Method for performing lawfully-authorized electronic surveillance
First Claim
Patent Images
1. A method for performing lawfully-authorized electronic surveillance, comprising:
- verifying, on a per-call basis, that a call associated with a first party is to be surveilled; and
multicasting packets associated with the call to a second party and to a surveillance receiver,wherein packets associated with the call are multicast by a network edge device connecting a trusted network to an untrusted network, at least one from the group of the first party and the second party being connected to the untrusted network.
4 Assignments
0 Petitions
Accused Products
Abstract
Lawfully-authorized electronic surveillance is performed. A call associated with a first party to be surveilled is verified, on a per-call basis. Packets associated with the call are multicast to a second party and to a surveillance receiver.
117 Citations
10 Claims
-
1. A method for performing lawfully-authorized electronic surveillance, comprising:
-
verifying, on a per-call basis, that a call associated with a first party is to be surveilled; and multicasting packets associated with the call to a second party and to a surveillance receiver, wherein packets associated with the call are multicast by a network edge device connecting a trusted network to an untrusted network, at least one from the group of the first party and the second party being connected to the untrusted network.
-
-
2. A method for performing lawfully-authorized electronic surveillance, comprising:
-
verifying, on a per-call basis, that a call associated with a first party is to be surveilled;
multicasting packets associated with the call to a second party and to a surveillance receiver, andsending a surveilling message to the surveillance receiver after said verifying for the call and before multicasting packets to the surveillance receiver, the surveilling message indicating an address of the first party and an address of the second party.
-
-
3. A method for performing lawfully-authorized electronic surveillance, comprising:
-
verifying, on a per-call basis, that a call associated with a first party is to be surveilled; and multicasting packets associated with the call to a second party and to a surveillance receiver; wherein verifying for the call is performed by a gate controller associated with a network edge device that connects a trusted network to an untrusted network, at least one from the group of the first party and the second party being associated with the untrusted network.
-
-
4. A method for performing lawfully-authorized electronic surveillance, comprising:
-
receiving a gate open message having an address of a surveillance receiver associated with a first party, the gate open message associated with one call between the first party and a second party; and multicasting packets associated with the one call to;
i) the surveillance receiver based on the surveillance receiver address, and ii) at least one from the group of the first party and the second party. - View Dependent Claims (5, 6, 7, 8)
-
-
9. A method for performing lawfully-authorized electronic surveillance, comprising:
-
sending, from a surveillance receiver, a request for surveillance of calls associated with a first party; receiving packets associated with a call between the first party and a second party the received packets being multicast from a network edge device to the second party and the surveillance party; and receiving a surveillance message before receiving the multicast packets from the network edge device; the surveillance message indicating an address associated with the first party and an address associated with the second party.
-
-
10. A method for performing lawfully-authorized electronic surveillance, comprising:
-
sending, from a surveillance receiver, a request for surveillance of calls associated with a first party; and receiving packets associated with a call between the first party and a second party, the received packets being multicast from a network edge device to the second party and the surveillance party; wherein the network edge device that multicast the received packets connects a trusted network to an untrusted network, at least one from the group of the first party and the second party being associated with the untrusted network.
-
Specification