Supercharge Your Innovation With Domain-Expert AI Agents!

Lawful interception security

A lawful interception and randomness technology, applied in the security field, which can solve the problems of high national security risk and service suspension of cloud service providers

Pending Publication Date: 2019-09-17
TELEFON AB LM ERICSSON (PUBL)
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, allowing LI functionality to be activated in such an insecure context could expose cloud service providers to high national security risks as well as legal issues of entire service cessation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lawful interception security
  • Lawful interception security
  • Lawful interception security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] first go to Figure 1a and Figure 1b, an embodiment of the present disclosure includes a first LI function 110 and a second LI function 101 that operate together to implement LI, as will be described in detail below. LI, as known to those skilled in the art, is a process in which a communication network operator shall provide access to intercepted communication content (CC) and interception-related information of mobile targets and target-related services on behalf of law enforcement agencies (LEA) (IRI) (for example, call forwarding). The LEA provides the network operator with interception requests (eg legal authorization or guarantee).

[0035] refer to Figure 1b In the interconnection network schematically exemplified in , a first communication entity A 151 and a second communication entity B 151 communicate via a radio access network (RAN) 150 connected to a core network 160 . RAN 150 and core network 160 may be operated by a communication network operator that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A first lawful interception (LI) function (110) transmits, to a second LI function (101) in a virtualized network function, VNF (103), a request for random number generator, RNG, data, characterizing a random number generator (105) in the second LI function (101). The RNG data is tested, resulting in a randomness test result that is indicative of randomness of numbers generated by the RNG (105) in the second LI function (101). If the randomness is below a first threshold, mitigation takes place of any undesired effect associated with the randomness being less than the threshold value. A corresponding method is performed by the second LI function (101), receiving the request for RNG data, obtaining and transmitting the RNG data to the first LI function (110). Verification can thereby be made whether a LI function in a VNF has a proper level of entropy source for use by its cryptographic operations and, if not, perform mitigation.

Description

technical field [0001] Embodiments herein relate to security in Lawful Intercept (LI) functions deployed as virtualized network functions. Background technique [0002] The robustness of a cryptographic operation depends largely on the randomness of the encryption keys it uses. In a typical computing system utilizing cryptography, the randomness of key generation depends on the availability of entropy sources and pseudorandom number generation tools. Sources of entropy are typically in the form of physical events generated by the hosted computing system environment, such as mouse movements and keyboard presses caused by human users. They are used as input seeds for Random Number Generators (RNG) or Pseudo-Random Number Generators (PRNG). A RNG or PRNG typically generates a sequence of random numbers that can be used as a seed by an encryption algorithm for deriving an encryption key. [0003] Hardware-based RNGs embedded in central processing units (CPUs) are now availabl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04L29/06H04L29/08H04L9/06H04L9/08
CPCH04L67/125H04L9/0662H04L63/306H04L2209/26H04W12/80H04W12/03
Inventor A·莫达西G·阿马托
Owner TELEFON AB LM ERICSSON (PUBL)
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More