Stealth interception of calls within a VoIP network
First Claim
1. A surveillance system, comprising:
- A VoIP telephony device including all identification and a means to communicate with other VoIP telephony devices in a VoIP network, or a non-VoIP device using an access gateway. Packet interceptors for monitoring packet activity on the said VoIP network. Call Monitoring Engine equipped with a VoIP call Flow state machine, to be contacted by the Law Enforcement agencies via a secure channel. Voice Packet Receiver and Assembler that buffers and forwards voice data to the LEA over a secure channel.
0 Assignments
0 Petitions
Accused Products
Abstract
Stealth interception of calls within a VoIP Network (91) for providing law enforcement related call interception capability (60,61,62). The VoIP network comprises of basically a SoftSwitch (20) that offers IP based telephony services for subscribers (10, 11) over a packet network. Packet Interceptors (51) are deployed in a packet network to non-intrusively monitor the signaling (21) and media packets (22), which comprise a call in a VoIP Network. The Call Monitoring Engine (50) on receipt of an intercept request from the Law Enforcement Agency (40); notifies the packet interceptors to monitor for packets and the Voice Packet Receiver and Assembler (52) for reception of voice packets. On detection of relevant packets the interceptors inform the Call Monitoring Engine of signaling packets and the Voice Packet Receiver and Assembler of voice packets. This packet information is processed and transmitted (41,42) to the Law Enforcement Agency.
151 Citations
13 Claims
-
1. A surveillance system, comprising:
-
A VoIP telephony device including all identification and a means to communicate with other VoIP telephony devices in a VoIP network, or a non-VoIP device using an access gateway. Packet interceptors for monitoring packet activity on the said VoIP network. Call Monitoring Engine equipped with a VoIP call Flow state machine, to be contacted by the Law Enforcement agencies via a secure channel. Voice Packet Receiver and Assembler that buffers and forwards voice data to the LEA over a secure channel. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for providing stealth surveillance between a VoIP telephony device and other VoIP or non-VoIP based telephony devices over a VoIP network, said method comprising:
-
receive surveillance request from the Law Enforcement Agency to monitor a telephony device. initiating a state machine to drive the call flow of the monitored telephony device. interceptors are triggered on reception of packets originating and terminating at the telephony device. intercept voice packets as a result of the call, information for voice packets are collected during signaling packet capture. intercepted voice packets are assembled and sent to the LEA over a secure channel. call interception is achieved without the involvement of the Soft Switch or the Access Device, during the duration of the call;
surveillance is done in stealth mode. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for providing stealth surveillance in a VoIP based network, said method comprising:
-
a dedicated packet network isolated from the VoIP based network. access ports on the VoIP based network for locating packet interceptors. Communication within the surveillance network is packet based. - View Dependent Claims (12, 13)
-
Specification