Please download the dossier by clicking on the dossier button x
×

POLICY ROUTING-BASED LAWFUL INTERCEPTION IN COMMUNICATION SYSTEM WITH END-TO-END ENCRYPTION

  • US 20120287922A1
  • Filed: 08/18/2011
  • Published: 11/15/2012
  • Est. Priority Date: 05/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for intercepting encrypted communications exchanged between a first computing device and a second computing device in a communication network, wherein the interception is performed by a third computing device in the communication network, the method comprising:

  • the third computing device obtaining one or more packets having a packet address associated with one of the first computing device and the second computing device, wherein the one or more packets are obtained by the third computing device, in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the one or more obtained packets may be decrypted so as to obtain data contained therein;

    the third computing device preserving the packet address of the one or more obtained packets; and

    the third computing device forwarding the one or more packets toward a packet-destination one of the first computing device and the second computing device such that the packet-destination one of the first computing device and the second computing device is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×