×

Verifying a lawful interception system

  • US 7,975,046 B2
  • Filed: 04/03/2008
  • Issued: 07/05/2011
  • Est. Priority Date: 04/03/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for verifying a lawful interception system, comprising:

  • generating, at a computer, data traffic by performing multiple ping requests on an Internet Protocol address and receiving a corresponding echo reply in response to performing each of the multiple ping requests;

    recording, at the computer, the data traffic as the computer generates the data traffic;

    upon recording the data traffic at the computer, saving, at the computer, the data traffic as a first packet capture and flat file export file, the first packet capture and flat file export file comprising a first source Internet Protocol address of a source computer from which each data frame in the data traffic originates, a first destination Internet protocol address of a destination computer to which the each data frame is transmitted, first protocol information regarding the each data frame, and a first timestamp identifying when the each data frame was recorded;

    generating, at the computer, a first export summary file comprising first packet summary lines from the first packet capture and flat file export file;

    transmitting, from the computer to a verification system, the first export summary file;

    transmitting a copy of the data traffic from the computer to a remote network via a broadband remote access server;

    upon transmitting the copy of the data traffic from the computer to the remote network via the broadband access server, intercepting, via a probe, the copy of the data traffic as the copy of the data traffic egresses from a mediation system to a law enforcement agency system;

    upon intercepting the copy of the data traffic as the data traffic egresses from the mediation system to the law enforcement agency system, saving, at the law enforcement agency system, the copy of the data traffic as a second packet capture and flat file export file, the second packet capture and flat file export file comprising a second source Internet Protocol address of the source computer from which the each data frame in the data traffic originates, a second destination Internet protocol address of the destination computer to which the each data frame is transmitted, second protocol information regarding the each data frame, and a second timestamp identifying when the each data frame was recorded;

    generating, at the law enforcement agency system, a second export summary file comprising second packet summary lines from the second packet capture and flat file export file;

    transmitting, from the LEA system to the verification system, the second export summary file; and

    comparing, at the verification system, the first export summary file with the second export summary file to verify an accuracy of the mediation system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×