US 12,483,896 B2
Method in a telecommunication network, and computer system
Giuseppe Celozzi, Naples (IT); and Pietro Picaro, Formia (IT)
Assigned to TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), Stockholm (SE)
Appl. No. 18/267,300
Filed by Telefonaktiebolaget LM Ericsson (publ), Stockholm (SE)
PCT Filed Dec. 16, 2020, PCT No. PCT/EP2020/086574
§ 371(c)(1), (2) Date Jun. 14, 2023,
PCT Pub. No. WO2022/128089, PCT Pub. Date Jun. 23, 2022.
Prior Publication US 2024/0056824 A1, Feb. 15, 2024
Int. Cl. H04W 12/80 (2021.01); H04L 9/40 (2022.01)
CPC H04W 12/80 (2021.01) [H04L 63/20 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method performed by a lawful interception (LI) administrative function (ADMF) in a telecommunication network, the method comprising:
obtaining a quantum key and a key stream identifier (KSID) associated with the quantum key from a quantum key distribution network (QKDN);
transmitting to an LI entity a first request message;
receiving from the LI entity a first response message responsive to the first request message, wherein the first response message indicates that the LI entity is capable of obtaining the quantum key from the QKDN;
determining if the LI entity is capable of obtaining the quantum key from the QKDN; and
as a result of determining that the LI entity is capable of obtaining the quantum key from the QKDN, transmitting to the LI entity the KSID associated with the quantum key to enable the LI entity to obtain the quantum key associated with the KSID transmitted by the LI ADMF from the QKDN.