SYSTEM AND METHOD IN A COMMUNICATION SYSTEM WITH CONCEALED SOURCES
First Claim
Patent Images
1. A method, comprising:
- receiving from a law enforcement agency (LEA) an anonymous Internet Protocol (IP) address accompanied with a time stamp;
determining from the anonymous IP address and the time stamp at least one of an identity of the anonymous source and an IP address of customer premise equipment (CPE) used by the anonymous source to engage in Internet activities; and
submitting to the LEA at least one of the identity of the anonymous source and the IP address of the CPE used by the anonymous source.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that incorporates teachings of the present disclosure may include, for example, a proxy system having a controller to submit to law enforcement agency an identity of a source that conceals its identity with one or more anonymous Internet Protocol addresses. Other embodiments are disclosed.
-
Citations
25 Claims
-
1. A method, comprising:
-
receiving from a law enforcement agency (LEA) an anonymous Internet Protocol (IP) address accompanied with a time stamp; determining from the anonymous IP address and the time stamp at least one of an identity of the anonymous source and an IP address of customer premise equipment (CPE) used by the anonymous source to engage in Internet activities; and submitting to the LEA at least one of the identity of the anonymous source and the IP address of the CPE used by the anonymous source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
- 14. A computer-readable storage medium, comprising computer instructions for determining from an anonymous Internet Protocol (IP) address and a time stamp supplied by a law enforcement agency (LEA) at least one of an identity of an anonymous source and an IP address of customer premise equipment (CPE) used by the anonymous source to engage in concealed Internet activities.
- 21. A proxy system, comprising a controller to submit to a law enforcement agency (LEA) an identity of a source that conceals its identity with one or more anonymous Internet Protocol (IP) addresses.
Specification