Interception system and method
First Claim
Patent Images
1. An interception system for performing a lawful interception in a packet network, comprising:
- a) interception activation and deactivation means (JAD) for allocating a subscriber identity to an interception data destination (IDD); and
b) interception data collection means (IDC) for creating a subscriber connection by using said allocated subscriber identity, in response to an interception activation message received from said interception activation and deactivation means (TAD), wherein said subscriber connection is used for transmitting intercepted data to said interception destination (IDD).
1 Assignment
0 Petitions
Accused Products
Abstract
An interception method and system for performing a lawful interception in a packet network such as a GPRS network is described, wherein a subscriber identity is allocated to an interceptor, such that the interceptor is treated as a mobile station. Thus, the interception traffic is processed as usual data traffic which can be charged using normal charging procedures and which can be intercepted using the normal lawful interception methods. Accordingly, no additional functions are required for charging and intercepting an interception.
-
Citations
22 Claims
-
1. An interception system for performing a lawful interception in a packet network, comprising:
-
a) interception activation and deactivation means (JAD) for allocating a subscriber identity to an interception data destination (IDD); and
b) interception data collection means (IDC) for creating a subscriber connection by using said allocated subscriber identity, in response to an interception activation message received from said interception activation and deactivation means (TAD), wherein said subscriber connection is used for transmitting intercepted data to said interception destination (IDD). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A network element for a packet network, comprising:
-
a) interception activation and deactivation means (AD) for allocating a subscriber identity to an interception data destination (IDD); and
b) message generation means for generating an interception activation message comprising said subscriber identity and supplying said interception activation message to another network element (GGSN) having an interception data collection function. - View Dependent Claims (10, 11, 13, 15, 16, 17)
-
-
12. A network element for a packet network, comprising:
-
a) interception data collection means (IDC) for creating a subscriber connection by using a subscriber identity allocated to an interception destination (IDD), in response to an interception activation message received from another network element (LIG) having an interception activation and deactivation function, said interception activation message comprising said subscriber identity; and
b) transmitting means for transmitting collected intercepted data to said interception destination (IDD) via said subscriber connection.
-
-
14. An interception method for performing a lawful interception in a packet network, comprising the steps of:
-
a) allocating a subscriber identity to an interception data destination (IDD);
b) creating a subscriber connection by using said allocated subscriber identity; and
c) using said subscriber connection for transmitting intercepted data to said interception destination (IDD). - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification