Unlock instant, AI-driven research and patent intelligence for your innovation.

Legal listening method, system and server

A legal interception and server technology, applied in the field of communication, can solve problems such as undetectable, interception failure, and information protection that cannot be interacted with, and achieve the effect of ensuring safety and reliability

Inactive Publication Date: 2009-03-18
HUAWEI TECH CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] In the process of realizing the present invention, the inventors found that: for larger-scale systems, there is almost no direct cryptographic correlation between Anchor Auth and LIS, and between LIA and LIS, and cryptographic methods cannot be used to protect the interactive information. However, if the legal interception agent request message LIA REQ in step 103 of the above method and the legal interception request message LI Request in step 105 are transmitted in plain text on the public network, the monitoring behavior of LEA may be leaked, which does not meet the requirements of legal interception. Requirements such as confidentiality, transparency, and imperceptibility will cause monitoring failures, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Legal listening method, system and server
  • Legal listening method, system and server
  • Legal listening method, system and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] see image 3 , this embodiment provides a method for lawful interception, including:

[0055] Step 201: Encrypt the authentication request message with the shared key with the authentication, authorization and accounting server, send the authentication request message to the authentication, authorization and accounting server, and obtain the authentication anchor of the terminal and the shared secret with the authentication anchor. key.

[0056] Step 202: Encrypt the lawful interception proxy request message with the shared key with the authentication anchor, send the lawful interception proxy request message to the authentication anchor, and obtain the lawful interception proxy of the terminal.

[0057] Step 203: Obtain the shared key with the legal interception agent through the key management center, encrypt the legal interception request message with the shared key with the legal interception agent, send the legal interception request message to the legal intercept...

Embodiment 2

[0059] see Figure 4 , this embodiment provides a method for legal interception. First, distribute the shared key K for the AAA server and the LIS manually or through the key management center. AL , distribute the shared key K for the AAA server and the authentication anchor Anchor Auth AA , the specific steps of lawful interception are as follows:

[0060] Step 301: After the LIS receives the legal interception instruction from the LEA, it sends an authentication request message Authentication REQ to the AAA server, and the message carries the use K AL The encrypted MS_ID and the generated message authentication code request the AAA server to locate the authentication anchor through which the MS is authenticated.

[0061] Step 302: After the AAA server receives the authentication request message Authentication REQ of the LIS, according to the shared key K AL Verify the authenticity and integrity of the message sent by LIS. After the verification is passed, use K AL Decryp...

Embodiment 3

[0072] see Figure 5 , this embodiment provides a method for legal interception. First, distribute the shared key K for the AAA server and the LIS manually or through the key management center. AL , distribute the shared key K for the AAA server and the authentication anchor Anchor Auth AA , the specific steps of lawful interception are as follows:

[0073] Step 401: After the LIS receives the legal interception instruction from the LEA, it sends an authentication request message Authentication REQ to the AAA server, and the message carries the use K AL Encrypted MS_ID and message authentication code, request the AAA server to locate the authentication anchor through which the MS is authenticated.

[0074] Step 402: After the AAA server receives the authentication request message Authentication REQ of the LIS, according to the shared key K AL Verify the authenticity and integrity of the message sent by LIS. After the verification is passed, use K AL Decrypt the message to ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a legal monitoring method, a system and a server, which belong to the communication field, the method comprises the following steps: sending authentication request information to AAA servers through enciphering authentication request information of a sharing key between the AAA servers, and then obtaining the sharing key between authentication anchor points of a terminal, sending legal monitoring agent request information through the enciphering legal monitoring agent request information of the sharing key between the authentication anchor points, and then obtaining legal monitoring agents of the terminal, and obtaining the sharing key between the legal monitoring agents, sending the legal monitoring request information through the enciphering legal monitoring agent request information of the sharing key between the legal monitoring agents, and then obtaining conversation information of the terminal. The system comprises a legal monitoring server, an authorization server, a licensing server and an accounting server, the authentication anchor points and the legal monitoring agents. The method enables the legal monitoring to be not aware through enciphering the information which contains the information of monitoring objects, and guarantees the safety and the reliability of monitoring.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method, system and server for lawful interception. Background technique [0002] WiMAX (World Interoperability for Microwave Access, Worldwide Interoperability for Microwave Access) is a broadband wireless access metropolitan area network technology. Interoperable means of broadband wireless access. WiMAX adopts wireless mode instead of wired mode to realize the broadband access technology of "last mile" access, integrates the mobility and flexibility of WiFi (Wireless Fidelity, wireless fidelity) access technology, and xDSL (xDigital Subscriber Line, various It has the advantages of long transmission distance, high access speed, large system capacity, and the ability to provide a wide range of multimedia communication services. [0003] The WiMAX air interface specially adds a privacy sub-layer on the MAC (Media Access Control) layer, which can not only avoid illegal us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L9/00H04L29/06H04L12/28
Inventor 李春强王云贵
Owner HUAWEI TECH CO LTD