Lawful interception of unauthorized subscribers and equipments
First Claim
1. A method in a telecommunication system to monitor unauthorized system members, the system members comprising one or more of user equipments and mobile subscribers, the telecommunication system comprising an Access Point associated with a Law Enforcement Monitoring Function, the method comprising the following steps:
- receiving to the Access Point from the Law Enforcement Monitoring Function, a request to monitor a system member for which access rights to the telecommunication system have been deprived,wherein the Law Enforcement Monitoring Function can only monitor system members when they access the telecommunication system;
receiving to the Access Point from the Law Enforcement Monitoring Function, a request to override deprived access rights for the system member; and
overriding in the Access Point, the deprived access rights for the system member, allowing the system member to temporarily access the telecommunication system, thereby enabling lawful interception of the system member;
prior to overriding the deprived access rights, receiving a first service request message from the system member at the Access Point;
rejecting the first service request.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request to monitor a system member MS, SIM. The method further comprises receiving to the Access Point from the Configuration Unit, a request to override deprived access rights for the system member MS, SIM. The method further comprises overriding in the Access Point IAP; MSC, SGSN, the deprived access rights for the member.
-
Citations
14 Claims
-
1. A method in a telecommunication system to monitor unauthorized system members, the system members comprising one or more of user equipments and mobile subscribers, the telecommunication system comprising an Access Point associated with a Law Enforcement Monitoring Function, the method comprising the following steps:
-
receiving to the Access Point from the Law Enforcement Monitoring Function, a request to monitor a system member for which access rights to the telecommunication system have been deprived, wherein the Law Enforcement Monitoring Function can only monitor system members when they access the telecommunication system; receiving to the Access Point from the Law Enforcement Monitoring Function, a request to override deprived access rights for the system member; and overriding in the Access Point, the deprived access rights for the system member, allowing the system member to temporarily access the telecommunication system, thereby enabling lawful interception of the system member; prior to overriding the deprived access rights, receiving a first service request message from the system member at the Access Point; rejecting the first service request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An arrangement in a telecommunication system to monitor unauthorized system members, the system members comprising one or more of user equipments and mobile subscribers, the telecommunication system comprising an Access Point associated with a Law Enforcement Monitoring Function, the arrangement comprising:
-
means for receiving to the Access Point from the Law Enforcement Monitoring Function, a request to monitor a system member for which access rights to the telecommunication system have been deprived, wherein the Law Enforcement Monitoring Function can only monitor system members when they access the telecommunication system; means for receiving to the Access Point from the Law Enforcement Monitoring Function, a request to override deprived access rights for the system member; and means for overriding in the Access Point, the deprived access rights for the system member, allowing the system member to temporarily access the telecommunication system, thereby enabling lawful interception of the system member; means for, prior to overriding the deprived access rights, receiving a first service request message from the system member at the Access Point; means for rejecting the first service request. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification