Method and apparatus for securely transmitting lawfully intercepted VOIP data
First Claim
1. A method for transmitting intercepted VOIP data, the method comprising:
- receiving a plurality of requests to intercept distinct VOIP calls from a plurality of law enforcement agencies;
placing the plurality of requests for intercept in a queue;
assigning a priority to one or more of the plurality of requests for intercept in the queue based on a priority assigned to one of the requesting law enforcement agencies with respect to another of the requesting law enforcement agencies to determine a position of one or more requests for intercept in the queue;
intercepting a VOIP call corresponding to a highest priority request for intercept of the plurality of requests for intercept in the queue;
encrypting VOIP data associated with the intercepted VOIP call by using one of a virtual private network, an encryption using a key of a specific key length, bit stuffing, and an encryption specific to the law enforcement agency to form encrypted VOIP data; and
transmitting the encrypted VOIP data to the law enforcement agency over a virtual private network established over the internet between a transmitting component and the law enforcement agency.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus, and computer usable program product for transmitting intercepted VOIP data are provided in the illustrative embodiments. A VOIP call is intercepted in response to a lawful request for intercept by a law enforcement agency. VOIP data associated with the intercepted VOIP call is encrypted. The encryption may use a virtual private network an encryption using a key of a specific length, bit stuffing, or other encryption methods. The encrypted VOIP data is transmitted to the law enforcement agency using a public data network either during the VOIP call or after the VOIP call. The intercept request may be made during the VOIP call, or before the VOIP call. Furthermore, the VOIP data of the VOIP call may be stored before transmitting to the law enforcement agency, and archived based on archiving rules. The request for the intercept may be queued for processing according to queuing rules. Notifications based on the request for intercept, VOIP call characteristics, or characteristics of the VOIP data may be sent to one or more law enforcement agencies, and may also be encrypted.
-
Citations
36 Claims
-
1. A method for transmitting intercepted VOIP data, the method comprising:
-
receiving a plurality of requests to intercept distinct VOIP calls from a plurality of law enforcement agencies; placing the plurality of requests for intercept in a queue; assigning a priority to one or more of the plurality of requests for intercept in the queue based on a priority assigned to one of the requesting law enforcement agencies with respect to another of the requesting law enforcement agencies to determine a position of one or more requests for intercept in the queue; intercepting a VOIP call corresponding to a highest priority request for intercept of the plurality of requests for intercept in the queue; encrypting VOIP data associated with the intercepted VOIP call by using one of a virtual private network, an encryption using a key of a specific key length, bit stuffing, and an encryption specific to the law enforcement agency to form encrypted VOIP data; and transmitting the encrypted VOIP data to the law enforcement agency over a virtual private network established over the internet between a transmitting component and the law enforcement agency. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer usable program product in a non-transitory computer readable medium storing computer executable instructions for transmitting intercepted VOIP data that, when executed, cause a data processing system to:
-
receive a plurality of requests to intercept distinct VOIP calls from a plurality of law enforcement agencies; place the plurality of requests for intercept in a queue; assign a priority to one or more of the plurality of requests for intercept in the queue based on a priority assigned to one of the law enforcement agencies with respect to another of the law enforcement agencies to determine a position of one or more requests for intercept in the queue; intercept a VOIP call corresponding to a highest priority request for intercept of the plurality of requests for intercept in the queue; encrypt VOIP data associated with the intercepted VOIP call by using one of a virtual private network, an encryption using a key of a specific key length, bit stuffing, and an encryption specific to the law enforcement agency to form encrypted VOIP data; and transmit the encrypted VOIP data to the law enforcement agency over a virtual private network established over the internet between a transmitting component and the law enforcement agency. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system for transmitting intercepted VOIP data, the system comprising:
-
a VOIP system comprising queuing logic to; receive a plurality of requests to intercept distinct VOIP calls from a plurality of law enforcement agencies; place the plurality of requests for intercept in a queue; assign a priority to one or more of the plurality of requests for intercept in the queue based a priority assigned to one of the law enforcement agencies with respect to another of the law enforcement agencies to determine a position of one or more requests for intercept in the queue; an intercept handling component configured to intercept a VOIP call corresponding to a highest priority request for intercept of the plurality of requests for intercept in the queue; an encryption component configured to encrypt VOIP data associated with the intercepted VOIP call by using one of a virtual private network, an encryption using a key of a specific key length, bit stuffing, and an encryption specific to the law enforcement agency, to form encrypted VOIP data; and a transmitting component configured to transmit the encrypted VOIP data to the law enforcement agency over a virtual private network established over the internet between the transmitting component and the law enforcement agency. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification