H04W12/80

DETECTING RELATED INFORMATION ON CALLS IN MULTI-TENANT SYSTEM AND FOR CONSENT BASED INFORMATION SHARING
20220415313 · 2022-12-29 ·

Methods and systems for consent based information sharing. One system includes a server including an electronic processor configured to receive a first set of parsed communication data for a first talkgroup and a second set of parsed communication data for a second talkgroup. The electronic processor is configured to determine a topic of interest of the first talkgroup. The electronic processor is configured to identify relevant communication data from the second set of parsed communication data, where the relevant communication data is relevant to the topic of interest. The electronic processor is configured to determine whether the relevant communication data is shareable. The electronic processor is configured to, in response to determining that the relevant communication data is not shareable, request consent from the first talkgroup and the second talkgroup to share the relevant communication data, and, in response to receiving consent, enable sharing of the relevant communication data.

OPTIMIZED ROUTING FOR LAW ENFORCEMENT SUPPORT

An improved lawful intercept (LI) infrastructure is described. In response to a valid LI provisioning request, a subscriber management component statically allocates a user equipment (UE) subject to the LI provisioning request to an edge location comprising a high-speed gateway and a Mediation and Delivery Function (MDF), which coordinates the delivery of intercepted communications. The subscriber management component maintains this allocation for the life of the LI provisioning request and reverses the UE to a dynamic gateway allocation scheme when the LI provisioning request ends. As a result, only a subset of edge locations must be equipped with MDFs, and the handover is transparent to the UE.

OPTIMIZED ROUTING FOR LAW ENFORCEMENT SUPPORT

An improved lawful intercept (LI) infrastructure is described. In response to a valid LI provisioning request, a subscriber management component statically allocates a user equipment (UE) subject to the LI provisioning request to an edge location comprising a high-speed gateway and a Mediation and Delivery Function (MDF), which coordinates the delivery of intercepted communications. The subscriber management component maintains this allocation for the life of the LI provisioning request and reverses the UE to a dynamic gateway allocation scheme when the LI provisioning request ends. As a result, only a subset of edge locations must be equipped with MDFs, and the handover is transparent to the UE.

IDENTIFYING AN ACTIVE ADMINISTRATION FUNCTION (ADMF) IN A LAWFUL INTERCEPTION DEPLOYMENT THAT UTILIZES A PLURALITY OF ADMFS
20220407895 · 2022-12-22 ·

A method for identifying an active administration function (ADMF) in a lawful interception deployment that utilizes an ADMF set comprising a plurality of ADMFs can be implemented by a network element. The method can include exchanging lawful interception signaling with a first ADMF when the first ADMF is the active ADMF. The method can also include receiving an auditing request message from one of the plurality of ADMFs in the ADMF set and sending a ping request message to each ADMF in the ADMF set. The method can also include receiving a ping response message from a second ADMF among the plurality of ADMFs in the ADMF set and identifying the second ADMF as the active ADMF in response to receiving the ping response message. The method can also include exchanging second lawful interception signaling with the second ADMF when the second ADMF is the active ADMF.

DLP Exact Data Matching
20220374599 · 2022-11-24 ·

Systems and methods of Exact Data Matching (EDM) include receiving customer specific sensitive data for a customer, wherein the customer specific sensitive data are converted into a plurality of tokens; receiving a configuration for exact data matching of the plurality of tokens; performing inline monitoring of a user associated with the customer; detecting a presence of one or more tokens of the plurality of tokens based on the inline monitoring; and, responsive to the detecting, performing an action based on the configuration.

Identifiers in a wireless communication system

A method performed by a resolver in a core network of a wireless communication system, where the method comprise: receiving, from a requester in the core network, a request to resolve a provided identifier that is one of a subscription identifier and a pseudonym identifier serving in the core network as a pseudonym for the subscription identifier; and transmitting, to the requester as a response to the request, a resolved identifier that is the other of the subscription identifier and the pseudonym identifier.

Identifiers in a wireless communication system

A method performed by a resolver in a core network of a wireless communication system, where the method comprise: receiving, from a requester in the core network, a request to resolve a provided identifier that is one of a subscription identifier and a pseudonym identifier serving in the core network as a pseudonym for the subscription identifier; and transmitting, to the requester as a response to the request, a resolved identifier that is the other of the subscription identifier and the pseudonym identifier.

Methods and Apparatuses for Managing Compromised Communication Devices in a Communication Network

A communication network (10) provides communicative coupling between potentially large populations of Internet-of-Things (IoT) devices (12) and/or other types of communication devices (12) and one or more Application Servers (ASs) (14) that are affiliated with respective ones of the communication devices (12). One or more network functions (30, 58) in the communication network (10) are operative to determine that any given one of the communication devices (12) is compromised, or that multiple such devices (12) are compromised, and provide for management of such devices (12) within the network (10) as “compromised” devices (12). Aspects of compromised-device management include forcing re-registration of such devices (12), for quarantining them in one or more quarantine network slices (54), and recovering quarantined devices (12) after remediation of the compromise. Recovery operations include forcing re-registration of devices (12) being recovered, for migration back to their normal or regular network slice(s) (50).

Methods and Apparatuses for Managing Compromised Communication Devices in a Communication Network

A communication network (10) provides communicative coupling between potentially large populations of Internet-of-Things (IoT) devices (12) and/or other types of communication devices (12) and one or more Application Servers (ASs) (14) that are affiliated with respective ones of the communication devices (12). One or more network functions (30, 58) in the communication network (10) are operative to determine that any given one of the communication devices (12) is compromised, or that multiple such devices (12) are compromised, and provide for management of such devices (12) within the network (10) as “compromised” devices (12). Aspects of compromised-device management include forcing re-registration of such devices (12), for quarantining them in one or more quarantine network slices (54), and recovering quarantined devices (12) after remediation of the compromise. Recovery operations include forcing re-registration of devices (12) being recovered, for migration back to their normal or regular network slice(s) (50).

Secured Network Intellingence That Contacts Help
20220357737 · 2022-11-10 ·

An encrypted intelligence networking system that takes car to car communication/C-V2X to the next stage of vehicle safety by enhancing how auto owners report vehicles stolen, while affording law enforcement tools that allow disabling and faster detection of stolen vehicles. Secured Network Intelligence That Contacts Help (SNITCH) system, designed for installation on vehicles which require DMV registration, would rely on 4G LTE and or 5G networks to quickly transmit data through secured bluetooth features, enabling stolen vehicles to release stolen status info and other vehicle information (e.g. VIN, direction of travel, owner contact information, etc.) exclusively to law enforcement vehicles within the desired range for communication. Upon detection of a stolen vehicle, officers would have the option to activate Offender Apprehension Mode (OAM), a feature designed to disable accelerating components and prevent high-speed chases that often end with deadly crashes.