Lawful intercept trigger support within service provider networks
First Claim
1. A method comprising:
- receiving a first mirroring configuration for a subscriber from a command line interface (CLI) of a network device;
receiving a second mirroring configuration for the subscriber from an authentication device connected to the network device; and
applying one of the first and second mirroring configurations to a subscriber session on the network device based on when the first and second mirroring configurations are received.
0 Assignments
0 Petitions
Accused Products
Abstract
The invention is directed to techniques for initiating lawful intercept of packets associated with subscriber sessions on a network device of a service provider network based on identification triggers. A law enforcement agency may send an intercept request for a subscriber to an administration device of the service provider network. The administration device may then configure one or more identification triggers for the subscriber based on the intercept request. The techniques described herein initiate lawful intercept when one or more subscriber sessions on a network device match the one or more identification triggers. The techniques described herein include configuring trigger rules that include identification triggers for subscribers on a network device via a command line interface (CLI) of the network device. In addition, the techniques described herein include configuring identification triggers in a subscriber profile on an authentication device connected to a network device.
32 Citations
15 Claims
-
1. A method comprising:
-
receiving a first mirroring configuration for a subscriber from a command line interface (CLI) of a network device; receiving a second mirroring configuration for the subscriber from an authentication device connected to the network device; and applying one of the first and second mirroring configurations to a subscriber session on the network device based on when the first and second mirroring configurations are received. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A network device comprising:
-
a command line interface (CLI) that receives a first mirroring configuration for a subscriber; an authentication module that receives a second mirroring configuration for the subscriber from an authentication device connected to the network device; and an intercept module that applies one of the first and second mirroring configurations to a subscriber session on the network device based on when the first and second mirroring configurations are received. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium comprising instructions causing a processor to:
-
receive a first mirroring configuration for a subscriber from a command line interface (CLI) of a network device; receive a second mirroring configuration for the subscriber from an authentication device connected to the network device; and apply one of the first and second mirroring configurations to a subscriber session on the network device based on when the first and second mirroring configurations are received. - View Dependent Claims (12, 13, 14, 15)
-
Specification