Legal listening method, system and server
A legal interception and server technology, applied in the field of communication, can solve problems such as undetectable, interception failure, and information protection that cannot be interacted with, and achieve the effect of ensuring safety and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] see image 3 , this embodiment provides a method for lawful interception, including:
[0055] Step 201: Encrypt the authentication request message with the shared key with the authentication, authorization and accounting server, send the authentication request message to the authentication, authorization and accounting server, and obtain the authentication anchor of the terminal and the shared secret with the authentication anchor. key.
[0056] Step 202: Encrypt the lawful interception proxy request message with the shared key with the authentication anchor, send the lawful interception proxy request message to the authentication anchor, and obtain the lawful interception proxy of the terminal.
[0057] Step 203: Obtain the shared key with the legal interception agent through the key management center, encrypt the legal interception request message with the shared key with the legal interception agent, send the legal interception request message to the legal intercept...
Embodiment 2
[0059] see Figure 4 , this embodiment provides a method for legal interception. First, distribute the shared key K for the AAA server and the LIS manually or through the key management center. AL , distribute the shared key K for the AAA server and the authentication anchor Anchor Auth AA , the specific steps of lawful interception are as follows:
[0060] Step 301: After the LIS receives the legal interception instruction from the LEA, it sends an authentication request message Authentication REQ to the AAA server, and the message carries the use K AL The encrypted MS_ID and the generated message authentication code request the AAA server to locate the authentication anchor through which the MS is authenticated.
[0061] Step 302: After the AAA server receives the authentication request message Authentication REQ of the LIS, according to the shared key K AL Verify the authenticity and integrity of the message sent by LIS. After the verification is passed, use K AL Decryp...
Embodiment 3
[0072] see Figure 5 , this embodiment provides a method for legal interception. First, distribute the shared key K for the AAA server and the LIS manually or through the key management center. AL , distribute the shared key K for the AAA server and the authentication anchor Anchor Auth AA , the specific steps of lawful interception are as follows:
[0073] Step 401: After the LIS receives the legal interception instruction from the LEA, it sends an authentication request message Authentication REQ to the AAA server, and the message carries the use K AL Encrypted MS_ID and message authentication code, request the AAA server to locate the authentication anchor through which the MS is authenticated.
[0074] Step 402: After the AAA server receives the authentication request message Authentication REQ of the LIS, according to the shared key K AL Verify the authenticity and integrity of the message sent by LIS. After the verification is passed, use K AL Decrypt the message to ob...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 