摘要:
A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication.
摘要:
A method for providing Law Enforcement Agencies in a telecommunications network with interception and/or retention data related to a target mobile node in a Proxy Mobile Internet Protocol domain connected to the telecommunications network through a Mobile Access Gateway, comprises the steps of configuring at least one of said Mobile Access Gateway and a Local Mobility Anchor to operate as Intercepting Control Elements or Data Retention sources.
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. A first parameter value in traffic for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic will be intercepted or retained at a second node crossed by the traffic is evaluated. If the second node will intercept or retain the traffic, the first node foregoes a lawful interception request or retention of intercepted data.
摘要:
The invention relates to a radio network controller (RNC) for receiving a LOCATION— REPORTING— CONTROL message and analyzing a value of a request type information element received in the LOCATION— REPORTING— CONTROL message. The RNC directly determines requested location information for a user equipment (UE) if the request information element indicates sending location information as a direct response to the LOCATION— REPORTING— CONTROL message or the RNC determines the requested location information if the UE changes the service area if the request information element indicates sending location information at a change of service area by the UE. The RNC then sends a LOCATION— REPORT message comprising the location information and the request type information element to at least one control node.
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. A first parameter value in traffic for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic will be intercepted or retained at a second node crossed by the traffic is evaluated. If the second node will intercept or retain the traffic, the first node foregoes a lawful interception request or retention of intercepted data.
摘要:
The invention relates to a radio network controller (RNC) for receiving a LOCATION_REPORTING_CONTROL message and analyzing a value of a request type information element received in the LOCATION_REPORTING_CONTROL message. The RNC directly determines requested location information for a user equipment (UE) if the request information element indicates sending location information as a direct response to the LOCATION_REPORTING_CONTROL message or the RNC determines the requested location information if the UE changes the service area if the request information element indicates sending location information at a change of service area by the UE. The RNC then sends a LOCATION_REPORT message comprising the location information and the request type information element to at least one control node.