Lawful Interception of Broadband Data Traffic
First Claim
1. A method for intercepting data traffic in a dedicated enterprise network comprising a range of contiguous Internet Protocol (IP) addresses, comprising:
- deploying a plurality of provider edge (PE) routers and a plurality of provider (P) routers, each of the PE routers being operatively coupled to each of the P routers in a multi-homed configuration, and each of the PE routers and P routers forming a communication link; and
intercepting the data traffic across the communication links for the range of contiguous IP addresses.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable media provide for lawfully intercepting broadband data traffic. According to one aspect, a method for intercepting data traffic in a dedicated enterprise network comprising a range of contiguous Internet Protocol (IP) addresses is provided. According to the method, a plurality of provider edge (PE) routers and a plurality of provider (P) routers are deployed. Each of the PE routers is operatively coupled to each of the P routers in a multi-homed configuration, and each of the PE routers and P routers forms a communication link. The data traffic is intercepted across the communication links for the range of contiguous IP addresses.
-
Citations
20 Claims
-
1. A method for intercepting data traffic in a dedicated enterprise network comprising a range of contiguous Internet Protocol (IP) addresses, comprising:
-
deploying a plurality of provider edge (PE) routers and a plurality of provider (P) routers, each of the PE routers being operatively coupled to each of the P routers in a multi-homed configuration, and each of the PE routers and P routers forming a communication link; and intercepting the data traffic across the communication links for the range of contiguous IP addresses. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for measuring a performance of a lawful broadband data interception system, comprising:
-
configuring a network element to generate data traffic via Service Assurance Agent (SAA) functionality provided by the network element; transmitting the data traffic across a broadband network; intercepting the data traffic being transmitted across the broadband network; and measuring the performance of the lawful broadband data interception system based on the intercepted data traffic. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-readable medium having instructions stored thereon for execution by a processor to provide a method for intercepting data traffic in a dedicated enterprise network comprising a range of contiguous Internet Protocol (IP) addresses, the method comprising:
-
deploying a plurality of provider edge (PE) routers and a plurality of provider (P) routers, each of the PE routers being operatively coupled to each of the P routers in a multi-homed configuration, and each of the PE routers and P routers forming a communication link; and intercepting the data traffic across the communication links for the range of contiguous IP addresses. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification