Intercepting a communication session in a telecommunication network
First Claim
1. A method for intercepting a secure communication session, comprising:
- distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint;
establishing a secure channel between the key distribution point and an intercepting point;
determining if the intercepting endpoint is authorized to intercept the secure communication session; and
providing the key to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, the key providing the intercepting endpoint with access to intercept the secure communication session.
1 Assignment
0 Petitions
Accused Products
Abstract
Intercepting a secure communication session includes distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint. A secure channel is established between the key distribution point and an intercepting point. The intercepting endpoint may be determined to be authorized to intercept the secure communication session. The key is provided to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, where the key provides the intercepting endpoint with access to intercept the secure communication session.
19 Citations
20 Claims
-
1. A method for intercepting a secure communication session, comprising:
-
distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint;
establishing a secure channel between the key distribution point and an intercepting point;
determining if the intercepting endpoint is authorized to intercept the secure communication session; and
providing the key to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, the key providing the intercepting endpoint with access to intercept the secure communication session. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for intercepting a secure communication session, comprising:
-
a key manager operable to distribute a key in order to establish a secure communication session between a first endpoint and a second endpoint; and
an interception manager coupled to the key manager and operable to;
establish a secure channel between the key distribution point and an intercepting point;
determine if the intercepting endpoint is authorized to intercept the secure communication session; and
provide the key to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, the key providing the intercepting endpoint with access to intercept the secure communication session. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. Logic for intercepting a secure communication session, the logic embodied in a medium and operable to:
-
distribute a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint;
establish a secure channel between the key distribution point and an intercepting point;
determine if the intercepting endpoint is authorized to intercept the secure communication session; and
provide the key to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, the key providing the intercepting endpoint with access to intercept the secure communication session. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A system for intercepting a secure communication session, comprising:
-
means for distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint;
means for establishing a secure channel between the key distribution point and an intercepting point;
means for determining if the intercepting endpoint is authorized to intercept the secure communication session; and
means for providing the key to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, the key providing the intercepting endpoint with access to intercept the secure communication session.
-
-
20. A method for intercepting a secure communication session, comprising:
-
distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint, the call session communicating a media stream;
establishing a secure channel between the key distribution point and an intercepting point;
determining if the intercepting endpoint is authorized to intercept the secure communication session, the intercepting endpoint determined to be authorized by;
accessing an interception rule corresponding to the intercepting endpoint, the interception rule defining whether the intercepting endpoint is authorized, the interception rule defining one or more conditions under which the intercepting endpoint is authorized, the interception rule defining a time period during which the intercepting endpoint is authorized; and
determining that the intercepting endpoint is authorized if the intercepting endpoint satisfies the interception rule;
providing the key to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, the key providing the intercepting endpoint with access to the media stream to intercept the secure communication session, the key provided to the intercepting endpoint by;
providing the key only under the one or more conditions; and
providing the key only during the time period; and
recording information describing the interception of the communication session.
-
Specification