Patents by Inventor Maurizio Iovieno
Maurizio Iovieno has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240373233Abstract: A network device is configured to implement an Identity Event Function, IEF, (16) for lawful interception, LI, of communications in a wireless communication network (12). The network device detects an event that comprises a change in an association between a long-term subscription identifier and a temporary subscription identifier for a wireless communication device (14). Responsive to detecting the event, the network device generates a record (22) that indicates the long-term subscription identifier associated with the event and the temporary subscription identifier associated with the event. The network device transmits the record (22) to an Identity Caching Function, ICF, (18) configured to cache associations between long-term subscription identifiers and temporary subscription identifiers. The network device also transmits, to the ICF (18), information indicating that the record (22) is associated with the IEF (16).Type: ApplicationFiled: November 19, 2021Publication date: November 7, 2024Inventors: Biagio Maione, Dario De Vito, Maurizio Iovieno
-
Patent number: 11258831Abstract: This invention is related to S8 Home Routing (S8HR), under specification by the Global System for Mobile Communications (GSM) Association (GSMA) and 3rd Generation Partnership Project (3GPP). In a first aspect of the invention, a method is provided for enabling Lawful Interception (LI) when a wireless communication terminal performs S8HR roaming. The method comprises receiving, at a first LMISF from a first SGW serving the wireless communication terminal, IMS-related information of the wireless communication terminal required for performing LI, and providing, from the first LMISF upon the wireless communication terminal relocating to a second SGW serving the wireless communication terminal, the received IMS-related information of the wireless communication terminal required for performing LI, to a second LMISF associated with the second SGW.Type: GrantFiled: October 26, 2016Date of Patent: February 22, 2022Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Roland Gustafsson, Maurizio Iovieno, Ralf Keller, Patrik Dannebro
-
Patent number: 10432606Abstract: A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication.Type: GrantFiled: April 27, 2012Date of Patent: October 1, 2019Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Mats Naslund, Maurizio Iovieno, Karl Norrman
-
Publication number: 20180227750Abstract: This invention is related to S8 Home Routing (S8HR), under specification by the Global System for Mobile Communications (GSM) Association (GSMA) and 3rd Generation Partnership Project (3GPP). In a first aspect of the invention, a method is provided for enabling Lawful Interception (LI) when a wireless communication terminal performs S8HR roaming. The method comprises receiving, at a first LMISF from a first SGW serving the wireless communication terminal, IMS-related information of the wireless communication terminal required for performing LI, and providing, from the first LMISF upon the wireless communication terminal relocating to a second SGW serving the wireless communication terminal, the received IMS-related information of the wireless communication terminal required for performing LI, to a second LMISF associated with the second SGW.Type: ApplicationFiled: October 26, 2016Publication date: August 9, 2018Inventors: Roland Gustafsson, Maurizio Iovieno, Ralf Keller, Patrik Dannebro
-
Patent number: 9762620Abstract: A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. A first parameter value in traffic for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic will be intercepted or retained at a second node crossed by the traffic is evaluated. If the second node will intercept or retain the traffic, the first node foregoes a lawful interception request or retention of intercepted data.Type: GrantFiled: April 21, 2015Date of Patent: September 12, 2017Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Maurizio Iovieno, Raffaele de Santis
-
Patent number: 9667662Abstract: A method for providing Law Enforcement Agencies in a telecommunications network with interception and/or retention data related to a target mobile node in a Proxy Mobile Internet Protocol domain connected to the telecommunications network through a Mobile Access Gateway, comprises the steps of configuring at least one of said Mobile Access Gateway and a Local Mobility Anchor to operate as Intercepting Control Elements or Data Retention sources.Type: GrantFiled: June 19, 2014Date of Patent: May 30, 2017Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventor: Maurizio Iovieno
-
Publication number: 20160234197Abstract: A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication.Type: ApplicationFiled: April 19, 2016Publication date: August 11, 2016Inventors: Mats NÄSLUND, Maurizio IOVIENO, Karl NORRMAN
-
Patent number: 9380554Abstract: The invention relates to a radio network controller (RNC) for receiving a LOCATION_REPORTING_CONTROL message and analyzing a value of a request type information element received in the LOCATION_REPORTING_CONTROL message. The RNC directly determines requested location information for a user equipment (UE) if the request information element indicates sending location information as a direct response to the LOCATION_REPORTING_CONTROL message or the RNC determines the requested location information if the UE changes the service area if the request information element indicates sending location information at a change of service area by the UE. The RNC then sends a LOCATION_REPORT message comprising the location information and the request type information element to at least one control node.Type: GrantFiled: June 25, 2014Date of Patent: June 28, 2016Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Enrico De Luca, Alessandro Lala, Martin Israelsson, Anders Molander, Maurizio Iovieno, Arpad Kormos
-
Patent number: 9173091Abstract: The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request to monitor a system member MS, SIM. The method further comprises receiving to the Access Point from the Configuration Unit, a request to override deprived access rights for the system member MS, SIM. The method further comprises overriding in the Access Point IAP; MSC, SGSN, the deprived access rights for the member.Type: GrantFiled: March 18, 2005Date of Patent: October 27, 2015Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Amedeo Imbimbo, Maurizio Iovieno
-
Publication number: 20150229675Abstract: A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. A first parameter value in traffic for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic will be intercepted or retained at a second node crossed by the traffic is evaluated. If the second node will intercept or retain the traffic, the first node foregoes a lawful interception request or retention of intercepted data.Type: ApplicationFiled: April 21, 2015Publication date: August 13, 2015Inventors: Maurizio Iovieno, Raffaele de Santis
-
Patent number: 9042388Abstract: A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. At least a first parameter value in data for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic is intercepted or retained at a second node crossed by the traffic in the same network is evaluated. If the second node is located downstream of the first node, lawful interception requests or intercepted data are filtered out.Type: GrantFiled: July 24, 2008Date of Patent: May 26, 2015Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Maurizio Iovieno, Raffaele De Santis
-
Patent number: 8989177Abstract: A method and apparatus for performing Lawful Interception in a communications network. An Access Transfer Control Function (ATCF) receives an activation message instructing lawful interception. The activation message includes a subject identity. The ATCF sends intercept related information to a Mediation Function at a Lawful Intercept node. The intercept related information relates to a communication session in which the subject participates.Type: GrantFiled: August 1, 2012Date of Patent: March 24, 2015Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Biagio Maione, Francesco Attanasio, Maurizio Iovieno, Ros-Marie Furtenback
-
Publication number: 20150074396Abstract: A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication.Type: ApplicationFiled: April 27, 2012Publication date: March 12, 2015Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Mats Naslund, Maurizio Iovieno, Karl Norrman
-
Patent number: 8898004Abstract: The invention relates to a method for distinguishing between LOCATION_REPORT messages to avoid ambiguities. Therefore, a value of an information element of request type is returned by a radio network controller, depending on an intended receiver of the location information. A control node receiving the information element value analyses said value and determines the receiver depending on the result of said analysis.Type: GrantFiled: August 21, 2013Date of Patent: November 25, 2014Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Enrico De Luca, Alessandro Lala, Martin Israelsson, Anders Molnader, Maurizio Iovieno, Arpad Kormos
-
Publication number: 20140308975Abstract: The invention relates to a radio network controller (RNC) for receiving a LOCATION— REPORTING— CONTROL message and analyzing a value of a request type information element received in the LOCATION— REPORTING— CONTROL message. The RNC directly determines requested location information for a user equipment (UE) if the request information element indicates sending location information as a direct response to the LOCATION— REPORTING— CONTROL message or the RNC determines the requested location information if the UE changes the service area if the request information element indicates sending location information at a change of service area by the UE. The RNC then sends a LOCATION— REPORT message comprising the location information and the request type information element to at least one control node.Type: ApplicationFiled: June 25, 2014Publication date: October 16, 2014Inventors: Enrico De Luca, Alessandro Lala, Martin Israelsson, Anders Molander, Maurizio Iovieno, Arpad Kormos
-
Publication number: 20140293836Abstract: A method for providing Law Enforcement Agencies in a telecommunications network with interception and/or retention data related to a target mobile node in a Proxy Mobile Internet Protocol domain connected to the telecommunications network through a Mobile Access Gateway, comprises the steps of configuring at least one of said Mobile Access Gateway and a Local Mobility Anchor to operate as Intercepting Control Elements or Data Retention sources.Type: ApplicationFiled: June 19, 2014Publication date: October 2, 2014Inventor: Maurizio IOVIENO
-
Patent number: 8792505Abstract: A method for providing Law Enforcement Agencies in a telecommunications network with interception and/or retention data related to a target mobile node in a Proxy Mobile Internet Protocol domain connected to the telecommunications network through a Mobile Access Gateway, comprises the steps of configuring at least one of said Mobile Access Gateway and a Local Mobility Anchor to operate as Intercepting Control Elements or Data Retention sources.Type: GrantFiled: July 24, 2008Date of Patent: July 29, 2014Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventor: Maurizio Iovieno
-
Publication number: 20140010228Abstract: A method and apparatus for performing Lawful Interception in a communications network. An Access Transfer Control Function (ATCF) receives an activation message instructing lawful interception. The activation message includes a subject identity. The ATCF sends intercept related information to a Mediation Function at a Lawful Intercept node. The intercept related information relates to a communication session in which the subject participates.Type: ApplicationFiled: August 1, 2012Publication date: January 9, 2014Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (publ)Inventors: Biagio MAIONE, Francesco ATTANASION, Maurizio IOVIENO, Ros-Marie FURTENBACK
-
Publication number: 20130344894Abstract: The invention relates to a method for distinguishing between LOCATION_REPORT messages to avoid ambiguities. Therefore, a value of an information element of request type is returned by a radio network controller, depending on an intended receiver of the location information. A control node receiving the information element value analyses said value and determines the receiver depending on the result of said analysis.Type: ApplicationFiled: August 21, 2013Publication date: December 26, 2013Applicant: TELEFONAKTIEBOLAGET L M ERICSSONInventors: Enrico De Luca, Alessandro Lala, Martin Israelsson, Anders Molnader, Maurizio Iovieno, Arpad Kormos
-
Patent number: 8606504Abstract: The invention relates to a method for distinguishing between LOCATION_REPORT messages to avoid ambiguities. Therefore, a value of an information element of request type is returned by a radio network controller, depending on an intended receiver of the location information. A control node receiving the information element value analyses said value and determines the receiver depending on the result of said analysis.Type: GrantFiled: January 25, 2012Date of Patent: December 10, 2013Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Enrico De Luca, Alessandro Lala, Martin Israelsson, Anders Molander, Maurizio Iovieno, Arpad Kormos