摘要:
A method for providing Law Enforcement Agencies in a telecommunications network with interception and/or retention data related to a target mobile node in a Proxy Mobile Internet Protocol domain connected to the telecommunications network through a Mobile Access Gateway, comprises the steps of configuring at least one of said Mobile Access Gateway and a Local Mobility Anchor to operate as Intercepting Control Elements or Data Retention sources.
摘要:
A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication.
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. At least a first parameter value in data for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic is intercepted or retained at a second node crossed by the traffic in the same network is evaluated. If the second node is located downstream of the first node, lawful interception requests or intercepted data are filtered out.
摘要:
The invention relates to a method for distinguishing between LOCATION_REPORT messages to avoid ambiguities. Therefore, a value of an information element of request type is returned by a radio network controller, depending on an intended receiver of the location information. A control node receiving the information element value analyses said value and determines the receiver depending on the result of said analysis.
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. At least a first parameter value in data for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic is intercepted or retained at a second node crossed by the traffic in the same network is evaluated. If the second node is located downstream of the first node, lawful interception requests or intercepted data are filtered out.
摘要:
The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises the following steps: —Receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request (1) to monitor a system member MS, SIM. —Receiving to the Access Point from the Configuration Unit, a request (2) to override deprived access rights for the system member MS, SIM. —Overriding in the Accept Point IAP; MSC, SGSN, the deprived access rights for the member.
摘要:
The invention relates to a method for distinguishing between LOCATION_REPORT messages to avoid ambiguities. Therefore, a value of an information element of request type is returned by a radio network controller, depending on an intended receiver of the location information. A control node receiving the information element value analyses said value and determines the receiver depending on the result of said analysis.
摘要:
The invention relates to a method for distinguishing between LOCATION REPORT messages to avoid ambiguities. Therefore, a value of an information element of request type is returned by a radio network controller, depending on an intended receiver of the location information. A control node receiving the information element value analyses said value and determines the receiver depending on the result of said analysis.
摘要:
The present invention relates to methods and arrangements in a telecommunication system to generate Interception Related Information IRI related to positioning activities involving a mobile subscriber/equipment MSA The system provides information to an Intercept configuration unit ICU, collected from an Intercept Access Point IAP; MSC, GMLC that is associated to the monitored subscriber/equipment. The method comprises the following steps: receiving to the Intercept Access Point IAP; MSC, GMLC from the Intercept configuration unit ICU, a request to monitor the mobile subscriber/equipment MSA. Registration in the Intercept Access Point IAP; MSC, GMLC, of a positioning activity involving the monitored subscriber/equipment. Delivering information related to the positioning activity, from the Intercept Access Point IAP; MSC, GMLC to the Law Enforcement Agency LEA.
摘要:
The present invention relates to methods and arrangements in a mobile telecommunication system to generate interception related information IRI, including geographical location of a monitored mobile subscriber/equipment. The system is configured to provide to an Intercept configuration unit ICU, information collected from an Intercept Access Point IAP; MSC. The system is also configured to proceed with a Network Induced Location Request NI-LR procedure, which method comprises the following steps: —Receiving to the Intercept Access Point from the Intercept configuration unit, a request to monitor the mobile subscriber/equipment, —Detecting in the Intercept Access Point of a specified Interception Related Information activity IRI involving the monitored subscriber/equipment, —The Intercept Access Point IAP; MSC initiates start of the Network Induced Location Request NI-LR procedure.