WO2015113996A3 - Method, apparatus and computer program for lawful intercept in device-to-device communication - Google Patents

Method, apparatus and computer program for lawful intercept in device-to-device communication Download PDF

Info

Publication number
WO2015113996A3
WO2015113996A3 PCT/EP2015/051678 EP2015051678W WO2015113996A3 WO 2015113996 A3 WO2015113996 A3 WO 2015113996A3 EP 2015051678 W EP2015051678 W EP 2015051678W WO 2015113996 A3 WO2015113996 A3 WO 2015113996A3
Authority
WO
WIPO (PCT)
Prior art keywords
information
methods
computer program
reporting
lawful intercept
Prior art date
Application number
PCT/EP2015/051678
Other languages
French (fr)
Other versions
WO2015113996A2 (en
Inventor
Stefano Sorrentino
Maurizio Iovieno
Iana Siomina
Original Assignee
Telefonaktiebolaget L M Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson (Publ) filed Critical Telefonaktiebolaget L M Ericsson (Publ)
Priority to EP15703517.1A priority Critical patent/EP3100444A2/en
Publication of WO2015113996A2 publication Critical patent/WO2015113996A2/en
Publication of WO2015113996A3 publication Critical patent/WO2015113996A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/18Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Abstract

There are provided methods in D2D Device of Logging the Information, Reporting the Logged Information, methods in a Network Node of Checking/Verifying the Logged Information, Requesting the Information, detecting specific LI events, reporting LI information to the LEMF, and method for Logging/Reporting Transmission Parameters, Requesting Decryption Keys, and for Data Relay. There are provided apparatuses and means arranged to perform the methods, and computer programs for implementing the methods.
PCT/EP2015/051678 2014-01-29 2015-01-28 Method, apparatus and computer program for lawful intercept in device-to-device communication WO2015113996A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP15703517.1A EP3100444A2 (en) 2014-01-29 2015-01-28 Method, apparatus and computer program for lawful intercept in device-to-device communication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP14425008.1 2014-01-29
EP14425008 2014-01-29

Publications (2)

Publication Number Publication Date
WO2015113996A2 WO2015113996A2 (en) 2015-08-06
WO2015113996A3 true WO2015113996A3 (en) 2015-11-12

Family

ID=52464355

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2015/051678 WO2015113996A2 (en) 2014-01-29 2015-01-28 Method, apparatus and computer program for lawful intercept in device-to-device communication

Country Status (2)

Country Link
EP (1) EP3100444A2 (en)
WO (1) WO2015113996A2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105409185B (en) * 2013-07-31 2018-12-21 诺基亚技术有限公司 A kind of local communication intercepting method and device
WO2018224862A1 (en) * 2017-06-07 2018-12-13 Telefonaktiebolaget Lm Ericsson (Publ) Enhanced lawful interception
KR20200138746A (en) * 2018-04-02 2020-12-10 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 Information reporting method, terminal device, network device and computer storage medium
CN110149627B (en) * 2019-04-22 2020-08-18 西北工业大学 Deep learning-based emergency communication system wireless energy supply D2D communication safety method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090254651A1 (en) * 2008-04-03 2009-10-08 Scott Sheppard Verifying a lawful interception system
US20110154181A1 (en) * 2009-12-23 2011-06-23 Nokia Corporation Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120072035A (en) * 2010-12-23 2012-07-03 한국전자통신연구원 Apparatus, system and method for lawful interception of intercepted target
CN103152748B (en) * 2011-12-07 2015-11-25 华为技术有限公司 communication monitoring method, base station and terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090254651A1 (en) * 2008-04-03 2009-10-08 Scott Sheppard Verifying a lawful interception system
US20110154181A1 (en) * 2009-12-23 2011-06-23 Nokia Corporation Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
INSTITUTE FOR INFORMATION INDUSTRY (III): "Proximity aware service consideration on lawful interception", 3GPP DRAFT; S1-120068_PROXIMITY AWARE SERVICE CONSIDERATION ON LAWFUL INTERCEPTION, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG1, no. Kyoto, Japan; 20120213 - 20120217, 6 February 2012 (2012-02-06), XP050574732 *
See also references of EP3100444A2 *

Also Published As

Publication number Publication date
WO2015113996A2 (en) 2015-08-06
EP3100444A2 (en) 2016-12-07

Similar Documents

Publication Publication Date Title
CY1122570T1 (en) DEVICE IDENTIFICATION AND VERIFICATION IN THE CLOUD
MX361806B (en) Methods and systems for recommending communications configurations.
WO2014182727A3 (en) Selectively performing man in the middle decryption
MX2020005791A (en) Methods, apparatuses, and systems for network analysis.
MY191655A (en) Method for controlling transmission of data
PE20170656A1 (en) AUTHENTICATION OF THE SERVICE NETWORK
MX2017000430A (en) Networked access control system.
EP3407534A4 (en) In-car computer system, vehicle, key generation device, management method, key generation method, and computer program
EP3453136A4 (en) Methods and apparatus for device authentication and secure data exchange between a server application and a device
EP3220572A4 (en) Key management method, vehicle-mounted network system and key management device
SG10201900029SA (en) Automated account provisioning
EP3197123A4 (en) Method, terminal, and network server for information encryption and decryption and key management
WO2015187640A3 (en) System and method for secure review of audit logs
EP4271017A3 (en) Secured home network
WO2015023336A3 (en) Selectively performing man in the middle decryption
EP3468137A4 (en) Network security management system, method and device
WO2015176633A3 (en) System and method for device-to-device communication
SG11202000571RA (en) Key management method, apparatus, and device
EP3118771A4 (en) Confidential data management method and device, and security authentication method and system
GB2533727A (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
EP3082295A4 (en) Fault management apparatus, device and method for network function virtualization (nfv)
EP3499790A4 (en) Management system, key-generating device, on-board computer, management method, and computer program
EP3565210A4 (en) Method, relevant device and system for processing network key
EP3512158A4 (en) Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system
SG10201901701XA (en) Method, device and system for invoking local service assembly by browser

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15703517

Country of ref document: EP

Kind code of ref document: A2

REEP Request for entry into the european phase

Ref document number: 2015703517

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015703517

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE