Providing and accessing data in a standard-compliant manner
First Claim
1. A system, comprising:
- one or more memory units; and
one or more processing units operable to;
access instantiation request data for establishing, from a plurality of computing resources available for use by a plurality of entities, a subset of the plurality of computing resources to be designated for use by a first entity in association with processing and storing intercepted communication data associated with the first entity in a manner compliant with a standard, wherein the standard provides a framework for providing the intercepted communication data to a second entity, the instantiation request data specifying the standard;
determine configuration data according to the accessed instantiation request data, the configuration data for configuring the subset of the plurality of computing resources designated for use by the first entity to implement functionality for complying with the standard;
configure the subset of the plurality of computing resources designated for use by the first entity according to the determined configuration data;
receive intercepted communication data associated with the first entity at the subset of the plurality of computing resources, wherein the intercepted communication data is intercepted by the first entity from a communication session and the instantiation request data specifies a type of the communication session;
convert the intercepted communication data from a first format to a second format via the subset of the plurality of computing resources, wherein the second format is compliant with the standard;
store, in the one or more memory units, the intercepted communication data in the second format, wherein the one or more memory units are part of the subset of the plurality of computing resources designated for use by the first entity;
store, in one or more memory units, audit data providing a record of a chain of custody of the intercepted communication data, the audit data associated with a conversion of the intercepted communication data from the first format to the second format; and
provide access to a portion of the stored intercepted communication data in the second format to the second entity, the second entity comprising an entity authorized to access the intercepted communication data.
1 Assignment
0 Petitions
Accused Products
Abstract
In certain embodiments, a computer-implemented method includes receiving intercepted data associated with a first entity. The intercepted data may be intercepted in response to a request for information from a second entity. The method may include converting the intercepted data from a first format to a second format, the second format compliant with a standard for providing intercepted data to the second entity. The method may include storing, in one or more memory units, the intercepted communication data in the second format. The one or more memory units may be part of a subset of a plurality of computing resources designated for use by the first entity. The method may include storing audit data providing a record of a chain of custody of the intercepted communication data. The method may include providing access to a portion of the stored intercepted communication data in the second format to the second entity.
-
Citations
31 Claims
-
1. A system, comprising:
-
one or more memory units; and one or more processing units operable to; access instantiation request data for establishing, from a plurality of computing resources available for use by a plurality of entities, a subset of the plurality of computing resources to be designated for use by a first entity in association with processing and storing intercepted communication data associated with the first entity in a manner compliant with a standard, wherein the standard provides a framework for providing the intercepted communication data to a second entity, the instantiation request data specifying the standard; determine configuration data according to the accessed instantiation request data, the configuration data for configuring the subset of the plurality of computing resources designated for use by the first entity to implement functionality for complying with the standard; configure the subset of the plurality of computing resources designated for use by the first entity according to the determined configuration data; receive intercepted communication data associated with the first entity at the subset of the plurality of computing resources, wherein the intercepted communication data is intercepted by the first entity from a communication session and the instantiation request data specifies a type of the communication session; convert the intercepted communication data from a first format to a second format via the subset of the plurality of computing resources, wherein the second format is compliant with the standard; store, in the one or more memory units, the intercepted communication data in the second format, wherein the one or more memory units are part of the subset of the plurality of computing resources designated for use by the first entity; store, in one or more memory units, audit data providing a record of a chain of custody of the intercepted communication data, the audit data associated with a conversion of the intercepted communication data from the first format to the second format; and provide access to a portion of the stored intercepted communication data in the second format to the second entity, the second entity comprising an entity authorized to access the intercepted communication data. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer-readable medium comprising logic, the logic when executed by one or more processing units operable to perform operations comprising:
-
accessing instantiation request data for establishing, from a plurality of computing resources available for use by a plurality of entities, a subset of the plurality of computing resources to be designated for use by a first entity in association with processing and storing intercepted communication data associated with the first entity in a manner compliant with a standard, wherein the standard provides a framework for providing the intercepted communication data to a second entity, the instantiation request data specifying the standard; determining configuration data according to the accessed instantiation request data, the configuration data for configuring the subset of the plurality of computing resources designated for use by the first entity to implement functionality for complying with the standard; configuring the subset of the plurality of computing resources designated for use by the first entity according to the determined configuration data; receiving intercepted communication data associated with the first entity at the subset of the plurality of computing resources, wherein the intercepted communication data is intercepted by the first entity from a communication session and the instantiation request data specifies a type of the communication session; converting the intercepted communication data from a first format to a second format via the subset of the plurality of computing resources, wherein the second format is compliant with the standard; storing, in one or more memory units, the intercepted communication data in the second format, wherein the one or more memory units are part of the subset of the plurality of computing resources designated for use by the first entity; storing, in one or more memory units, audit data providing a record of a chain of custody of the intercepted communication data, the audit data associated with the conversion of the intercepted communication data from the first format to the second format; and providing access to a portion of the stored intercepted communication data in the second format to the second entity, the second entity comprising an entity authorized to access the intercepted communication data. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
accessing instantiation request data for establishing, from a plurality of computing resources available for use by a plurality of entities, a subset of the plurality of computing resources to be designated for use by a first entity in association with processing and storing intercepted communication data associated with the first entity in a manner compliant with a standard, wherein the standard provides a framework for providing the intercepted communication data to a second entity, the instantiation request data specifying the standard; determining configuration data according to the accessed instantiation request data, the configuration data for configuring the subset of the plurality of computing resources designated for use by the first entity to implement functionality for complying with the standard; configuring the subset of the plurality of computing resources designated for use by the first entity according to the determined configuration data; receiving intercepted communication data associated with the first entity at the subset of the plurality of computing resources, wherein the intercepted data is intercepted by the first entity from a communication session and the instantiation request data specifies a type of the communication session; converting the intercepted communication data from a first format to a second format via the subset of the plurality of computing resources, wherein the second format is compliant with the standard; storing, in one or more memory units, the intercepted communication data in the second format, wherein the one or more memory units are part of the subset of the plurality of computing resources designated for use by the first entity; storing, in one or more memory units audit data providing a record of a chain of custody of the intercepted communication data, the audit data associated with the conversion of the intercepted communication data from the first format to the second format; and providing access to a portion of the stored intercepted communication data in the second format to the second entity, the second entity comprising an entity authorized to access the intercepted communication data. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification