Method and apparatus for securely transmitting lawfully intercepted VOIP data
First Claim
1. A method for transmitting intercepted VOIP data, the method comprising:
- intercepting a VOIP call in response to a request for intercept by a law enforcement agency;
encrypting VOIP data associated with the intercepted VOIP call to form encrypted VOIP data; and
transmitting the encrypted VOIP data to the law enforcement agency using a public data network.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus, and computer usable program product for transmitting intercepted VOIP data are provided in the illustrative embodiments. A VOIP call is intercepted in response to a lawful request for intercept by a law enforcement agency. VOIP data associated with the intercepted VOIP call is encrypted. The encryption may use a virtual private network an encryption using a key of a specific length, bit stuffing, or other encryption methods. The encrypted VOIP data is transmitted to the law enforcement agency using a public data network either during the VOIP call or after the VOIP call. The intercept request may be made during the VOIP call, or before the VOIP call. Furthermore, the VOIP data of the VOIP call may be stored before transmitting to the law enforcement agency, and archived based on archiving rules. The request for the intercept may be queued for processing according to queuing rules. Notifications based on the request for intercept, VOIP call characteristics, or characteristics of the VOIP data may be sent to one or more law enforcement agencies, and may also be encrypted.
-
Citations
45 Claims
-
1. A method for transmitting intercepted VOIP data, the method comprising:
-
intercepting a VOIP call in response to a request for intercept by a law enforcement agency; encrypting VOIP data associated with the intercepted VOIP call to form encrypted VOIP data; and transmitting the encrypted VOIP data to the law enforcement agency using a public data network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer usable program product in a computer readable medium storing computer executable instructions for transmitting intercepted VOIP data that, when executed, cause a data processing system to:
-
intercept a VOIP call in response to a request for intercept by a law enforcement agency; encrypt VOIP data associated with the intercepted VOIP call to form encrypted VOIP data; and transmit the encrypted VOIP data to the law enforcement agency using a public data network. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system for transmitting intercepted VOIP data, the system comprising:
-
an intercept handling component for intercepting a VOIP call in response to a request for intercept by a law enforcement agency, an encryption component for encrypting VOIP data associated with the intercepted VOIP call to form encrypted VOIP data; and a transmitting component for transmitting the encrypted VOIP data to the law enforcement agency using a public data network. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
Specification