US 11,924,252 B2
Methods and devices for triggering lawful interception
Antonio Vitiello, Pompei (IT); Daniele Gaito, Naples (IT); Enrico De Luca, Caserta (IT); Lorenzo Giuseppe Elisio, Salerno (IT); and Mariano Russo, Naples (IT)
Assigned to TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), Stockholm (SE)
Appl. No. 17/619,478
Filed by Telefonaktiebolaget LM Ericsson (PUBL), Stockholm (SE)
PCT Filed Jun. 25, 2019, PCT No. PCT/SE2019/050608
§ 371(c)(1), (2) Date Dec. 15, 2021,
PCT Pub. No. WO2020/263135, PCT Pub. Date Dec. 30, 2020.
Prior Publication US 2022/0311807 A1, Sep. 29, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/30 (2013.01) 20 Claims
OG exemplary drawing
 
1. A method for triggering lawful interception, LI, in a communication network, the method comprising:
implementing a triggering control function, TCF, as two entities:
an LI target handler, LITH, which meets LI security requirements for holding and processing sensitive information, maintains an LI target list, and
a modified TCF, mTCF, which does not have to meet the LI security requirements, triggers a point of interception, POI, linked to a network function instance, NFI, to start intercepting specific target's communications occurring when the NFI is executed; and
providing a generic LI triggering interface, GLITI between the LITH and the mTCF to enable the mTCF to interrogate the LITH regarding whether an entity using the NFI is a specific target of LI.