Method and apparatus for intercepting events in a communication system

  • US 7,441,271 B2
  • Filed: 10/20/2005
  • Issued: 10/21/2008
  • Est. Priority Date: 10/20/2004
  • Status: Active Grant
  • ×
    • Pin Icon | RPX Insight
    • Pin
First Claim
Patent Images

1. A method for intercepting data, comprising:

  • receiving, at a management server, a connection from a remote client, the connection being initiated by the remote client and established outbound from the remote client;

    negotiating a point-to-point encryption scheme with a remote mobile device, the point-to-point encryption scheme negotiated between the management server and the mobile device;

    receiving, at the management server, a warrant identifier for a warrant authorizing a legal intercept;

    receiving, at the management server, a user identifier identifying an intercept target for the legal intercept associated with the warrant, the intercept target corresponding to the mobile device;

    automatically intercepting, at the management server, data received and/or sent by the intercept target identified by the user identifier, wherein the data is intercepted without altering operation of target services that operate on the mobile device;

    inspecting packets having the intercepted data to distinguish end-to-end encrypted channel information from other channel information that is encrypted according to the point-to-point encryption scheme negotiated with the mobile device;

    preserving encryption that is included on the end-to-end encrypted channel information when received while removing encryption that is included on at least a portion of the other channel information, said other channel information decrypted using a key obtained during the point-to-point encryption scheme negotiation; and

    transferring both the decrypted other channel information and the end-to-end channel information from the management server to a remote computer, wherein the management server encrypts at least one of the end-to-end channel information and the decrypted other channel information before said transferring.

View all claims
  • 4 Assignments
    ×
    ×

    Thank you for your feedback

    ×
    ×