Verifying a lawful interception system
First Claim
1. A method for verifying a lawful interception system, comprising:
- generating, at a computer, data traffic by performing multiple ping requests on an Internet Protocol address and receiving a corresponding echo reply in response to performing each of the multiple ping requests;
recording, at the computer, the data traffic as the computer generates the data traffic;
upon recording the data traffic at the computer, saving, at the computer, the data traffic as a first packet capture and flat file export file, the first packet capture and flat file export file comprising a first source Internet Protocol address of a source computer from which each data frame in the data traffic originates, a first destination Internet protocol address of a destination computer to which the each data frame is transmitted, first protocol information regarding the each data frame, and a first timestamp identifying when the each data frame was recorded;
generating, at the computer, a first export summary file comprising first packet summary lines from the first packet capture and flat file export file;
transmitting, from the computer to a verification system, the first export summary file;
transmitting a copy of the data traffic from the computer to a remote network via a broadband remote access server;
upon transmitting the copy of the data traffic from the computer to the remote network via the broadband access server, intercepting, via a probe, the copy of the data traffic as the copy of the data traffic egresses from a mediation system to a law enforcement agency system;
upon intercepting the copy of the data traffic as the data traffic egresses from the mediation system to the law enforcement agency system, saving, at the law enforcement agency system, the copy of the data traffic as a second packet capture and flat file export file, the second packet capture and flat file export file comprising a second source Internet Protocol address of the source computer from which the each data frame in the data traffic originates, a second destination Internet protocol address of the destination computer to which the each data frame is transmitted, second protocol information regarding the each data frame, and a second timestamp identifying when the each data frame was recorded;
generating, at the law enforcement agency system, a second export summary file comprising second packet summary lines from the second packet capture and flat file export file;
transmitting, from the LEA system to the verification system, the second export summary file; and
comparing, at the verification system, the first export summary file with the second export summary file to verify an accuracy of the mediation system.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable media provide for verifying a lawful interception system. A first file and a second file are received. The first file is formed by recording data traffic at a computer as the data traffic generated at the computer is transmitted from the computer to a remote network via a broadband remote access server (BRAS), saving the recorded data traffic as a first packet capture and flat file export (PCAP) file, and exporting packet summary lines from the first PCAP file. The second file is formed by intercepting the data traffic as the data traffic egresses from a mediation system to a law enforcement agency (LEA) system, saving the intercepted data traffic as a second PCAP file, and exporting packet summary lines from the second PCAP file. The first file is compared with the second file to verify an accuracy of the mediation system.
-
Citations
12 Claims
-
1. A method for verifying a lawful interception system, comprising:
-
generating, at a computer, data traffic by performing multiple ping requests on an Internet Protocol address and receiving a corresponding echo reply in response to performing each of the multiple ping requests; recording, at the computer, the data traffic as the computer generates the data traffic; upon recording the data traffic at the computer, saving, at the computer, the data traffic as a first packet capture and flat file export file, the first packet capture and flat file export file comprising a first source Internet Protocol address of a source computer from which each data frame in the data traffic originates, a first destination Internet protocol address of a destination computer to which the each data frame is transmitted, first protocol information regarding the each data frame, and a first timestamp identifying when the each data frame was recorded; generating, at the computer, a first export summary file comprising first packet summary lines from the first packet capture and flat file export file; transmitting, from the computer to a verification system, the first export summary file; transmitting a copy of the data traffic from the computer to a remote network via a broadband remote access server; upon transmitting the copy of the data traffic from the computer to the remote network via the broadband access server, intercepting, via a probe, the copy of the data traffic as the copy of the data traffic egresses from a mediation system to a law enforcement agency system; upon intercepting the copy of the data traffic as the data traffic egresses from the mediation system to the law enforcement agency system, saving, at the law enforcement agency system, the copy of the data traffic as a second packet capture and flat file export file, the second packet capture and flat file export file comprising a second source Internet Protocol address of the source computer from which the each data frame in the data traffic originates, a second destination Internet protocol address of the destination computer to which the each data frame is transmitted, second protocol information regarding the each data frame, and a second timestamp identifying when the each data frame was recorded; generating, at the law enforcement agency system, a second export summary file comprising second packet summary lines from the second packet capture and flat file export file; transmitting, from the LEA system to the verification system, the second export summary file; and comparing, at the verification system, the first export summary file with the second export summary file to verify an accuracy of the mediation system. - View Dependent Claims (2, 3, 4)
-
-
5. A system for verifying a lawful interception system, comprising:
-
a computer having a processor and a memory, the computer configured to; generate data traffic by performing multiple ping requests on an Internet Protocol address and receiving a corresponding echo reply in response to performing each of the multiple ping requests, recording the data traffic as the computer generates the data traffic, upon recording the data traffic at the computer, saving the data traffic as a first packet capture and flat file export file, the first packet capture and flat file export file comprising a first source Internet Protocol address of the source computer from which the each data frame in the data traffic originates, a first destination Internet protocol address of the destination computer to which the each data frame is transmitted, first protocol information regarding the each data frame, and a first timestamp identifying when the each data frame was recorded, generate a first export summary file comprising first packet summary lines from the first packet capture and flat file export file, transmit, to a verification system, the first export summary file, and transmitting a copy of the data traffic to a remote network via a broadband remote access server; a probe configured to intercept the copy of the data traffic as the copy of the data traffic egresses from a mediation system to a law enforcement agency system; the law enforcement agency system configured to; receive the copy of the data traffic intercepted by the probe; save the copy of the data traffic as a second packet capture and flat file export file, the second packet capture and flat file export file comprising a second source Internet Protocol address of a source computer from which each data frame in the data traffic originates, a second destination Internet protocol address of a destination computer to which the each data frame is transmitted, second protocol information regarding the each data frame, and a second timestamp identifying when the each data frame was recorded, generate a second export summary file comprising second packet summary lines from the second packet capture and flat file export file, and transmit, to the verification system, the second export summary file; and the verification system configured to compare the first export summary file with the second export summary file to verify an accuracy of the mediation system. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory computer-readable medium having instructions stored thereon for execution by a processor to provide a method for verifying a lawful interception system, the method comprising:
-
generating, at a computer, data traffic by performing multiple ping requests on an Internet Protocol address and receiving a corresponding echo reply in response to performing each of the multiple ping requests; recording, at the computer, the data traffic as the computer generates the data traffic; upon recording the data traffic at the computer, saving, at the computer, the data traffic as a first packet capture and flat file export file, the first packet capture and flat file export file comprising a first source Internet Protocol address of the source computer from which the each data frame in the data traffic originates, a first destination Internet protocol address of the destination computer to which the each data frame is transmitted, first protocol information regarding the each data frame, and a first timestamp identifying when the each data frame was recorded; generating, at the computer, a first export summary file comprising first packet summary lines from the first packet capture and flat file export file; transmitting, from the computer to a verification system, the first export summary file; transmitting a copy of the data traffic from the computer to a remote network via a broadband remote access server; upon transmitting the copy of the data traffic from the computer to the remote network via the broadband access server, intercepting, via a probe, the copy of the data traffic as the copy of the data traffic egresses from a mediation system to a law enforcement agency system; upon intercepting the copy of the data traffic as the data traffic egresses from the mediation system to the law enforcement agency system, saving, at the law enforcement agency system, the copy of the data traffic as a second packet capture and flat file export file, the second packet capture and flat file export file comprising a second source Internet Protocol address of a source computer from which each data frame in the data traffic originates, a second destination Internet protocol address of a destination computer to which the each data frame is transmitted, second protocol information regarding the each data frame, and a second timestamp identifying when the each data frame was recorded; generating, at the law enforcement agency system, a second export summary file comprising second packet summary lines from the second packet capture and flat file export file; transmitting, from the LEA system to the verification system, the second export summary file; and comparing, at the verification system, the first export summary file with the second export summary file to verify an accuracy of the mediation system. - View Dependent Claims (10, 11, 12)
-
Specification