Lawful Interception of Unauthorized Subscribers and Equipments
First Claim
1. A method in a telecommunication system to monitor unauthorized system members, the telecommunication system comprising an Access Point associated with a Configuration the method comprising the following steps:
- receiving to the Access Point from the Configuration Unit, a request to monitor a system memberreceiving to the Access Point from the Configuration Unit, a request to override deprived access rights for the system member; and
overriding in the Accept Point, the deprived access rights for the member.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises the following steps: —Receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request (1) to monitor a system member MS, SIM. —Receiving to the Access Point from the Configuration Unit, a request (2) to override deprived access rights for the system member MS, SIM. —Overriding in the Accept Point IAP; MSC, SGSN, the deprived access rights for the member.
-
Citations
19 Claims
-
1. A method in a telecommunication system to monitor unauthorized system members, the telecommunication system comprising an Access Point associated with a Configuration the method comprising the following steps:
-
receiving to the Access Point from the Configuration Unit, a request to monitor a system member receiving to the Access Point from the Configuration Unit, a request to override deprived access rights for the system member; and overriding in the Accept Point, the deprived access rights for the member. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method in a telecommunication system to inform a Monitoring Function of a change of classification of a target under interception, which telecommunication system comprises an Access Point associated with a Configuration Unit, comprising the following steps:
-
receiving to the Access Point from the Configuration Unit, a request to monitor the target; registration in the Access Point, a change of classification activity involving the monitored target; delivering information related to the change of classification activity, from the Access Point to the Configuration Unit. - View Dependent Claims (9, 10)
-
-
11. An arrangement in a telecommunication system to monitor unauthorized system members, the telecommunication system comprising an Access Point associated with a Configuration Unit, the arrangement comprising:
-
means for receiving to the Access Point from the Configuration Unit, a request to monitor a system member; characterized in means for receiving to the Access Point from the Configuration Unit, a request to override deprived access rights for the system member; means for overriding in the Accept Point, the deprived access rights for the member. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. An arrangement in a telecommunication system to inform a Monitoring Function of a change of classification of a target under interception, the telecommunication system comprising:
-
an Access Point associated with a Configuration Unit, the Access Point comprising; means for receiving to the Access Point from the Configuration Unit, a request to monitor the target; means for registration in the Access Point, a change of classification activity involving the monitored target; means for delivering information related to the change of classification activity, from the Access Point to the Configuration Unit. - View Dependent Claims (19)
-
Specification