IP Traffic Redirection for Purposes of Lawful Intercept
First Claim
1. A computer-implemented method for redirecting traffic associated with a target entity for a purpose of lawful intercept, the method comprising:
- receiving a request to monitor data packets associated with a target entity for the purpose of lawful intercept;
adding the target entity to a lawful intercept list, the lawful intercept list including one or more target entities;
receiving, from the target entity, a request to communicate;
upon receiving the request to communicate, determining whether the target entity is on the lawful intercept list;
upon determining that the target entity is on the lawful intercept list, assigning the target entity a lawful intercept Internet Protocol (IP) address from a range of lawful intercept IP addresses, each lawful intercept IP address having a corresponding routing policy for routing data packets associated with the corresponding lawful intercept IP address to a lawful intercept capture system;
receiving a data packet;
identifying an origination IP address or destination IP address associated with the data packet;
determining whether the origination IP address or the destination IP address is in the range of lawful intercept IP addresses; and
upon determining that the origination IP address or the destination IP address is in the range of lawful intercept IP addresses, redirecting the data packet to the lawful intercept capture system based on the routing policy of the lawful intercept IP address.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies for redirecting traffic associated with a target entity for purposes of lawful intercept are presented herein. According to one aspect, a request to monitor data packets associated with a target entity for purposes of lawful intercept is received. Once the request is received, the target entity is added to a lawful intercept list and assigned a lawful intercept IP address from a range of lawful intercept IP addresses. Each lawful intercept IP address may have a corresponding routing policy for routing data packets associated with the corresponding lawful intercept IP address to a lawful intercept capture system. The data packet is then routed to the lawful intercept capture system based on the routing policy of the lawful intercept IP address. The lawful intercept capture system captures the data packet and forwards the data packet to a next hop network entity associated with the data packet.
42 Citations
20 Claims
-
1. A computer-implemented method for redirecting traffic associated with a target entity for a purpose of lawful intercept, the method comprising:
-
receiving a request to monitor data packets associated with a target entity for the purpose of lawful intercept; adding the target entity to a lawful intercept list, the lawful intercept list including one or more target entities; receiving, from the target entity, a request to communicate; upon receiving the request to communicate, determining whether the target entity is on the lawful intercept list; upon determining that the target entity is on the lawful intercept list, assigning the target entity a lawful intercept Internet Protocol (IP) address from a range of lawful intercept IP addresses, each lawful intercept IP address having a corresponding routing policy for routing data packets associated with the corresponding lawful intercept IP address to a lawful intercept capture system; receiving a data packet; identifying an origination IP address or destination IP address associated with the data packet; determining whether the origination IP address or the destination IP address is in the range of lawful intercept IP addresses; and upon determining that the origination IP address or the destination IP address is in the range of lawful intercept IP addresses, redirecting the data packet to the lawful intercept capture system based on the routing policy of the lawful intercept IP address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for redirecting traffic associated with a target entity for purposes of lawful intercept, comprising:
-
a memory for storing a firmware configured to redirect traffic associated with a target entity for purposes of lawful intercept; and a processor functionally coupled to the memory, the processor being responsive to computer-executable instructions contained in the firmware and configured to receive a request to monitor data packets associated with a target entity for the purpose of lawful intercept, add the target entity to a lawful intercept list, the lawful intercept list including one or more target entities, receiving, from the target entity, a request to communicate, upon receiving the request to communicate, determine whether the target entity with which the data packet is associated is on the lawful intercept list, upon determining that the target entity with which the data packet is associated is on the lawful intercept list, assign the target entity a lawful intercept IP address from a range of lawful intercept IP addresses, each lawful intercept IP address having a corresponding routing policy for routing data packets associated with the corresponding lawful intercept IP address to a lawful intercept capture entity, receive a data packet, identify an origination IP address or destination IP address associated with the data packet; determine whether the origination IP address or the destination IP address is in the range of lawful intercept IP addresses; and upon determining that the origination IP address or the destination IP address is in the range of lawful intercept IP addresses, redirect the data packet to the lawful intercept capture entity based on the routing policy of the lawful intercept IP address. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable medium, having computer-executable instructions stored thereon that when executed by a computer, causes the computer to:
-
receive a request to monitor data packets associated with a target entity for the purpose of lawful intercept; add the target entity to a lawful intercept list, the lawful intercept list including one or more target entities; receiving, from the target entity, a request to communicate; upon receiving the request to communicate, determine whether the target entity with which the data packet is associated is on the lawful intercept list; upon determining that the target entity with which the data packet is associated is on the lawful intercept list, assign the target entity a lawful intercept IP address from a range of lawful intercept IP addresses, each lawful intercept IP address having a corresponding routing policy for routing data packets associated with the corresponding lawful intercept IP address to a lawful intercept capture system; receive a data packet; identify an origination IP address or destination IP address associated with the data packet; determine whether the origination IP address or the destination IP address is in the range of lawful intercept IP addresses; and upon determining that the origination IP address or the destination IP address is in the range of lawful intercept IP addresses, redirect the data packet to the lawful intercept capture system based on the routing policy of the lawful intercept IP address. - View Dependent Claims (17, 18, 19, 20)
-
Specification