METHODS AND SYSTEMS FOR INTERCEPTING USER ACTIVITIES

    公开(公告)号:US20230388805A1

    公开(公告)日:2023-11-30

    申请号:US17752535

    申请日:2022-05-24

    CPC classification number: H04W12/80 H04L67/535 H04L67/53 H04W8/02

    Abstract: Methods and systems for reporting a provisioning transaction in a wireless communication network are disclosed. According to an implementation, a lawful interception management system (LIMS) of the wireless communication network may receive, from a law enforcement agency (LEA), a request to track activities of a subscriber of services provided through the communication network. The request may be submitted through a third-party server located in a public network. LIMS may transmit the request to a communication service provider (CSP). Upon receiving the request, CSP may forward the request to one or more servers via dedicated interfaces respectively assigned. The one or more servers may be configured to intercept the provisioning transactions that occurred on different radio access networks, e.g., 2G/3G, 4G/LTE, or 5G. Once the provisioning transaction is intercepted, LIMS may be immediately notified via the dedicated interfaces. Information related to the provisioning transactions is reported to LEA.

    L1 SECURITY SIGNALING
    6.
    发明公开

    公开(公告)号:US20240039928A1

    公开(公告)日:2024-02-01

    申请号:US17816530

    申请日:2022-08-01

    CPC classification number: H04L63/1416 H04L63/162 H04L63/1466 H04W12/80

    Abstract: A UE may detect, at the UE, a suspected fabricated transmission attack based on PHY security. The UE may transmit, to a network node, and the network node may receive, from the UE, an indication of the suspected fabricated transmission attack. The network node may receive, from the UE, an indication of one or more characteristics associated with a potential attacker associated with the suspected fabricated transmission attack. The UE may transmit, via a sidelink to at least one additional UE, a second indication of whether the UE identifies that the suspected fabricated transmission attack corresponds to the UE being attacked. The network node may identify a geographical location of the potential attacker based on a plurality of indications of the one or more characteristics associated with the potential attacker. The network node may compile an adversary pool including one or more compromised identities.

    Lawful interception in mobile connect

    公开(公告)号:US11832108B2

    公开(公告)日:2023-11-28

    申请号:US17442652

    申请日:2019-03-25

    CPC classification number: H04W12/80

    Abstract: A lawful interception, LI, intercept access point, IAP, function (135) in a mobile connect, MC, identity gateway, ID GW, function (107) receives, from a LI administrative function, ADMF (108), a request for activation of LI for a target identity, A, during a specified LI time interval. A detection is made, during the LI time interval, that the ID GW function (107) has at least started an authentication and authorization procedure for a service that the target identity, A, has requested and as a consequence of the detection obtaining, from the ID GW function (107), personal data pertaining to the target identity, A, and providing the obtained personal data pertaining to the target identity, A, to a LI mediation and delivery 10 function MF/DF (132), for example via an X2 interface.

    INTERCEPTION AWARE ACCESS NODE SELECTION
    8.
    发明公开

    公开(公告)号:US20230308999A1

    公开(公告)日:2023-09-28

    申请号:US18195104

    申请日:2023-05-09

    Inventor: Jennifer LIU

    Abstract: In some example embodiments, there may be provided an apparatus including at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least: obtain information to enable selection of an access node for a non-GPP access; query a server to determine whether the country at which the access node is located requires lawful interception of communications; and select, based at least on the obtained information and/or a response to the query, the access node for the non-3GPP access. Related systems, methods, and articles of manufacture are also described.

Patent Agency Ranking