Unlock instant, AI-driven research and patent intelligence for your innovation.

Network monitoring method, system and device for controlling and monitoring system

A technology of network monitoring and monitoring system, applied in the field of data grouping

Active Publication Date: 2016-12-07
NETSCOUT SYST TEXAS LLC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Surveillance equipment must have the correct key to decrypt the PDU

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network monitoring method, system and device for controlling and monitoring system
  • Network monitoring method, system and device for controlling and monitoring system
  • Network monitoring method, system and device for controlling and monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will now be described more fully hereinafter with reference to the accompanying drawings. However, this invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Various embodiments of the invention will be able to be utilized by those skilled in the art.

[0014] figure 1 is a block diagram illustrating an LTE (Long Term Evolution) / SAE (System Architecture Evolution) network architecture. The LTE / SAE network technology represents the evolution of mobile networks for providing high-rate IP-based services. The standardization body responsible for specifying mobile standards known as the 3rd Generation Partnership Project (3GPP) has defined standards for mobile telecommunication systems, including radio access a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to LTE network call association during user equipment movement. A network monitoring system uses passive probes to capture data packets from an LTE / SAE network interface. The monitoring system identifies contextual data associated with the first user on the S1-MME interface. Next-hop parameters, such as a next-hop key and / or a next-hop chain counter, are derived for the first user equipment. The monitoring system creates a first context entry for the first user consisting of next hop parameters. The monitoring system also identifies second context data associated with the second user on the second S1-MME interface. Next-hop parameters are also identified for the second context data. The second context next hop parameter is compared with the first context next hop parameter. If they match, the user can be tracked even while moving, binding its activity on both legs and retrieving security parameters to be used for decryption.

Description

technical field [0001] Embodiments relate generally to monitoring data packets on an LTE network, and more particularly to deciphering captured data packets during user equipment handover. Background technique [0002] In a Long Term Evolution (LTE) network, User Equipment (UE) communicates with an Enhanced Node B (eNodeB) network entity. The eNodeB is controlled by a Mobility Management Entity (MME). When a UE attaches to an LTE network, the UE and associated MME go through an Authentication and Key Agreement (AKA) procedure, which authenticates the UE and the network to each other. The AKA process also generates keys (keys) for encrypting traffic between the UE and the network. When the AKA procedure is complete, most message traffic exchanged between the UE and the network is encrypted before transmission. Encrypted transactions cannot be read unless the receiver has the key that the sender used to encrypt the message. [0003] A further problem arises when UE handove...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W24/00
CPCH04L43/18H04W24/08H04W36/0011H04W92/12H04W12/033H04W12/041H04W8/00
Inventor A.博瓦V.贾纳基拉曼
Owner NETSCOUT SYST TEXAS LLC