H04W12/80

Providing information to a core network relating to a cache in an access network

Methods and apparatus for a providing information to a core network where a terminal exchanges data with a cache in an access network. The node stores data in the cache. Data is exchanged between the cache and the terminal, and information relating to the exchanged data is provided to the core network. This allows the core network to apply normal core network functions such as LI, charging and policy control, even when the data does not pass through the core network.

CALL FORWARDING DETECTION IN VOICE OVER PACKET INTERCEPTION

A mechanism for maintaining the same communication identity number when intercepted calls are forwarded is embodied in various methods, devices and media-storing software.

Local communication interception

In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising communication circuitry configured to receive a message, and execution circuitry configured to, in response to the message comprising an instruction to intercept a direct device-to-device (D2D) communication, render the apparatus capable of storing at least in part the direct device-to-device communication in at least one of the apparatus and a memory. The intercepting may comprise lawful interception.

SYSTEMS AND METHODS FOR ANALYZING DRIVING BEHAVIOR TO IDENTIFY DRIVING RISKS USING VEHICLE TELEMATICS

In some implementations, a device may receive historical telematics data associated with a vehicle. The device may determine a set of base line driving parameters based on the historical telematics data. The device may receive current telematics data associated with the vehicle. The device may determine a set of current driving parameters based on the current telematics data. The device may determine, based on processing the set of base line driving parameters and the set of current driving parameters with a machine learning model, a type of driving behavior of a driver of the vehicle. The device may determine, based on processing the set of base line driving parameters and the set of current driving parameters with another machine learning model, a severity score associated with the type of driving behavior. The device may perform an action based on the type of driving behavior and the severity score.

SYSTEMS AND METHODS FOR ANALYZING DRIVING BEHAVIOR TO IDENTIFY DRIVING RISKS USING VEHICLE TELEMATICS

In some implementations, a device may receive historical telematics data associated with a vehicle. The device may determine a set of base line driving parameters based on the historical telematics data. The device may receive current telematics data associated with the vehicle. The device may determine a set of current driving parameters based on the current telematics data. The device may determine, based on processing the set of base line driving parameters and the set of current driving parameters with a machine learning model, a type of driving behavior of a driver of the vehicle. The device may determine, based on processing the set of base line driving parameters and the set of current driving parameters with another machine learning model, a severity score associated with the type of driving behavior. The device may perform an action based on the type of driving behavior and the severity score.

METHOD AND ENTITY IN A LI SYSTEM FOR POSITIONING OF A TARGET CONNECTED TO A WI-FI NETWORK

The present invention relates to a mediation function node in a Lawful Intercept system and a method (S100) in a Lawful Intercept system for enabling a Law Enforcement Agency, LEA, to determine targets' positions. Said targets are connected to a WiFi network via an Access Point. The method comprises steps of:—receiving (S110) a RADIUS account message for a subscriber having been accepted access to the WiFi network;—retrieving (S120) from the received RADIUS account message RADIUS parameters corresponding to an Access Point Identifier and a Service Set Identifier, SSID, if the subscriber is a target;—sending (S130) together with a target identification the RADIUS parameters corresponding to the Access Point Identifier and the SSID to the LEA.

Mobile device monitoring and control system

Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described. One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; and a listen-only recording service in electronic communication with the device controller.

ANTMONITOR: A SYSTEM FOR MOBILE NETWORK MONITORING AND ITS APPLICATIONS

AntMonitor is a system for passive monitoring, collection, and analysis of fine-grained, large-scale packet measurements from mobile devices. The system may be implemented on top of a VPN-based service and using two possible architectures: Client-Server or Mobile-Only. A current implementation of the Mobile-Only design may outperform other mobile-only approaches: it may achieve, for example, 2× and 8× faster (down and uplink) speeds, and close to the raw no-VPN throughput, while using 2-12× less energy. AntMonitor can scale to a large number of end-users, provide enhanced privacy protection, and enable accurate traffic classification. The system may support (i) real-time detection and prevention of private information leak-age from the device to the network; (ii) passive performance measurements network-wide as well as per-user; and (iii) traffic classification at different granularities (including per-application or per device, and user profiling) based on TCP/IP header features.

Lawful interception method and apparatus of D2D communication-capable terminal

A Lawful Interception (LI) method performed between a network and a terminal operating in Device-to-Device (D2D) communication mode to intercept D2D communication content are provided. The lawful interception method includes a D2D communication terminal according to the present disclosure includes activating a lawful interception function, storing information exchanged with a peer terminal through D2D communication, and transmitting a lawful interception report including the stored information.

Lawful interception for 2G/3G equipment interworking with evolved packet system

A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. A first parameter value in traffic for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic will be intercepted or retained at a second node crossed by the traffic is evaluated. If the second node will intercept or retain the traffic, the first node foregoes a lawful interception request or retention of intercepted data.