Surveillance implementation in managed VOP networks
First Claim
1. A method of electronic surveillance in a network comprising the steps of:
- analyzing said network, relative to one or a plurality of targeted devices, to identify suitable access points for electronic signal interception based on the system configuration and operation parameters of said network;
operatively connecting suitable interception devices to said network at said suitable access points;
performing productive electronic surveillance by intercepting electronic packet messages via said interception devices, wherein said packet messages comprise one of configuration files, security association messages, call management signals and associated call contents, and wherein said intercepting comprises;
receiving without altering said packet messages, and transmitting replications of said packet messages to suitable processing devices for surveillance processing;
performing surveillance processing of intercepted packet messages to determine additional said suitable access points and the method of decrypting said packet messages.
1 Assignment
0 Petitions
Accused Products
Abstract
A procedure for accomplishing surveillance within a managed VoP network when end-user encryption/decryption and NAT are in place. The procedure comprises first analyzing the network from call signaling and message standpoints, leading to the identification of suitable surveillance access points (SAPs) for packet interception. A Delivery Function (DF) facilitated by the network service provider provides the means to intercept (without alteration) and replicate packets transmitted across the SAPs. The packets are then transmitted via the DF for collection within a Collection Function (CF), which is managed by a Law Enforcement Agency (LEA), for analysis by the LEA. This analysis provides, among other benefits, the opportunity to decrypt the intercepted packets and to identify additional suitable SAPs. In demonstrating the procedure, several embodiments of network surveillance models are described. Each one identifies the location of SAPs for that model. In each model, different information is collected and different processes are followed.
140 Citations
20 Claims
-
1. A method of electronic surveillance in a network comprising the steps of:
-
analyzing said network, relative to one or a plurality of targeted devices, to identify suitable access points for electronic signal interception based on the system configuration and operation parameters of said network;
operatively connecting suitable interception devices to said network at said suitable access points;
performing productive electronic surveillance by intercepting electronic packet messages via said interception devices, wherein said packet messages comprise one of configuration files, security association messages, call management signals and associated call contents, and wherein said intercepting comprises;
receiving without altering said packet messages, and transmitting replications of said packet messages to suitable processing devices for surveillance processing;
performing surveillance processing of intercepted packet messages to determine additional said suitable access points and the method of decrypting said packet messages. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification