Unlock instant, AI-driven research and patent intelligence for your innovation.

Lawful interception in mobile connect

A lawful interception, mobile station technology, applied in the field of lawful interception in mobile connections, to solve problems such as data not being immediately available

Pending Publication Date: 2021-11-09
TELEFON AB LM ERICSSON (PUBL)
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Often such data is not readily available and requires manual investigation in proprietary and disparate databases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lawful interception in mobile connect
  • Lawful interception in mobile connect
  • Lawful interception in mobile connect

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Figure 1a A first functional representation of a communication system 100 is schematically illustrated, comprising a core network 105 and an access network 103 in which a communication entity 101 is connected. The access network may eg be in the form of a 3rd Generation Partnership Project (3GPP) Radio Access Network (RAN) or any other type of non-3GPP communication network that may be connected to the core network 105 .

[0023] Those skilled in the art will appreciate that the communication performed by the entity 101 is carried out by several functional units in both the access network 103 and the core network 105 . For the sake of clarity of description, these functional units are not shown in full, but only schematically and are represented and exemplified by a set of core network functions 115, which in a 4G environment may include mobile Management Entity (MME), Serving Gateway (S-GW), Packet Data Network Gateway (P-GW), etc. In a 5G environment, the core netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A lawful interception, LI, intercept access point, IAP, function (135) in a mobile connect, MC, identity gateway, ID GW, function (107) receives, from a LI administrative function, ADMF (108), a request for activation of LI for a target identity, A, during a specified LI time interval. A detection is made, during the LI time interval, that the ID GW function (107) has at least started an authentication and authorization procedure for a service that the target identity, A, has requested and as a consequence of the detection obtaining, from the ID GW function (107), personal data pertaining to the target identity, A, and providing the obtained personal data pertaining to the target identity, A, to a LI mediation and delivery 10 function MF / DF (132), for example via an X2 interface.

Description

technical field [0001] Embodiments herein relate to methods of dealing with Lawful Interception (LI) in the context of Mobile Connectivity (MC) in a communication system, a corresponding computer system, and computer programs and carriers of such computer programs. Background technique [0002] Mobile Connect (MC) is a secure universal login technology specified by the Global System for Mobile Communications Association (GSMA). Simply by matching users with their mobile phones, the Mobile Connect feature allows subscribers to quickly log in to service provider websites and applications without having to remember passwords and usernames. The MC function provides a safe and secure login, and does not share any personal information without the user's permission. [0003] More specifically, the MC function is used when the service provider shares attributes (e.g., the user's own address, date of birth, etc.) from the mobile network operator (MNO) with which the user is associat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/08H04W12/60
CPCH04L63/306H04L63/308H04W12/80
Inventor L·菲奥里洛O·加洛
Owner TELEFON AB LM ERICSSON (PUBL)