanding a usage scope of service optimization.