Method and apparatus for providing service provider-controlled communication security
First Claim
1. A method comprising facilitating a processing of data, information, or at least one signal, based, at least in part, on the following:
- at least one interception requirement of a first jurisdiction targeted at a first user, a mobile device associated with the first user, or a combination thereof;
a connection request, to an apparatus of a network operator of an access network, for connecting with the mobile device that is an end point of a communications connection, wherein the communications connection is referenced in the connection request;
context information associated with the mobile device, the access network, the first user, the communications connection, or a combination thereof, wherein the context information includes a location of the mobile device at the time of the connection request;
an analysis of a network address associated with the mobile device to verify the location of the mobile device;
a processing of the context information including the location of the mobile device and the communications connection to determine one or more encryption ciphers provided by one or more user privacy requirements of a second jurisdiction as applicable to another end-point of the connection request at the time of the connection request; and
an establishment of the communications connection by the apparatus using at least one of the encryption ciphers provided by the one or more user privacy requirements of the second jurisdiction, wherein the at least one of the encryption ciphers supports the at least one interception requirement of the first jurisdiction.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for service provider controlled communication security. A security platform receives a connection request from a client device. The security platform determines context information associated with the device, access network, a user of the device, or a combination thereof, and then processes and/or facilitates a processing of the context information to determine one or more encryption ciphers to offer for the session. Next, the security platform causes, at least in part, establishment of the connection request using, at least in part, the one of the offered encryption ciphers.
44 Citations
20 Claims
-
1. A method comprising facilitating a processing of data, information, or at least one signal, based, at least in part, on the following:
-
at least one interception requirement of a first jurisdiction targeted at a first user, a mobile device associated with the first user, or a combination thereof; a connection request, to an apparatus of a network operator of an access network, for connecting with the mobile device that is an end point of a communications connection, wherein the communications connection is referenced in the connection request; context information associated with the mobile device, the access network, the first user, the communications connection, or a combination thereof, wherein the context information includes a location of the mobile device at the time of the connection request; an analysis of a network address associated with the mobile device to verify the location of the mobile device; a processing of the context information including the location of the mobile device and the communications connection to determine one or more encryption ciphers provided by one or more user privacy requirements of a second jurisdiction as applicable to another end-point of the connection request at the time of the connection request; and an establishment of the communications connection by the apparatus using at least one of the encryption ciphers provided by the one or more user privacy requirements of the second jurisdiction, wherein the at least one of the encryption ciphers supports the at least one interception requirement of the first jurisdiction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus of a network operator of an access network to perform at least the following; receive at least one interception requirement of a first jurisdiction targeted at a first user, a mobile device associated with the first user, or a combination thereof; receive a connection request for connecting with the mobile device that is an end point of a communications connection, wherein the communications connection is referenced in the connection request; determine context information associated with the mobile device, the access network, the first user, the communications connection, or a combination thereof, wherein the context information includes a location of the mobile device at the time of the connection request; analyze a network address associated with the mobile device to verify the location of the mobile device; process and/or facilitate a processing of the context information including the location of the mobile device and the communications connection to determine one or more encryption ciphers provided by one or more user privacy requirements of a second jurisdiction as applicable to another end-point of the connection request at the time of the connection request; and establish the communications connection by the apparatus using at least one of the encryption ciphers provided by the one or more user privacy requirements of the second jurisdiction, wherein the at least one of the encryption ciphers supports the at least one interception requirement of the first jurisdiction. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification