Patents by Inventor Amedeo Imbimbo

Amedeo Imbimbo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100291906
    Abstract: Systems and methods for legal interception of a transmission through a land based network to or from a mobile station based at least in part on the satisfaction of spatial criteria whereby a geographic area is identified and the location of one or more mobile stations is determined. Transmissions to or from one or more mobile stations may be intercepted based on the mobile stations being located within the geographic area, the distance between multiple mobile stations being less than a predetermined distance, or the distance between one or more mobile stations and a reference object being less than a predetermined distance. Intercepted transmissions as well as any associated data may be forwarded to one or more authorized entities, such as law enforcement agencies.
    Type: Application
    Filed: December 5, 2006
    Publication date: November 18, 2010
    Inventors: Enrico DeLuca, Amedeo Imbimbo, Tom Sensnic
  • Publication number: 20100235453
    Abstract: The present invention relates to a methods and arrangements for monitoring instant messaging and/or presence activity at application level in a telecommunication system, which method comprises the following steps:—A request to monitor instant messaging and/or presence activity information related to a target subscriber, which information is obtainable from any type of access and not limited to SIP clients connected to a public IMS core system is sent from an agency to a receiving entity.—A requested activity involving the target subscriber is received from an Instant Messaging and Presence Services (IMPS) system to the receiving entity.—Information related to the requested activity is delivered from the receiving entity to the agency.
    Type: Application
    Filed: September 21, 2007
    Publication date: September 16, 2010
    Inventors: Francesco Attanasio, Amedeo Imbimbo
  • Publication number: 20100211800
    Abstract: Systems and methods are provided for encryption allowing partial matching searches to retrieve data that is retained in a database. A user identification number or other characteristic is stored in unencrypted form such that a wildcard search may be performed to retrieve one or more encrypted indexes associated with the unencrypted user identification. These encrypted indexes are then unencrypted by use of a key to determined their associated unencrypted index and corresponding targeted retained data. The targeted retained data may then be accessed by an authorized entity such as a law enforcement agency.
    Type: Application
    Filed: September 21, 2007
    Publication date: August 19, 2010
    Inventors: Maurizio La Rocca, Amedeo Imbimbo
  • Publication number: 20100142389
    Abstract: Methods and apparatuses to enhance delivery capacity for traffic in a communication network are disclosed. Traffic is received to a Delivery Function with originally coded Quality of Services (QoS). A specification of requested QoS is received to the Delivery Function. The originally coded QoS is established to be higher than the requested QoS. The received traffic is transcoded into requested QoS. Optionally, the traffic is buffered with originally coded QoS and at request, the buffered traffic is retrieved.
    Type: Application
    Filed: December 28, 2006
    Publication date: June 10, 2010
    Inventors: Amedeo Imbimbo, Raffaele De Santis
  • Publication number: 20100039946
    Abstract: The present invention relates to a method for monitoring in a telecommunication system. The system comprises a service domain that handles session control and a bearer domain used for transportation of media flow. A request for monitoring of a first party (A) is received by a Call Session Control Function (CSCF) in the service domain. The method comprises the following further steps: —A SIP session event is detected by the Call 10 Session Control Function (CSCF) due to a set-up of a media-flow connection between the monitored party (A) and a second party (B). —A resource set-up message (SIP1) is sent via an interface (Mr) from the Call Session Control Function (CSCF) to a Multimedia Resource Function (MRF) in the service domain. —A SIP transaction is established between the Multimedia Resource Function (MRF) and a third Delivery Function (DF3). —A SIP session is established between the third Delivery Function (DF3) and a Law Enforcement Monitoring Facility (LEMF).
    Type: Application
    Filed: July 1, 2005
    Publication date: February 18, 2010
    Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Amedeo Imbimbo, Maurizio Iov 'eno
  • Publication number: 20090234845
    Abstract: The present invention relates to methods in a telecommunication system to provide access to data received to a centralized storage medium from interfacing traffic nodes in the system. The centralized storage medium is part of a Mediation and Delivery Function which is associated with a Law Enforcement Monitoring facility. The method comprises the following steps: Identifying in the Mediation and Delivery Function, a configuration request which comprises a filtering criteria specifying type of data to be accessed. Configuring in the Mediation and Delivery Function, the requested filtering criteria. Receiving data from the system to the centralized storage medium. Establishing that the received data matches the filtering criteria. Retaining the received data in the centralized storage medium and/or forwarding the data to the Law Enforcement Monitoring Facility.
    Type: Application
    Filed: February 27, 2006
    Publication date: September 17, 2009
    Inventors: Raffaele DeSantis, Enrico DeLuca, Amedeo Imbimbo
  • Publication number: 20090207751
    Abstract: The present invention relates to methods and arrangements in a telecommunication system to monitor information related to specified services in a service unaware node. The node handles Content of Communication associated with services. The system comprises a Delivery Function to which Content of Communication related to a target is received from the node. The method comprises the following steps: Receiving from a requesting entity to the Delivery Function a request to delimit the received Content of Communication according to not desired services. Parsing the received Content of Communication according to not desired services by a Packet Inspection Feature associated with the Delivery Function. Forwarding Control Information related to the not desired services to the requesting entity.
    Type: Application
    Filed: July 26, 2006
    Publication date: August 20, 2009
    Inventors: Francesco Attanasio, Amedeo Imbimbo
  • Publication number: 20090006414
    Abstract: The present invention relates to problems how to generate information related to access and use of a directory object in a database. The problems are solved by methods and arrangements in a communication system to generate information related to use of the monitored directory object in a database. The system provides the information to an Intercept Configuration Unit ICU. The information is collected from the IAP, which is associated to the monitored directory object in the HSS. The method comprises the following step: —receiving to the Interception Access Point IAP a request to monitor the directory object in the database, —detection of use of the monitored directory object in the IAP, —delivering information related to said use, from the IAP to the Intercept Configuration Unit ICU.
    Type: Application
    Filed: December 29, 2004
    Publication date: January 1, 2009
    Inventor: Amedeo Imbimbo
  • Publication number: 20080280609
    Abstract: The present invention relates to method and arrangements to provide information related to user devices in a telecommunication system (TS). The system comprises at least one network domain (HPLMN, WCDMA) that is associated with a central database (DCR). The method comprises identification in the central database (DCR) of a first request (REQ1, REQI1) to provide to at least one data analysis function, user identity information related to all user devices that notifies attachment to the at least one network domain (HPLMN, WCDMA). Attachment notification from a requested user device (A, B) to the network domain is then detected in the central database.
    Type: Application
    Filed: December 22, 2005
    Publication date: November 13, 2008
    Inventors: Amedeo Imbimbo, Raffaele De Santis
  • Publication number: 20080216158
    Abstract: The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises the following steps: —Receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request (1) to monitor a system member MS, SIM. —Receiving to the Access Point from the Configuration Unit, a request (2) to override deprived access rights for the system member MS, SIM. —Overriding in the Accept Point IAP; MSC, SGSN, the deprived access rights for the member.
    Type: Application
    Filed: March 18, 2005
    Publication date: September 4, 2008
    Inventors: Amedeo Imbimbo, Maurizio Iovieno
  • Publication number: 20080198993
    Abstract: Method for providing intercepted Content of Communications CC information from Intercepting Control Element ICE to at least one Law Enforcement Monitoring Facility LEMF through Delivery Functions in a telecommunications network, comprising the steps of: splitting the intercepted CC information into CC control information and CC payload information; at a Lawful Interception Content of Communications Control Point LI CC CP, receiving the CC control information and processing the CC control information; at an LI CC Gateway, receiving the CC payload information from the ICE over a payload interface X3, said LI CC Gateway being controlled by said LI CC CP according to said CC control information; and at said LI CC Gateway, switching the CC payload information to said at least one LEMF over a payload Handover Interface 3 HI3.
    Type: Application
    Filed: May 31, 2005
    Publication date: August 21, 2008
    Inventors: Amedeo Imbimbo, Enrico De Luca
  • Publication number: 20080095342
    Abstract: The present invention relates to problems how to generate information related to use of a Cashless Calling Service Subscription. The problems are solved by methods and arrangements in a communication system to generate information related to use of the monitored Cashless Calling Service Subscription. The system provides the information to an Intercept Configuration Unit. The information is collected from the Interception Access Point that is associated to the monitored Cashless Calling Service Subscription. The method comprises the following step: receiving to the Interception Access Point a request to monitor the Cashless Calling Service Subscription number, detection of use of the monitored Cashless Calling Service Subscription number at the Interception Access Point, delivering information related to said use, from the Interception Access Point to the Intercept Configuration Unit.
    Type: Application
    Filed: December 29, 2004
    Publication date: April 24, 2008
    Inventors: Amedeo Imbimbo, Enrico De Luca
  • Publication number: 20080049926
    Abstract: The present invention relates to methods and arrangements in a telecommunication system to generate Interception Related Information IRI related to Virtual Private Network VPN calls, which telecommunication system provides Virtual Private Network services to at least one integrated exchange LE-C; in the system. The exchange LE-C is associated with an Intercept Configuration Unit ICU. The method comprises the following steps:—Sending from the Intercept Configuration Unit ICU to the exchange LE-C, a request REQ to monitor Virtual Private Network calls involving a defined Corporate Network CN-A.—Receiving by the exchange LE-C, a call message SETUP; IAM in Virtual Private Network context comprising an identification field identifying the defined Corporate Network CN-A.—Sending from the exchange to the Intercept Configuration Unit ICU, Interception Related Information IRI related to the call.
    Type: Application
    Filed: December 29, 2004
    Publication date: February 28, 2008
    Inventor: Amedeo Imbimbo