US 201701118
co») United States
Al
36.
c2) Patent Application Publication (o) Pub. No.: US 2017/0111836 Al
Barley (43) Pub, Dat Apr. 20, 2017
(94) SYSTEM AND METHOD FOR (2) US.c
INTERROGATING A MOBILE cr ‘Hosw 36/14 (2013.01), HOAW a0
COMMUNICATION TERMINAL (2013.01); HOA 4828 (2013.01)
(71). Aprlicnt: Vernt Systems Lid, Herya Pitch (5p ABSTRACT
ab
(72) Inventor: Ishay Barley, Limassol (CY)
ai
(22) Filed
) Appl. No. 187294,287
Oct, 14, 2016
G0) Foreign Application Priority Data
Systems and methods to instruct « mobile device to switch
from first protocol a second protocol alte registering the
device on a network associated withthe first protocol. This
may be done to obiain a eryplographie key used by the
device. For example, for some communication protocols
such as 3G and 4G communication protocols, obtaining the
ceyplographic key is difficult. However, the 2G commun
cation protocol Uses a eryptogsaphic Key that is easier to
a1 15,2015 (L) 242119 obzain. Only after obtaining the key. the phone instructed to
7 ; ‘gain switch to the fist communication protocol. During the
Pebistan Coaaeaias exchange of communication, the users ikely tobe holding
GI) Inch the phone st is er, such that hos unlikely to notice that the
HOW 3614 (20060) phones using the fist communication protocol. Hence the
os sss (2001601) exchange of communication may be decrypted and moni
Hosw 6u0o (2006.01) ‘ord, without the user noticing anything amiss
vas
50 SOLICIT PHONE
52 INSTRUCT PHONE TO USE SECOND
COMMUNICATION PROTOCOL,
t
REGISTER PHONE ON
537] SECOND-COMMUNICATION-PROTOCOL_NETWORK
I
INSTRUCT PHONE TO AGAIN USE FIRST
as COMMUNICATION PROTOCOL
DETECT REQUEST FOR EXCHANGE OF
55 COMMUNICATION WITH PHONE
INSTRUCT PHONE TO USE SECOND
56-)COMMUNICATION PROTOCOL FOR THE EXCHANGE]
58—-Y
INTERMEDIATE EXCHANGEUS 2017/0111836 Al
Apr. 20,2017 Sheet 1 of 2
Patent Application Publication
a
101
I
4YOSSI00%d
“Old
SOIR NOLLWOOUNAINIPatent Application Publication Apr. 20, 2017 Sheet 2 of 2
US 2017/0111836 Al
50-7 SOLICIT PHONE
SL 9
527) INSTRUCT PHONE TO USE SECOND
537]
547}
557]
58-7
COMMUNICATION PROTOCOL
I
REGISTER PHONE ON
SECOND—COMMUNICATION-PROTOCOL NETWORK
INSTRUCT PHONE TO AGAIN USE FIRST
COMMUNICATION PROTOCOL
DETECT REQUEST FOR EXCHANGE OF
COMMUNICATION WITH PHONE
INSTRUCT PHONE TO USE SECOND
COMMUNICATION PROTOCOL FOR THE EXCHANGE:
INTERMEDIATE EXCHANGE
FIG. 2US 2017/0111836 Al
SYSTEM AND METHOD FOR
INTERROGATING A MOBILE
COMMUNICATION TERMINAL
FIELD OF THE DISCLOSURE
[0001] The present disclosure relates generally to interro-
ating mobile communication terminals, such as mobile
phones, and paricularly wo methods and systems for
‘decrypting communication exchanged with such terminals,
BACKGROUND OF THE DISCLOSURE
[0002] In some eases, security andior law enforcement
agencies may wish to decrypt communication exchanged
‘with a mobile communication terminal.
SUMMARY OF THE DISCLOSURE
[0003] There is provided, in accordance with some
‘embodiments described herein, a method for intermediating
‘an exchange of communication. mobile communication
terminal, whichis associated witha first mobile communi-
cation network in accordance with a first communication
protocol, is solicited 10 associate with an interrogation
device. While the solicited mobile communication terminal,
is associated with the interrogation deviee, the mobile com-
munication terminalis instructed to use & second commu
nication protocol. Subsequently, the mobile communication
terminalis registered on a second mobile communication
network that uses the second communication protocol. Sub-
sequently, the mobile communication terminal is insirueted
to again use the frst communication protocol, Subsoquenty,
by virtve of having registered the mobile communication
terminal on the second communication network, a roquest
for an exchange of second-communication-protocal com-
munication with the mobile communication terminal is
detected. In response thereto, the mobile communication
terminal is instucted 10 use the second communication
protocol fr the exchange, and subsequently, the exchange is
intermediate
[0004] In some embodiments, intermediating the
‘exchange includes decrypting the exchange.
10005] In some embosliments, the method further includes,
following the intermediting ofthe exchange, instructing the
mobile communication terminal to reassociate withthe fist
‘mobile communication network
[0006] In some embodiments, instructing the mobile com-
riuniation terminal to use the second communication pro-
tocol includes instructing the mobile communication ter
nal to use a second generation (2G) communication
protocol
10007] In some embodiments, detecting the request forthe
‘exchange of communication includes detecting a request
that is made by the mobile communication terminal
10008] In some embodiments, detecting the request forthe
‘exchange of communication includes detecting a request,
that is made by a communication temminal that is not the
mobile communication terminal
10009] There is further provided, in aocordance with some
‘embodiments deseribed herein, an interrogation device
inchuding an antenna atleast one transmitter-reeiver(rans-
ceiver, and a processor. The processor is configured 0, via
the transceiver and the antenna, solicit a mobile coms
‘cation terminal, which is associated with a fist mobile
‘commusication network in accordance with first coment
Apr. 20, 2017
ication protocol, to associate with the interrogation device
via the transceiver and the antenna. The processor is further
conligured to, while the solicited mobile communication
‘emminal is associated with the interrogation device, (i)
insite the mobile commusication terminal to use a second
communication protocol, (ji) subsequently, register the
‘mobile communication terminal on a second mobile com
‘nication network that uses the second communication
protocol, (i) subsequently, instruct the mobile eommuni-
cation termiaal to again use the first communication proto-
co, (iv) subsequently, by virtue of having registered the
‘mobile communication terminal on the second mobile com-
‘munication network, detect a request for an exchange of
second-commusication-protocol communication with the
‘mobile communication temminal, (¥) in response thereto,
insinct the mobile communication terminal to use the
second communication protocol for the exchange, and (vi)
subsequently, intermediate the exchange.
[0010] In some embodiments, the processor is configured
{o deerypt the exchange while intermediating the exchange.
{0011} In some embodiments, the processor is further
configured to, following the intermediating of the exchange,
instruct the mobile communication terminal to re-associate
‘with the first mobile communication network.
[0012] In some embodiments, the second communication
protocol isa second generation (2G) communication proto-
fo, the processor being configured t0 instruct the mobile
communication terminal to use the 2G communication pro-
tocol
[0013] In some embodiments, the processor is configured
to detoct the request by detecting a request that is made by
the mobile communication terminal
{0014} In some embodiments, the processor is configured
to detect the request by detecting a aquest tat is made by
‘ communication terminal that is not the mobile communi~
cation terminal
[0015] Theres further provided, in accordance with some
embodiments described herein, a computer software product
including a tangible non-transtory computer-eadable
‘medium in which progeam instructions are stored. The
instructions, when read by a processor of an interrogation
device with which a mobile communication terial, which
was previously associated with a frst mobile communica~
tion network in accordance with a first communication
protocol, associated, cause the processorto, via an antenna
‘nd transmiter-eceiver (transceiver) ofthe interrogation
sevice, (i) instruct the mobile communication terminal to
use a second communication protocol, (i) subsequently,
register the mobile communication terminal on a second
‘mobile communication network that uss the second com:
‘munication protocol, (ii) subsequently, instruct the mobile
communication terminal to again use the first communica
‘ion protocol, (v) subsequently, by virtue of having reais-
tered the mobile communication terminal on the secon
‘communication network, detect a request for an exchange of
second-communication-protocol communication with the
mobile communication temninal, (¥) in response thereto,
instuct the mobile communication terminal to use the
second communication protocol for the exchange, and (vi)
subsequently, intermediate the exchange.
[0016] Ia some embodiments, the instructions further
fuse the processor to, prior to instructing the mobile
‘communication terminal to use the second communicationUS 2017/0111836 Al
protocol, solicit the mobile communication tena 0 s0-