You are on page 1of 9
US 201701118 co») United States Al 36. c2) Patent Application Publication (o) Pub. No.: US 2017/0111836 Al Barley (43) Pub, Dat Apr. 20, 2017 (94) SYSTEM AND METHOD FOR (2) US.c INTERROGATING A MOBILE cr ‘Hosw 36/14 (2013.01), HOAW a0 COMMUNICATION TERMINAL (2013.01); HOA 4828 (2013.01) (71). Aprlicnt: Vernt Systems Lid, Herya Pitch (5p ABSTRACT ab (72) Inventor: Ishay Barley, Limassol (CY) ai (22) Filed ) Appl. No. 187294,287 Oct, 14, 2016 G0) Foreign Application Priority Data Systems and methods to instruct « mobile device to switch from first protocol a second protocol alte registering the device on a network associated withthe first protocol. This may be done to obiain a eryplographie key used by the device. For example, for some communication protocols such as 3G and 4G communication protocols, obtaining the ceyplographic key is difficult. However, the 2G commun cation protocol Uses a eryptogsaphic Key that is easier to a1 15,2015 (L) 242119 obzain. Only after obtaining the key. the phone instructed to 7 ; ‘gain switch to the fist communication protocol. During the Pebistan Coaaeaias exchange of communication, the users ikely tobe holding GI) Inch the phone st is er, such that hos unlikely to notice that the HOW 3614 (20060) phones using the fist communication protocol. Hence the os sss (2001601) exchange of communication may be decrypted and moni Hosw 6u0o (2006.01) ‘ord, without the user noticing anything amiss vas 50 SOLICIT PHONE 52 INSTRUCT PHONE TO USE SECOND COMMUNICATION PROTOCOL, t REGISTER PHONE ON 537] SECOND-COMMUNICATION-PROTOCOL_NETWORK I INSTRUCT PHONE TO AGAIN USE FIRST as COMMUNICATION PROTOCOL DETECT REQUEST FOR EXCHANGE OF 55 COMMUNICATION WITH PHONE INSTRUCT PHONE TO USE SECOND 56-)COMMUNICATION PROTOCOL FOR THE EXCHANGE] 58—-Y INTERMEDIATE EXCHANGE US 2017/0111836 Al Apr. 20,2017 Sheet 1 of 2 Patent Application Publication a 101 I 4YOSSI00%d “Old SOIR NOLLWOOUNAINI Patent Application Publication Apr. 20, 2017 Sheet 2 of 2 US 2017/0111836 Al 50-7 SOLICIT PHONE SL 9 527) INSTRUCT PHONE TO USE SECOND 537] 547} 557] 58-7 COMMUNICATION PROTOCOL I REGISTER PHONE ON SECOND—COMMUNICATION-PROTOCOL NETWORK INSTRUCT PHONE TO AGAIN USE FIRST COMMUNICATION PROTOCOL DETECT REQUEST FOR EXCHANGE OF COMMUNICATION WITH PHONE INSTRUCT PHONE TO USE SECOND COMMUNICATION PROTOCOL FOR THE EXCHANGE: INTERMEDIATE EXCHANGE FIG. 2 US 2017/0111836 Al SYSTEM AND METHOD FOR INTERROGATING A MOBILE COMMUNICATION TERMINAL FIELD OF THE DISCLOSURE [0001] The present disclosure relates generally to interro- ating mobile communication terminals, such as mobile phones, and paricularly wo methods and systems for ‘decrypting communication exchanged with such terminals, BACKGROUND OF THE DISCLOSURE [0002] In some eases, security andior law enforcement agencies may wish to decrypt communication exchanged ‘with a mobile communication terminal. SUMMARY OF THE DISCLOSURE [0003] There is provided, in accordance with some ‘embodiments described herein, a method for intermediating ‘an exchange of communication. mobile communication terminal, whichis associated witha first mobile communi- cation network in accordance with a first communication protocol, is solicited 10 associate with an interrogation device. While the solicited mobile communication terminal, is associated with the interrogation deviee, the mobile com- munication terminalis instructed to use & second commu nication protocol. Subsequently, the mobile communication terminalis registered on a second mobile communication network that uses the second communication protocol. Sub- sequently, the mobile communication terminal is insirueted to again use the frst communication protocol, Subsoquenty, by virtve of having registered the mobile communication terminal on the second communication network, a roquest for an exchange of second-communication-protocal com- munication with the mobile communication terminal is detected. In response thereto, the mobile communication terminal is instucted 10 use the second communication protocol fr the exchange, and subsequently, the exchange is intermediate [0004] In some embodiments, intermediating the ‘exchange includes decrypting the exchange. 10005] In some embosliments, the method further includes, following the intermediting ofthe exchange, instructing the mobile communication terminal to reassociate withthe fist ‘mobile communication network [0006] In some embodiments, instructing the mobile com- riuniation terminal to use the second communication pro- tocol includes instructing the mobile communication ter nal to use a second generation (2G) communication protocol 10007] In some embodiments, detecting the request forthe ‘exchange of communication includes detecting a request that is made by the mobile communication terminal 10008] In some embodiments, detecting the request forthe ‘exchange of communication includes detecting a request, that is made by a communication temminal that is not the mobile communication terminal 10009] There is further provided, in aocordance with some ‘embodiments deseribed herein, an interrogation device inchuding an antenna atleast one transmitter-reeiver(rans- ceiver, and a processor. The processor is configured 0, via the transceiver and the antenna, solicit a mobile coms ‘cation terminal, which is associated with a fist mobile ‘commusication network in accordance with first coment Apr. 20, 2017 ication protocol, to associate with the interrogation device via the transceiver and the antenna. The processor is further conligured to, while the solicited mobile communication ‘emminal is associated with the interrogation device, (i) insite the mobile commusication terminal to use a second communication protocol, (ji) subsequently, register the ‘mobile communication terminal on a second mobile com ‘nication network that uses the second communication protocol, (i) subsequently, instruct the mobile eommuni- cation termiaal to again use the first communication proto- co, (iv) subsequently, by virtue of having registered the ‘mobile communication terminal on the second mobile com- ‘munication network, detect a request for an exchange of second-commusication-protocol communication with the ‘mobile communication temminal, (¥) in response thereto, insinct the mobile communication terminal to use the second communication protocol for the exchange, and (vi) subsequently, intermediate the exchange. [0010] In some embodiments, the processor is configured {o deerypt the exchange while intermediating the exchange. {0011} In some embodiments, the processor is further configured to, following the intermediating of the exchange, instruct the mobile communication terminal to re-associate ‘with the first mobile communication network. [0012] In some embodiments, the second communication protocol isa second generation (2G) communication proto- fo, the processor being configured t0 instruct the mobile communication terminal to use the 2G communication pro- tocol [0013] In some embodiments, the processor is configured to detoct the request by detecting a request that is made by the mobile communication terminal {0014} In some embodiments, the processor is configured to detect the request by detecting a aquest tat is made by ‘ communication terminal that is not the mobile communi~ cation terminal [0015] Theres further provided, in accordance with some embodiments described herein, a computer software product including a tangible non-transtory computer-eadable ‘medium in which progeam instructions are stored. The instructions, when read by a processor of an interrogation device with which a mobile communication terial, which was previously associated with a frst mobile communica~ tion network in accordance with a first communication protocol, associated, cause the processorto, via an antenna ‘nd transmiter-eceiver (transceiver) ofthe interrogation sevice, (i) instruct the mobile communication terminal to use a second communication protocol, (i) subsequently, register the mobile communication terminal on a second ‘mobile communication network that uss the second com: ‘munication protocol, (ii) subsequently, instruct the mobile communication terminal to again use the first communica ‘ion protocol, (v) subsequently, by virtue of having reais- tered the mobile communication terminal on the secon ‘communication network, detect a request for an exchange of second-communication-protocol communication with the mobile communication temninal, (¥) in response thereto, instuct the mobile communication terminal to use the second communication protocol for the exchange, and (vi) subsequently, intermediate the exchange. [0016] Ia some embodiments, the instructions further fuse the processor to, prior to instructing the mobile ‘communication terminal to use the second communication US 2017/0111836 Al protocol, solicit the mobile communication tena 0 s0-

You might also like