US 12,244,651 B2
Lawful interception security
Andrea Senatore, Pellezzano (IT); Giuseppe Amato, Solerno (IT); Francesco Toro, Baronissi (IT); and Alessandro Mordacci, Solna (SE)
Assigned to Telefonaktiebolaget LM Ericsson (publ), Stockholm (SE)
Appl. No. 15/733,022
Filed by Telefonaktiebolaget LM Ericsson (publ), Stockholm (SE)
PCT Filed Nov. 7, 2017, PCT No. PCT/SE2017/051107
§ 371(c)(1), (2) Date Apr. 20, 2020,
PCT Pub. No. WO2019/093932, PCT Pub. Date May 16, 2019.
Prior Publication US 2020/0267189 A1, Aug. 20, 2020
Int. Cl. H04L 9/40 (2022.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 69/28 (2022.01)
CPC H04L 63/306 (2013.01) [H04L 9/0869 (2013.01); H04L 9/3236 (2013.01); H04L 63/123 (2013.01); H04L 69/28 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method performed by a lawful interception, LI, administrative function, ADMF, the method comprising:
obtaining a random value from a random number generator within a virtual network function, VNF,
obtaining an index value that is associated with the random value,
calculating a target hash value using a one-way hash function on a target and the random value, said target identifying a communicating entity that is to be subjected to LI in an intercept access point, IAP, in the VNF,
obtaining a database identifier for identifying a non-volatile memory associated with the IAP, and
transmitting, to the IAP, the random value, the index value, the database identifier, and the calculated target hash value.