H04L63/30

Method and Devices for Triggering Lawful Interception

Methods and apparatuses start lawful interception of an ongoing communication process in an after-handover network environment prior to completing an international handover of a user device. The user device is party of the ongoing communication process and an LI target. The user device being an LI target is determined based on the user device's identity, which is retrieved if the international handover is initiated.

Information collection system, information collection method, and non-transitory computer readable medium storing control program
11558430 · 2023-01-17 · ·

In an information collection system, an address posting unit posts address information of a hidden service provided by a hidden service providing system to a server serving as a posting target server. Then, the hidden service providing system provides a hidden service appropriate to a hidden service request received from a user terminal to the user terminal. After that, an information collection unit collects information (e.g., input request information, service result information, etc.) about the hidden service provided by the hidden service providing system.

TR069 PROTOCOL MANAGEMENT METHOD ORIENTED TO WIA-PA NETWORK
20180013606 · 2018-01-11 ·

The present invention claims a TR069 protocol management method oriented to a WIA-PA network, where a traditional TR069 network management system architecture is improved to extend a TR069 protocol only oriented to Internet terminal device management in an initial design from the Internet to a WIA-PA wireless sensor network; a session connection interaction process between an ACS and a CPE is expanded to establish a session connection between the ACS and a WIA-PA network node; a virtual device mechanism is designed by taking a WIA-PA network gateway as the CPE to store a TR069 data model and proxy device information corresponding to a WIA-PA data model and implement the TR069 protocol to manage the WIA-PA network node in a manner as simple and transparent as that for an interaction between the ACS and the common CPE; a management data model mapping mechanism is designed to establish a correlation from the WIA-PA data model described in TR069 to a standard WIA-PA data model; and a protocol conversion interlace is designed to implement the conversion between a TR069 RPC method and a WIA-PA network management command frame. The TR069 protocol management method has a good reference value for the implementation of the M2M management of the whole network as well as the application and development of the TR069 protocol oriented to the wireless sensor network.

MANAGING LAWFUL INTERCEPTION INFORMATION
20230007052 · 2023-01-05 ·

A determination is made that an identity of a non-target communicating entity (102) with which a target communicating entity (101) is communicating, is to be obfuscated in any report of lawful interception of the target communicating entity (101) to a law enforcement agency (131). Lawful interception is performed of the target communicating entity (101) and information pertaining to the lawful interception of the target communicating entity (101) is reported to the law enforcement agency (131). The reported information comprises non-obfuscated identity information of the target communicating entity (101) and obfuscated identity information of the non-target communicating entity (102).

System and Method for Capturing Data Sent by a Mobile Device
20230214376 · 2023-07-06 ·

Systems and methods for providing capture, archival, and analysis of data sent by mobile devices over a carrier network, with the systems and methods not requiring the installation of any additional software on the mobile devices, the systems and methods also providing for alerts to be generated based on the content of the data.

Methods and apparatus for HyperSecure last mile communication

A variety of techniques for concealing the content of a communication between a client device, such as a cell phone or laptop, and a network or cloud of media nodes are disclosed. Among the techniques are routing data packets in the communication to different gateway nodes in the cloud, sending the packets over different physical media, such as an Ethernet cable or WiFi channel, and disguising the packets by giving them different source addressees. Also disclosed are a technique for muting certain participants in a conference call and a highly secure method of storing data files.

OPTIMIZED ROUTING FOR LAW ENFORCEMENT SUPPORT

An improved lawful intercept (LI) infrastructure is described. In response to a valid LI provisioning request, a subscriber management component statically allocates a user equipment (UE) subject to the LI provisioning request to an edge location comprising a high-speed gateway and a Mediation and Delivery Function (MDF), which coordinates the delivery of intercepted communications. The subscriber management component maintains this allocation for the life of the LI provisioning request and reverses the UE to a dynamic gateway allocation scheme when the LI provisioning request ends. As a result, only a subset of edge locations must be equipped with MDFs, and the handover is transparent to the UE.

Operation related to user equipment using secret identifier

A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.

IDENTIFYING AN ACTIVE ADMINISTRATION FUNCTION (ADMF) IN A LAWFUL INTERCEPTION DEPLOYMENT THAT UTILIZES A PLURALITY OF ADMFS
20220407895 · 2022-12-22 ·

A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.

System and method for capturing data sent by a mobile device
11531667 · 2022-12-20 · ·

Data can originate from at least one device. The data can be received by at least one network element corresponding to a network. The data can be sent over the network by the at least one device. The data can be analyzed to determine a presence of one or more keywords or key phrases in the data received. A determination can be performed to determine whether or not to filter or block the data. The data can be blocked or filtered according to the determination.