LAWFUL INTERCEPTION IN WIRELINE BROADBAND NETWORKS
First Claim
1. A method for intercepting data transmissions, comprising:
- receiving a command to intercept a data transmission associated with a target, the data transmission being transmitted through a broadband network;
identifying the target;
directing at least one intercept access point to intercept the data transmission, each intercept access point located in the broadband network;
receiving, at a delivery function that is located in a lawful intercept node associated with a core network, at least a portion of an intercepted data transmission; and
transmitting at least a portion of the intercepted data transmission from the lawful intercept node to at least one authorized entity.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for lawful interception of data transmissions through at least one broadband network. Data transmissions, including voice and data services as well as high bandwidth transmissions such as multimedia and video, are intercepted and routed to authorized agencies such as law enforcement monitoring facilities. The systems and methods also enable interception of data transmissions such as peer to peer type data transmissions that pass through broadband networks from source to recipient without passing through centralized core network elements. These transmissions are intercepted at access points distributed throughout the broadband networks and forwarded to lawful intercept node elements for transmission to authorized entities.
75 Citations
38 Claims
-
1. A method for intercepting data transmissions, comprising:
-
receiving a command to intercept a data transmission associated with a target, the data transmission being transmitted through a broadband network; identifying the target; directing at least one intercept access point to intercept the data transmission, each intercept access point located in the broadband network; receiving, at a delivery function that is located in a lawful intercept node associated with a core network, at least a portion of an intercepted data transmission; and transmitting at least a portion of the intercepted data transmission from the lawful intercept node to at least one authorized entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for intercepting data transmissions, comprising:
-
a receiver associated with a processor for receiving a command to intercept a data transmission associated with a target, the data transmission being transmitted through a broadband network; the processor adapted to identify the target; the processor directing at least one intercept access point to intercept the data transmission, each intercept access point located in the broadband network; a delivery function associated with the processor, the delivery function receiving at least a portion of an intercepted data transmission, the delivery function located in a lawful intercept node associated with a core network; and a transmitter transmitting at least a portion of the intercepted data transmission from the lawful intercept node to at least one authorized entity. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A system for intercepting data transmissions, comprising:
-
means for receiving a command to intercept a data transmission associated with a target, the data transmission being transmitted through a broadband network; means for identifying the target; means for directing at least one intercept access point to intercept the data transmission, each intercept access point located in the broadband network; means for receiving, at a delivery function that is located in a lawful intercept node associated with a core network, at least a portion of an intercepted data transmission; and means for transmitting at least a portion of the intercepted data transmission from the lawful intercept node to at least one authorized entity.
-
-
38. An article of manufacture comprising a program storage medium having computer readable program code embodied therein for intercepting data transmissions, the computer readable program code in the article of manufacture comprising:
-
computer readable code for causing a network element to receive a command to intercept a data transmission associated with a target, the data transmission being transmitted through a broadband network; computer readable code for causing a network element to identify a target; computer readable code for causing a network element to intercept the data transmission at one or more intercept access points, each intercept access point located in the broadband network; computer readable code for causing a network element to receive, in a lawful intercept node, at least a portion of an intercepted data transmission; and computer readable code for causing a network element to transmit at least a portion of the intercepted data transmission from the lawful intercept node to at least one authorized entity.
-
Specification