Method and system for lawful interception of packet switched network services
First Claim
1. A method for lawful interception of packet switched network services, comprising the steps of:
- when a user accesses the network and is identified by a target-ID at a primary interception point of the network, sending the target-ID to an interception management center, checking at the interception management center whether the user is a lawful interception target and sending an encrypted interception instruction set to a secondary interception point, decrypting said interception instruction set at the secondary interception point and performing an interception process in accordance with the interception instruction set, said interception process including the transmission of encrypted interception and dummy data to a mediation device, wherein said dummy data are added for obscuring true interception traffic between the secondary interception point and the mediation device.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for lawful interception of packet switched network services, comprising the steps of:
when a user accesses the network and is identified by a target-ID at a primary interception point of the network, sending the target-ID to an interception management center,
checking at the interception management center whether the user is a lawful interception target and sending an encrypted interception instruction set to a secondary interception point,
decrypting said interception instruction set at the secondary interception point and performing an interception process in accordance with the interception instruction set, said interception process including the transmission of encrypted interception and dummy data to a mediation device, wherein said dummy data are added for obscuring true interception traffic between the secondary interception point and the mediation device.
-
Citations
14 Claims
-
1. A method for lawful interception of packet switched network services, comprising the steps of:
-
when a user accesses the network and is identified by a target-ID at a primary interception point of the network, sending the target-ID to an interception management center, checking at the interception management center whether the user is a lawful interception target and sending an encrypted interception instruction set to a secondary interception point, decrypting said interception instruction set at the secondary interception point and performing an interception process in accordance with the interception instruction set, said interception process including the transmission of encrypted interception and dummy data to a mediation device, wherein said dummy data are added for obscuring true interception traffic between the secondary interception point and the mediation device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification