18578261. Hash Function and Lawful Interception simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Jump to navigation Jump to search

Hash Function and Lawful Interception

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Daniele Gaito of Pagani (IT)

Chiara Santella of Nocera Inferiore (IT)

Antonio Giorgio Gaggia of Salerno (IT)

Carmine Galotto of PAGANI (SA) (IT)

Mariano Russo of Napoli (IT)

Hash Function and Lawful Interception - A simplified explanation of the abstract

This abstract first appeared for US patent application 18578261 titled 'Hash Function and Lawful Interception

The abstract describes a method and device for determining a hash function to be used before storing and transmitting target identifiers. A lawful interception core device calculates a hashed value for a target identifier using the hash function and a hashing key, stores this information, and transmits it to a network element configured for interception.

  • The method involves using a hash function and hashing key to calculate a hashed value for target identifiers.
  • The hashed value, along with information about the hash function and key, is stored and transmitted for interception purposes.
  • The network element intercepts target identifiers from intercepted data and compares their hashed values to the stored values.
  • If a match is found, the intercepted data is forwarded to the core device for further processing and forwarding to a monitoring facility.

Potential Applications: - Lawful interception and surveillance systems - Data security and privacy protection measures

Problems Solved: - Efficient and secure interception of target identifiers - Protection of sensitive information during interception processes

Benefits: - Enhanced data security and privacy - Streamlined interception processes - Improved accuracy in identifying target identifiers

Commercial Applications: Title: Secure Lawful Interception Systems This technology can be used in government agencies, law enforcement, and cybersecurity firms for lawful interception purposes. It can also be integrated into communication networks to enhance data security and privacy protection.

Prior Art: Researchers can explore prior patents related to lawful interception systems, data encryption, and network security protocols for further insights into this technology.

Frequently Updated Research: Researchers in the field of cybersecurity and data privacy may have ongoing studies on improving lawful interception methods and technologies. Stay updated on relevant conferences and publications for the latest advancements in this area.

Questions about Lawful Interception Systems: 1. How does this technology ensure the secure transmission of intercepted data? - The technology uses a hash function and hashing key to securely calculate and store hashed values of target identifiers, ensuring data integrity during transmission.

2. What measures are in place to prevent unauthorized access to intercepted data? - Access control mechanisms and encryption protocols can be implemented to restrict access to intercepted data, enhancing data security and privacy.


Original Abstract Submitted

Methods () and devices () determine a hash function to be used before storing and transmitting target identifiers. A lawful interception, LI, core device () then calculates a target identifier hashed value, TIHV, using the hash function and a hashing key, stores an indication of the hash function, the hashing key and the TIHV, and transmits the indication, the hashing key and the TIHV to the network element that is configured to intercept LI data. The network element applies the hash function with the hashing key to intercepted target identifiers retrieved from intercepted LI data. If one of the intercepted target identifiers hashed values matches a TIHV received from the LI core device, the network element forwards LI data to the LI core device, which similarly matches and forwards LI data to a law enforcement monitoring facility.