System and method for lawful interception (LI) of Network traffic in a mobile edge computing environment
First Claim
1. An enhanced Node B (eNB) of a Mobile Edge Computing (MEC) Radio Access Network (RAN) of a wireless telecommunication network, the eNB comprising:
- a non-transitory memory device storing a plurality of processor-executable instructions; and
one or more processor configured to execute the processor-executable instructions, wherein executing the processor-executable instructions causes the one or more processors to;
receive, from a core network of the wireless telecommunication network, a Lawful Interception (LI) policy, the LI policy including;
instructions for determining whether network traffic is subject to LI, andan identifier corresponding to a LI infrastructure consisting of one or more server devices;
receive, from a User Equipment, a request for content, the request including destination information corresponding to a content source located outside the wireless telecommunication network;
determine, based on the request, whether the content is available locally at the MEC RAN;
when the content is available at the MEC RAN,determine, based on the LI policy, whether the request and the content are subject to LI;
when the request and the content are subject to LI,
provide a first copy of the content, from the MEC RAN, to the UE,
provide, in accordance with the LI policy, the request to the LI infrastructure, and
provide, in accordance with the LI policy, a second copy of the content, from the MEC RAN, to the LI infrastructure, and
when the request is not subject to LI,
provide the first copy of the content, from the MEC RAN, to the UE; and
when the content is not available at the MEC RAN,forward the request for the content source via a core network of the wireless telecommunication network.
1 Assignment
0 Petitions
Accused Products
Abstract
Lawful Interception (LI) services may be provided in Radio Access Networks (RANs) implementing Mobile Edge Computing (MEC). An enhanced NodeB (eNB) may receive an LI policy that includes instructions for identifying network traffic subject to LI and for providing copies of the network traffic to a LI infrastructure of one or more server devices. When the eNB receives a request for content from a User Equipment (UE), the eNB may determine whether a local instance of the content is available (via MEC) and, based on the LI policy, whether the request and/or the content are subject to LI. When a local instance is available and the request and content are subject to LI, the eNB may provide a copy of the request and the content to the LI infrastructure, in addition to providing a copy of the content to the UE.
21 Citations
20 Claims
-
1. An enhanced Node B (eNB) of a Mobile Edge Computing (MEC) Radio Access Network (RAN) of a wireless telecommunication network, the eNB comprising:
-
a non-transitory memory device storing a plurality of processor-executable instructions; and one or more processor configured to execute the processor-executable instructions, wherein executing the processor-executable instructions causes the one or more processors to; receive, from a core network of the wireless telecommunication network, a Lawful Interception (LI) policy, the LI policy including; instructions for determining whether network traffic is subject to LI, and an identifier corresponding to a LI infrastructure consisting of one or more server devices; receive, from a User Equipment, a request for content, the request including destination information corresponding to a content source located outside the wireless telecommunication network; determine, based on the request, whether the content is available locally at the MEC RAN; when the content is available at the MEC RAN, determine, based on the LI policy, whether the request and the content are subject to LI;
when the request and the content are subject to LI,
provide a first copy of the content, from the MEC RAN, to the UE,
provide, in accordance with the LI policy, the request to the LI infrastructure, and
provide, in accordance with the LI policy, a second copy of the content, from the MEC RAN, to the LI infrastructure, and
when the request is not subject to LI,
provide the first copy of the content, from the MEC RAN, to the UE; andwhen the content is not available at the MEC RAN, forward the request for the content source via a core network of the wireless telecommunication network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
receiving, by an enhanced Node B (eNB) of a Mobile Edge Computing (MEC) Radio Access Network (RAN) of a wireless telecommunication network, a Lawful Interception (LI) policy, the LI policy including; instructions for determining whether network traffic is subject to LI, and an identifier corresponding to a LI infrastructure consisting of one or more server devices; receiving, from a User Equipment, a request for content, the request including destination information corresponding to a content source located outside the wireless telecommunication network; determining, based on the request, whether the content is available locally at the MEC RAN; when the content is available at the MEC RAN, determining, based on the LI policy, whether the request and the content are subject to LI; when the request and the content are subject to LI,
providing a first copy of the content, from the MEC RAN, to the UE,
providing, in accordance with the LI policy, the request to the LI infrastructure, and
providing, in accordance with the LI policy, a second copy of the content, from the MEC RAN, to the LI infrastructure, and when the request is not subject to LI,
providing the first copy of the content, from the MEC RAN, to the UE; andwhen the content is not available at the MEC RAN, forwarding the request for the content source via a core network of the wireless telecommunication network. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium storing a plurality of processor-executable instructions, wherein executing the processor-executable instructions causes one or more processors to:
-
receive, from a core network of the wireless telecommunication network, a Lawful Interception (LI) policy, the LI policy including; instructions for determining whether network traffic is subject to LI, and an identifier corresponding to a LI infrastructure consisting of one or more server devices; receive, from a User Equipment, a request for content, the request including destination information corresponding to a content source located outside the wireless telecommunication network; determine, based on the request, whether the content is available locally at the MEC RAN; when the content is available at the MEC RAN, determine, based on the LI policy, whether the request and the content are subject to LI; when the request and the content are subject to LI,
provide a first copy of the content, from the MEC RAN, to the UE,
provide, in accordance with the LI policy, the request to the LI infrastructure, and
provide, in accordance with the LI policy, a second copy of the content, from the MEC RAN, to the LI infrastructure, and when the request is not subject to LI,
provide the first copy of the content, from the MEC RAN, to the UE; andwhen the content is not available at the MEC RAN, forward the request for the content source via a core network of the wireless telecommunication network. - View Dependent Claims (18, 19, 20)
-
Specification