摘要:
The present invention relates to methods and arrangements to establish an identity of a target T. The method comprises the following steps:—Collecting geographical location points A, B, C, D indicating presence of the target.—Interrogating at least one mobile network to fetch lists of identities of users located in defined areas C1-C3, each area covering a collected geographical location point.—Crosschecking between the fetched lists.—Identifying a single identity that is common to the fetched lists.
摘要:
The present invention relates to methods and arrangements to establish an identity of a target T. The method comprises the following steps:—Collecting geographical location points A, B, C, D indicating presence of the target.—Interrogating at least one mobile network to fetch lists of identities of users located in defined areas C1-C3, each area covering a collected geographical location point.—Crosschecking between the fetched lists.—Identifying a single identity that is common to the fetched lists.
摘要:
A method for detecting the presence of fraudulent Subscriber Identity Modules in a network for cellular communications comprising the steps of: at a first Service Node, receiving a registration request by a first User Equipment comprising a Subscriber Identity Module for defining an identity of a subscriber; initiating a checking to establish whether the subscriber is already registered with the same identity in at least one Service Node over the network, including the first Service Node; if the subscriber results to be already registered with the same identity in at least a second Service Node over the network, retrieving status information on at least a second User Equipment associated with the already registered subscription for checking whether the second User Equipment is not the first User Equipment; and disabling any subscription of the subscriber associated with the identity if the second User Equipment results not to be the first User Equipment.
摘要:
The present invention relates to methods and arrangements in a telecommunication system to generate Interception Related Information IRI related to positioning activities involving a mobile subscriber/equipment MSA. The system provides information to an Intercept configuration unit ICU, collected from an Intercept Access Point IAP; MSC, GMLC that is associated to the monitored subscriber/equipment. The method comprises the following steps: receiving to the Intercept Access Point IAP; MSC, GMLC from the Intercept configuration unit ICU, a request to monitor the mobile subscriber/equipment MSA. Registration in the Intercept Access Point IAP; MSC, GMLC, of a positioning activity involving the monitored subscriber/equipment. Delivering information related to the positioning activity, from the Intercept Access Point IAP; MSC, GMLC to the Law Enforcement Agency LEA.
摘要:
The present invention relates to methods and arrangements to intercept Short Message Services (SMS) in a telecommunication system (TS). The telecommunication system comprises a telecommunication Network (PLMN-A) that comprises a Short Message Service Centre (SMSC; ICE, IAP) responsible for relaying Short Messages (SMs) to/from all subscribers belonging to the telecommunication network. The method comprises the following steps: Receiving in the Short Message Service Centre (SMSC), a request to monitor Short Messages (SMs) related to a subscriber (A, Al, B, C, D, E, F) in the telecommunication system (TS). Registering in the Short Message Service Centre (SMSC) a Short Message (SM) related to the monitored subscriber (A, Al, B, C, D, E, F). Delivering from the Short Message Service Centre (SMSC), information related to the registered Short Message.
摘要:
A method for detecting the presence of fraudulent Subscriber Identity Modules in a network for cellular communications comprising the steps of: at a first Service Node, receiving a registration request by a first User Equipment comprising a Subscriber Identity Module for defining an identity of a subscriber; initiating a checking to establish whether the subscriber is already registered with the same identity in at least one Service Node over the network, including the first Service Node; if the subscriber results to be already registered with the same identity in at least a second Service Node over the network, retrieving status information on at least a second User Equipment associated with the already registered subscription for checking whether the second User Equipment is not the first User Equipment; and disabling any subscription of the subscriber associated with the identity if the second User Equipment results not to be the first User Equipment.
摘要:
The present invention relates to methods and arrangements for monitoring translation activities in an intermediate node NAT/PAT between a local network and a public network in a communication system. The intermediate node NAT/PAT rewrites addresses related to traffic sent between the networks. The method comprises steps of configuring the intermediate node NAT/PAT to operate as Intercepting Control Element ICE or Data Retention source, and steps of requesting translation information, and reporting translation information to a requesting authority.
摘要:
The present invention relates to methods and arrangements in a telecommunication system to generate Interception Related Information IRI related to positioning activities involving a mobile subscriber/equipment MSA The system provides information to an Intercept configuration unit ICU, collected from an Intercept Access Point IAP; MSC, GMLC that is associated to the monitored subscriber/equipment. The method comprises the following steps: receiving to the Intercept Access Point IAP; MSC, GMLC from the Intercept configuration unit ICU, a request to monitor the mobile subscriber/equipment MSA. Registration in the Intercept Access Point IAP; MSC, GMLC, of a positioning activity involving the monitored subscriber/equipment. Delivering information related to the positioning activity, from the Intercept Access Point IAP; MSC, GMLC to the Law Enforcement Agency LEA.
摘要:
Systems and methods for legal interception of the transmission of personalized ring back tones as they are sent from a network such as a mobile telephone network associated with a subscriber to a caller in response to a call placed by the caller to the subscriber to allow monitoring of personalized ring back tones and/or their associated call content data. The personalized ring back tone is intercepted at an intercept access point on the network, where the systems and methods of the invention then transmit the intercepted personalized ring back tone to an authorized person or entity, such as a law enforcement agency.
摘要:
Systems and methods for legal interception of the transmission of personalized ring back tones as they are sent from a network such as a mobile telephone network associated with a subscriber to a caller in response to a call placed by the caller to the subscriber to allow monitoring of personalized ring back tones and/or their associated call content data. The personalized ring back tone is intercepted at an intercept access point on the network, where the systems and methods of the invention then transmit the intercepted personalized ring back tone to an authorized person or entity, such as a law enforcement agency.