Nokia technologies oy (20240114345). METHOD AND APPARATUS FOR LAWFUL INTERCEPTION FOR AKMA ROAMING ARCHITECTURE simplified abstract

From WikiPatents
Revision as of 07:13, 12 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD AND APPARATUS FOR LAWFUL INTERCEPTION FOR AKMA ROAMING ARCHITECTURE

Organization Name

nokia technologies oy

Inventor(s)

Saurabh Khare of Bangalore (IN)

Ranganathan Mavureddi Dhanasekaran of Munich (DE)

METHOD AND APPARATUS FOR LAWFUL INTERCEPTION FOR AKMA ROAMING ARCHITECTURE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240114345 titled 'METHOD AND APPARATUS FOR LAWFUL INTERCEPTION FOR AKMA ROAMING ARCHITECTURE

Simplified Explanation

The abstract describes a method, apparatus, and computer program for receiving an application session establishment request with authentication and key management for applications, producing an application key request, and sending it to enable lawful interception in the VPLMN.

  • Authentication and key management for applications (AKMA)
  • Application key request generation
  • Sending the application key request to enable lawful interception

Potential Applications

The technology described in this patent application could be applied in telecommunications networks for enabling lawful interception of application sessions.

Problems Solved

This technology solves the problem of enabling lawful interception in virtual private local mobile networks (VPLMN) by providing a method for authentication and key management for applications.

Benefits

The benefits of this technology include enhanced security and compliance with legal interception requirements in telecommunications networks.

Potential Commercial Applications

A potential commercial application of this technology could be in the development of secure communication systems for mobile networks that require lawful interception capabilities.

Possible Prior Art

One possible prior art for this technology could be existing methods and systems for lawful interception in telecommunications networks, which may not specifically address authentication and key management for applications.

What are the specific information elements included in the application key request?

The application key request includes information elements such as AKMA key identifier (A-KID), application function identifier (AF_ID), and application encryption key indication (NNEF_AKMA_AF_ENCRYPTION_KEY_INDICATION).

How does this technology ensure secure communication in application sessions?

This technology ensures secure communication in application sessions by implementing authentication and key management for applications, which enables the generation and exchange of encryption keys for secure data transmission.


Original Abstract Submitted

a method, apparatus, and computer program for receiving an application session establishment request comprising an authentication and key management for applications, akma, key identifier, a-kid; producing an application key request (naanf_akma_applicationkey_get_request) comprising information elements akma key identifier a-kid; an application function identifier, af_id; and an application encryption key indication (nnef_akma_af_encryption_key_indication); and sending the produced application key request (naanf_akma_applicationkey_get_request) to a home akma anchor function, haanf, or to a network exposure function, nef, for enabling lawful interception in the vplmn.