Interception system and method
First Claim
1. An interception system for performing a lawful interception in a packet network, comprising:
- a) interception activation and deactivation means (IAD) for activating and deactivation current interception targets based on a received interception-related command;
b) interception activation monitoring means (IAM) for monitoring an activation of PDP contexts and for informing said interception activation and deactivation means (IAD) of changes in said PDP contexts;
c) interception data collection means (IDC) for collecting intercepted data in response to an interception target activation by said interception activation and deactivation means (IAD); and
d) interception data destination means (IDD) for receiving said collected intercepted data and forwarding it to a final interception destination.
3 Assignments
0 Petitions
Accused Products
Abstract
An interception system and method for performing a lawful interception in a packet network such as the GPRS or UMTS network is described. The interception system comprises an interception activation monitoring function, an interception activation and deactivation function, an interception data collection function and an interception data destination function. The interception data collection function can be implemented in an existing network node such as a GPRS support node, wherein an interception information is set in the corresponding PDP context, and the collection of the intercepted data is performed in response to the set interception information. Furthermore, the interception data destination function may be arranged in an interception browsing element arranged for browsing the intercepted databased on an external command received from another network element comprising the interception activation and deactivation function. Thereby, browsing and managing of the lawful interception can be separated into different network elements. In summary, a flexible interception system can be provided, which can be easily adapted to individual architectures of packet networks.
-
Citations
41 Claims
-
1. An interception system for performing a lawful interception in a packet network, comprising:
-
a) interception activation and deactivation means (IAD) for activating and deactivation current interception targets based on a received interception-related command;
b) interception activation monitoring means (IAM) for monitoring an activation of PDP contexts and for informing said interception activation and deactivation means (IAD) of changes in said PDP contexts;
c) interception data collection means (IDC) for collecting intercepted data in response to an interception target activation by said interception activation and deactivation means (IAD); and
d) interception data destination means (IDD) for receiving said collected intercepted data and forwarding it to a final interception destination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A network element for a packet network, comprising:
-
a) setting means (IDC) for setting an interception information in a PDP context thereof in response to an interception request received by said network element; and
b) interception data collection means (IDC) for collecting intercepted data in response to said interception information and for supplying said collected intercepted data to an interception destination (LIG). - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 30, 31)
-
-
29. An interception browsing element for a packet network, comprising:
-
a) receiving means for receiving intercepted date from a network element (GGSN) having an interception data collection function;
b) storing means for storing interception data received from said network element (GGSN); and
c) browsing means for browsing said stored interception data based on an external command and for supplying the result of said browsing to an interception authority. - View Dependent Claims (32, 33, 34, 35, 36, 38, 40)
-
-
37. A method for performing a lawful interception in a packet network, comprising steps of:
-
a) monitoring an activation of PDP contexts in order to detect changes in said PDP contexts;
b) activating and deactivating current interception targets based on an interception-related command and said changes in said PDP contexts;
c) collection intercepted data in response to an interception target activation; and
d) supplying said collected intercepted data to an interception destination.
-
-
39. A method for performing a lawful interception in a packet network, comprising the steps of:
-
a) setting an interception information in a PDP context of a network element in response to an interception request;
b) collecting intercepted data in said network element in response to said interception information; and
c) supplying said collected intercepted data to an interception destination.
-
-
41. A method for performing a lawful interception in a packet network, comprising the steps of:
-
a) providing a first network element (GGSN) having an interception data collection function;
b) transmitting collected intercepted data from said first network element to an interception browsing element (LIB);
c) browsing said transmitted intercepted data at said interception browsing element based on an external command from a second network element (LIG) having an interception activation and deactivation function; and
d) transmitting the result of said browsing step to an interception authority.
-
Specification