Patent application number | Description | Published |
20080198993 | Lawful Interception Method and Architecture for Transparent Transmission of Interception Information - Method for providing intercepted Content of Communications CC information from Intercepting Control Element ICE to at least one Law Enforcement Monitoring Facility LEMF through Delivery Functions in a telecommunications network, comprising the steps of: splitting the intercepted CC information into CC control information and CC payload information; at a Lawful Interception Content of Communications Control Point LI CC CP, receiving the CC control information and processing the CC control information; at an LI CC Gateway, receiving the CC payload information from the ICE over a payload interface X3, said LI CC Gateway being controlled by said LI CC CP according to said CC control information; and at said LI CC Gateway, switching the CC payload information to said at least one LEMF over a payload Handover Interface 3 HI3. | 08-21-2008 |
20080216158 | Lawful Interception of Unauthorized Subscribers and Equipments - The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises the following steps: —Receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request ( | 09-04-2008 |
20080280609 | Provisioning of User Information - The present invention relates to method and arrangements to provide information related to user devices in a telecommunication system (TS). The system comprises at least one network domain (HPLMN, WCDMA) that is associated with a central database (DCR). The method comprises identification in the central database (DCR) of a first request (REQ | 11-13-2008 |
20090006414 | Interception of Databases - The present invention relates to problems how to generate information related to access and use of a directory object in a database. The problems are solved by methods and arrangements in a communication system to generate information related to use of the monitored directory object in a database. The system provides the information to an Intercept Configuration Unit ICU. The information is collected from the IAP, which is associated to the monitored directory object in the HSS. The method comprises the following step: —receiving to the Interception Access Point IAP a request to monitor the directory object in the database, —detection of use of the monitored directory object in the IAP, —delivering information related to said use, from the IAP to the Intercept Configuration Unit ICU. | 01-01-2009 |
20090207751 | SERVICE BASED LAWFUL INTERCEPTION - The present invention relates to methods and arrangements in a telecommunication system to monitor information related to specified services in a service unaware node. The node handles Content of Communication associated with services. The system comprises a Delivery Function to which Content of Communication related to a target is received from the node. The method comprises the following steps: Receiving from a requesting entity to the Delivery Function a request to delimit the received Content of Communication according to not desired services. Parsing the received Content of Communication according to not desired services by a Packet Inspection Feature associated with the Delivery Function. Forwarding Control Information related to the not desired services to the requesting entity. | 08-20-2009 |
20100039946 | Interception Of Multimedia Services - The present invention relates to a method for monitoring in a telecommunication system. The system comprises a service domain that handles session control and a bearer domain used for transportation of media flow. A request for monitoring of a first party (A) is received by a Call Session Control Function (CSCF) in the service domain. The method comprises the following further steps: —A SIP session event is detected by the Call | 02-18-2010 |
20100142389 | METHOD, ARRANGEMENT, NODE AND ARTICLE FOR ENHANCING DELIVERY CAPACITY IN A TELECOMMUNICATIONS NETWORK BY TRANSCODING TRAFFIC INTO REQUESTED QUALITY OF SERVICE (QOS) - Methods and apparatuses to enhance delivery capacity for traffic in a communication network are disclosed. Traffic is received to a Delivery Function with originally coded Quality of Services (QoS). A specification of requested QoS is received to the Delivery Function. The originally coded QoS is established to be higher than the requested QoS. The received traffic is transcoded into requested QoS. Optionally, the traffic is buffered with originally coded QoS and at request, the buffered traffic is retrieved. | 06-10-2010 |
20100211800 | SYSTEMS AND METHODS FOR PARTIAL MATCHING SEARCHES OF ENCRYPTED RETAINED DATA - Systems and methods are provided for encryption allowing partial matching searches to retrieve data that is retained in a database. A user identification number or other characteristic is stored in unencrypted form such that a wildcard search may be performed to retrieve one or more encrypted indexes associated with the unencrypted user identification. These encrypted indexes are then unencrypted by use of a key to determined their associated unencrypted index and corresponding targeted retained data. The targeted retained data may then be accessed by an authorized entity such as a law enforcement agency. | 08-19-2010 |
20100291906 | SYSTEMS AND METHODS FOR LOCATION RELATED DATA INTERCEPTION - Systems and methods for legal interception of a transmission through a land based network to or from a mobile station based at least in part on the satisfaction of spatial criteria whereby a geographic area is identified and the location of one or more mobile stations is determined. Transmissions to or from one or more mobile stations may be intercepted based on the mobile stations being located within the geographic area, the distance between multiple mobile stations being less than a predetermined distance, or the distance between one or more mobile stations and a reference object being less than a predetermined distance. Intercepted transmissions as well as any associated data may be forwarded to one or more authorized entities, such as law enforcement agencies. | 11-18-2010 |
20110026686 | USE OF UNIQUE REFERENCES TO FACILITATE CORRELATION OF DATA RETENTION OR LAWFUL INTERCEPTION RECORDS - The invention relates to a method of providing call- or service-related information to a Lawful Interception (LI) system or to a Data Retention (DR) system in a telecommunications network. In the method, a node is provided, which is in communication with an interception requesting element of the LI/DR system. At the node, a record relating to a communication involving a target user is generated and finally sent to the interception requesting element. Before sending the record, at the node it is checked whether a unique reference univocally identifying the communication involving the target user is already available to the node and, if not, such unique reference is generated by the node. Finally, the unique reference is included in the record, which can then be sent to the interception requesting element. | 02-03-2011 |
20110029667 | Data Retention and Lawful Intercept for IP Services - The method provides a Law Enforcement Agency LEA with retention or interception data related to a target user. At a data retention source node or at an interception control element of a telecommunications network, traffic packets involving the target user are inspected and a plurality of usage data records based on the inspected traffic packets are generated. Each record comprises information relating to a certain service class and to a respective communications stack layer. For each communications session involving a plurality of different communications stack layers, at the data retention source node or, respectively, the interception control element, the plurality of usage data records are provided with a same correlation identity number for correlating the data at the different communications stack layers. Then, the usage data records comprising the correlation identity number to the LEA are sent, for instance to the LI system or the data Retention System, respectively. | 02-03-2011 |
20110035476 | Provision of Telematics Services via a Mobile Network - The invention relates to the use of mobile networks ( | 02-10-2011 |
20110111756 | LI/DR Service Continuity in Case of Number Portability - The present invention relates to methods and arrangements to perform monitoring-continuity in case of number portability in a telecommunication The method comprises a step wherein a monitored user (B) requires number portability from an operator of a donor network (DNW) to an operator of a recipient network (RNW). The method further comprises the receiving of a number portability event—temporary address (NPE | 05-12-2011 |
20110191467 | Lawful Interception of NAT/PAT - The present invention relates to methods and arrangements for monitoring translation activities in an intermediate node NAT/PAT between a local network and a public network in a communication system. The intermediate node NAT/PAT rewrites addresses related to traffic sent between the networks. The method comprises steps of configuring the intermediate node NAT/PAT to operate as Intercepting Control Element ICE or Data Retention source, and steps of requesting translation information, and reporting translation information to a requesting authority. | 08-04-2011 |
20110202980 | Lawful Authorities Warrant Management - A method is proposed for managing requests from Law Enforcement Agencies for interception or retention of data relating to a target user. The method detects a request of interception or retention on the target user and verifies whether an electronic warrant is activated with respect to the user. | 08-18-2011 |
20120016988 | SUPERVISION OF LI AND DR QUERY ACTIVITIES - The present invention relates to a method for supervising log activities in a Communication Service Provider's domain (CSP) comprising a monitoring system (DR, LI) and a Log System. The method comprises steps of sending a request for log activities and receiving a result via standard defined interfaces (HIXA, HIXB, HIA, HIB; HIX | 01-19-2012 |