Data Retention and Lawful Intercept for IP Services
First Claim
1. A method for providing a Law Enforcement Agency LEA with retention or interception data related to a target user, comprising the steps of, at a data retention source node or at an interception control element of a telecommunications network:
- inspecting traffic packets involving the target user;
generating a plurality of usage data records based on the inspected traffic packets, each record comprising information relating to a certain service class and to a respective communications stack layer;
for each communications session involving a plurality of different communications stack layers, providing said plurality of usage data records with a same correlation identity number for correlating the data at said different communications stack layers;
sending said usage data records comprising the correlation identity number to the LEA.
1 Assignment
0 Petitions
Accused Products
Abstract
The method provides a Law Enforcement Agency LEA with retention or interception data related to a target user. At a data retention source node or at an interception control element of a telecommunications network, traffic packets involving the target user are inspected and a plurality of usage data records based on the inspected traffic packets are generated. Each record comprises information relating to a certain service class and to a respective communications stack layer. For each communications session involving a plurality of different communications stack layers, at the data retention source node or, respectively, the interception control element, the plurality of usage data records are provided with a same correlation identity number for correlating the data at the different communications stack layers. Then, the usage data records comprising the correlation identity number to the LEA are sent, for instance to the LI system or the data Retention System, respectively.
101 Citations
22 Claims
-
1. A method for providing a Law Enforcement Agency LEA with retention or interception data related to a target user, comprising the steps of, at a data retention source node or at an interception control element of a telecommunications network:
-
inspecting traffic packets involving the target user; generating a plurality of usage data records based on the inspected traffic packets, each record comprising information relating to a certain service class and to a respective communications stack layer; for each communications session involving a plurality of different communications stack layers, providing said plurality of usage data records with a same correlation identity number for correlating the data at said different communications stack layers; sending said usage data records comprising the correlation identity number to the LEA. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data retention source node comprising packet inspection means, characterized in that said node comprises means for communicating with a Data Retention system, and in that said packet inspection means are configured to generate a plurality of usage data records based on inspected traffic packets, each record comprising information relating to a certain service class and to a respective communications stack layer;
- said packet inspection means being further configured to, for each communications session involving a plurality of different communications stack layers, provide said plurality of usage data records with a same correlation identity number for correlating the data at said different communications stack layers;
said data retention source node comprising means for sending said usage data records comprising the correlation identity number to the Data Retention system. - View Dependent Claims (10, 11, 12, 13, 14, 15)
- said packet inspection means being further configured to, for each communications session involving a plurality of different communications stack layers, provide said plurality of usage data records with a same correlation identity number for correlating the data at said different communications stack layers;
-
16. An Intercepting Control Element ICE comprising packet inspection means for providing Intercept Related Information IRI and Content of Communication CC to a Lawful Interception LI system, characterized in that said packet inspection means are configured to generate a plurality of IRIs based on inspected traffic packets, each IRI comprising information relating to a certain service class and to a respective communications stack layer;
- said packet inspection means being further configured to, for each communications session involving a plurality of different communications stack layers, provide said plurality of IRIs with a same correlation identity number for correlating the data at said different communications stack layers;
said ICE comprising means for sending said IRIs comprising the correlation identity number to the LI system. - View Dependent Claims (17, 18, 19, 20, 21)
- said packet inspection means being further configured to, for each communications session involving a plurality of different communications stack layers, provide said plurality of IRIs with a same correlation identity number for correlating the data at said different communications stack layers;
-
22. A computer program loadable into a processor of a data retention source node or of an intercepting control element, wherein the computer program comprises code adapted to
a) inspect traffic packets involving the target user; -
b) generate a plurality of usage data records based on the inspected traffic packets, each record comprising information relating to a certain service class and to a respective communications stack layer; c) for each communications session involving a plurality of different communications stack layers, provide said plurality of usage data records with a same correlation identity number for correlating the data at said different communications stack layers; d) send said usage data records comprising the correlation identity number to a LEA.
-
Specification