Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020071971 - SECURE LAWFUL INTERCEPTION IN NETWORK ELEMENTS

Publication Number WO/2020/071971
Publication Date 09.04.2020
International Application No. PCT/SE2018/051015
International Filing Date 04.10.2018
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
H04L 29/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
08Transmission control procedure, e.g. data link level control procedure
H04W 4/50 2018.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
4Services specially adapted for wireless communication networks; Facilities therefor
50Service provisioning or reconfiguring
CPC
H04L 63/306
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
30for supporting lawful interception, monitoring or retaining of communications or communication related information
306intercepting packet switched data communications, e.g. Web, Internet or IMS communications
H04L 67/34
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
67Network-specific arrangements or communication protocols supporting networked applications
34involving the movement of software or configuration parameters
H04W 12/007
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
007Lawful interception
H04W 4/50
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
4Services specially adapted for wireless communication networks; Facilities therefor
50Service provisioning or reconfiguring
Applicants
  • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) [SE]/[SE]
Inventors
  • CAROTENUTO, Claudio
  • BARESE, Elio
  • D'AMORA, Paolo
  • MARFIA, Francesca
  • PAPARO, Vincenzo
Agents
  • BRANN AB
Priority Data
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SECURE LAWFUL INTERCEPTION IN NETWORK ELEMENTS
(FR) INTERCEPTION LÉGALE SÉCURISÉE DANS DES ÉLÉMENTS DE RÉSEAU
Abstract
(EN)
A mechanism is provided that enables hiding identities of a target subscriber that is to be subject of lawful interception, LI, when the intercept access point, IAP, is outside the network operator part of the LI domain. Monitoring of data traffic such as over-the-top, OTT, services is enabled while at the same time hiding LI target identities to a network element, NE, containing the IAP. A secure memory area in the NE is dedicated to the LI functionality necessary to intercept and report interception data to the operator part of the LI domain. The interface between the NE and the operator part of the LI domain is the use of a secure injection channel via which the necessary LI software and target information are conveyed between the NE and the operator part of the LI domain.
(FR)
La présente invention concerne un mécanisme qui permet de cacher des entités d’un abonné cible qui doit être sujet d’une interception légale, LI, lorsque le point d’accès d’interception, IAP, est en dehors de la partie opérateur de réseau du domaine de LI. La surveillance du trafic de données, comme des services par contournement, OTT, est activée tout en cachant en même temps des identités cibles de LI à un élément de réseau, NE, contenant l'AP d’interception. Une zone de mémoire sécurisée dans le NE est dédiée à la fonctionnalité de LI nécessaire pour intercepter des données d’interception et les signaler à la partie opérateur du domaine de LI. L’interface entre le NE et la partie opérateur du domaine de LI est l’utilisation d’un canal d’injection sécurisé par lequel le logiciel de LI nécessaire et des informations cibles sont transportés entre le NE et la partie opérateur du domaine de LI.
Latest bibliographic data on file with the International Bureau