Technique for generating correlation number for use in lawful interception of telecommunications traffic

A telecommunication service and legitimate technology, applied in the direction of telephone communication, wireless communication, electrical components, etc., can solve problems such as consumption and achieve the effect of overall performance improvement

Inactive Publication Date: 2005-02-23
NOKIA TECHNOLOGLES OY
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This means that each IRI or CC packet sent to the LEA (Law Enforcement Agency) will consume 8 or 20 bytes
Another issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Technique for generating correlation number for use in lawful interception of telecommunications traffic
  • Technique for generating correlation number for use in lawful interception of telecommunications traffic
  • Technique for generating correlation number for use in lawful interception of telecommunications traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Before beginning the detailed description of the invention, it is appropriate to make the following remarks. Where appropriate, the same numerals and symbols may be used to designate equivalent, corresponding or like parts in different drawings. In addition, in the following detailed description, an example size / model / value / range may be given, but the present invention is not limited thereto. Furthermore, arrangements are shown in block diagram form to avoid obscuring the invention, and given that details regarding the implementation of the block diagram arrangements are largely dependent on the platform within which the invention is implemented, in other words they should within the knowledge of those skilled in the art. Where specific details have been set forth for the purpose of describing exemplary embodiments of the invention, it will be apparent to those skilled in the art that the invention may be practiced without or with changes to the specific details. In c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A technique for generating a correlation number for use in lawful interception of telecommunications traffic includes handling one of either a 'PDP (Packet Data Protocol) context activation' or 'Start of intercept(ion) with PDP context active' event and generating a unique PDP-ID (PDP Context Identifier) in response thereto. An MCC (Mobile Country Code) and an MNC (Mobile Network Code) of a network operator is identified, as is a DF (Delivery Function)-ID of a DF. The MCC and MNC are combined to generate an Operator-ID. The generated POP-IO and the generated Operator-ID and the DF-ID are combined to generate the correlation number.

Description

technical field [0001] The present invention relates to telecommunication security and in particular to a technique for generating relative numbers for telecommunication services, in particular GSM GPRS (General Packet Radio Service) / UMTS (Universal Mobile Telecommunications System) PS (Packet Switched) Domain LI (Lawful Interception) Lawful interception of data. Background technique [0002] Lawful interception of communications between criminals and their associates, as well as between terrorists, has been used by LEAs (Law Enforcement Agencies) around the world to foil their criminal activities. In the past, the telephone of the entity targeted for legal line interception was only available when telephone landline services were available, subject to the laws of the country in which said line interception occurred. Now, as technology advances and criminals and terrorists become more sophisticated, techniques must be developed for the lawful interception of more advanced t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04M3/22H04W8/26H04W12/02H04W76/00
CPCH04L63/30H04L63/306H04W12/02H04L63/304H04W76/021H04L63/00H04M3/2281H04W8/26H04M2207/18H04W76/11H04W12/80
Inventor 凯利·米蒂宁朱纳斯·派尔坎宁
Owner NOKIA TECHNOLOGLES OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products