Method and apparatus for intercepting events in a communication system
First Claim
Patent Images
1. A communication management device, comprising:
- a processor configured to operate as a legal intercept for intercepting data associated with a target user pursuant to a legal warrant.
4 Assignments
0 Petitions
Accused Products
Abstract
An intercept system provides more effective and more efficient compliance with legal intercept warrants. The intercept system can provide any combination of operations that include near-real-time intercept, capture of intercepted data in structured authenticated form, clear text intercept for communications where there is access to encryption keys, cipher text intercept for communications where there is no access to encryption keys, provision of transactional logs to the authorized agency, interception without altering the operation of the target services, and encryption of stored intercepted information.
-
Citations
34 Claims
-
1. A communication management device, comprising:
a processor configured to operate as a legal intercept for intercepting data associated with a target user pursuant to a legal warrant. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A method for intercepting data, comprising:
-
receiving a warrant identifier for a warrant authorizing a legal intercept;
receiving a user identifier identifying an intercept target for the legal intercept associated with the warrant; and
automatically intercepting data received and/or sent by the intercept target identified by the user identifier. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A communication management system, comprising:
-
a management server used for managing communications between a computer in an enterprise or local network and a mobile device;
the management server configurable to operate as an interception device for intercepting the communications between the computer and the mobile device pursuant to a warrant from an enforcement agency. - View Dependent Claims (25, 26, 27, 28)
-
-
29. A communication management system, comprising:
-
a processor configured to operate as a legal intercept for intercepting data associated with a target user pursuant to a legal warrant, the processor configured to identify a first unencrypted portion of the intercepted data and identify a second encrypted portion of the intercepted data encrypted using an unknown security association, and the processor further configured to store the first portion of the intercepted data into a log file and combine the encrypted second portion of the intercepted data with the first portion of the intercepted data in the same log file. - View Dependent Claims (30, 31, 32, 33, 34)
-
Specification