IP traffic redirection for purposes of lawful intercept
First Claim
1. A method comprising:
- receiving, at a network router that stores a lawful intercept routing table, an instruction to monitor data packets associated with a target entity for a purpose of lawful intercept;
adding, by the network router, the target entity to a lawful intercept list;
assigning, by the network router, a lawful intercept internet protocol (IP) address from a range of lawful intercept IP addresses to the target entity added to the lawful intercept list, the lawful intercept IP address having a corresponding routing policy for routing data packets associated with the lawful intercept IP address to a lawful intercept capture system;
upon receiving a data packet, identifying, by the network router, an origination IP address associated with the data packet and a destination IP address associated with the data packet;
determining, by the network router, if one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses, wherein determining if the one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses comprises performing a look-up operation by searching the lawful intercept list for the origination IP address and the destination IP address;
if a determination is made that one of the the origination IP address and the destination IP address is in the range of lawful intercept IP addresses, redirecting, by the network router, the data packet to the lawful intercept capture system based on the corresponding routing policy;
receiving, at the network router, a request to stop monitoring the data packets associated with the target entity for the purpose of lawful intercept; and
removing, by the network router, the target entity from the lawful intercept list.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies for redirecting traffic associated with a target entity for purposes of lawful intercept are presented herein. According to one aspect, a request to monitor data packets associated with a target entity for purposes of lawful intercept is received. Once the request is received, the target entity is added to a lawful intercept list and assigned a lawful intercept IP address from a range of lawful intercept IP addresses. Each lawful intercept IP address may have a corresponding routing policy for routing data packets associated with the corresponding lawful intercept IP address to a lawful intercept capture system. The data packet is then routed to the lawful intercept capture system based on the routing policy of the lawful intercept IP address. The lawful intercept capture system captures the data packet and forwards the data packet to a next hop network entity associated with the data packet.
27 Citations
17 Claims
-
1. A method comprising:
-
receiving, at a network router that stores a lawful intercept routing table, an instruction to monitor data packets associated with a target entity for a purpose of lawful intercept; adding, by the network router, the target entity to a lawful intercept list; assigning, by the network router, a lawful intercept internet protocol (IP) address from a range of lawful intercept IP addresses to the target entity added to the lawful intercept list, the lawful intercept IP address having a corresponding routing policy for routing data packets associated with the lawful intercept IP address to a lawful intercept capture system; upon receiving a data packet, identifying, by the network router, an origination IP address associated with the data packet and a destination IP address associated with the data packet; determining, by the network router, if one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses, wherein determining if the one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses comprises performing a look-up operation by searching the lawful intercept list for the origination IP address and the destination IP address; if a determination is made that one of the the origination IP address and the destination IP address is in the range of lawful intercept IP addresses, redirecting, by the network router, the data packet to the lawful intercept capture system based on the corresponding routing policy; receiving, at the network router, a request to stop monitoring the data packets associated with the target entity for the purpose of lawful intercept; and removing, by the network router, the target entity from the lawful intercept list. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a processor; and a memory that stores instructions that, when executed by the processor, cause the processor to perform operations comprising receiving an instruction to monitor data packets associated with a target entity for a purpose of lawful intercept, adding the target entity to a lawful intercept list, assigning a lawful intercept internet protocol (IP) address from a range of lawful intercept IP addresses to the target entity added to the lawful intercept list, the lawful intercept IP address having a corresponding routing policy for routing data packets associated with the lawful intercept IP address to a lawful intercept capture system, upon receiving a data packet, identifying an origination IP address associated with the data packet and a destination IP address associated with the data packet, determining if one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses, wherein determining if the one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses comprises performing a look-up operation by searching the lawful intercept list for the origination IP address and the destination IP address, if a determination is made that the one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses, redirecting the data packet to the lawful intercept capture system based on the corresponding routing policy, receiving a request to stop monitoring the data packets associated with the target entity for the purpose of lawful intercept, and removing the target entity from the lawful intercept list. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium, having instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving an instruction to monitor data packets associated with a target entity for the purpose of lawful intercept; adding the target entity to a lawful intercept list; assigning the target entity a lawful intercept internet protocol (IP) address from a range of lawful intercept IP addresses to the target entity added to the lawful intercept list, the lawful intercept IP address having a corresponding routing policy for routing data packets associated with the lawful intercept IP address to a lawful intercept capture system; upon receiving a data packet, identifying an origination IP address associated with the data packet and a destination IP address associated with the data packet; determining if one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses, wherein determining if the one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses comprises performing a look-up operation by searching the lawful intercept list for the origination IP address and the destination IP address; if a determination is made that the one of the origination IP address and the destination IP address is in the range of lawful intercept IP addresses, redirecting the data packet to the lawful intercept capture system based on the corresponding routing policy of the lawful intercept IP address; receiving a request to stop monitoring the data packets associated with the target entity for the purpose of lawful intercept; and removing the target entity from the lawful intercept list. - View Dependent Claims (15, 16, 17)
-
Specification