WO2003047205A1 - A system for the unobtrusive interception of data transmissions - Google Patents
A system for the unobtrusive interception of data transmissions Download PDFInfo
- Publication number
- WO2003047205A1 WO2003047205A1 PCT/IE2001/000144 IE0100144W WO03047205A1 WO 2003047205 A1 WO2003047205 A1 WO 2003047205A1 IE 0100144 W IE0100144 W IE 0100144W WO 03047205 A1 WO03047205 A1 WO 03047205A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- network
- server
- target identifier
- communications
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/80—Arrangements enabling lawful interception [LI]
Definitions
- This invention relates to an interceptor system for the lawful interception of data communications in a communications network, the communications network comprising a plurality of user terminals, a point of presence (POP) server, a network access server (NAS) and a radius server, the communications network transmitting data having identifier data identifying at least the source and intended recipient of the transmitted data.
- POP point of presence
- NAS network access server
- Another disadvantage of the known systems is that several different architectures such as WAP, email and internet may be controlled by a single provider. This provider will have to supply a system to intercept data travelling on each network.
- an interceptor system for the lawful interception of data communications in a communications network comprising a plurality of user terminals, a Point of Presence (POP) server, a Network Access Server (NAS) and a radius server, the communications network transmitting data having identifier data identifying at least the source and intended recipient of the transmitted data, characterised in that the system further comprises:-
- a management system for the reception of a legal warrant containing target identifier data for interception of data transmitted, including the identifier data;
- Tl Traffic Interceptor
- a network filter stage having access to the most recent target identifier lists, the network filter stage having a receiver for the processing data and a comparator for comparing the identifier of the processing data with the target identifier data in the target identifier database;
- the Tl can be a Traffic Analyser Port (TAP) or layer 2 switch port which is spanned.
- TAP Traffic Analyser Port
- the advantage of having such a system is that the Tl, when for example a TAP, can intercept data in an unobtrusive manner. The data travelling through the TAP is duplicated. Due to the fact that data is not redirected to another point in the network, a delay is not introduced into the signal which could signal that the data was under surveillance. Furthermore, because the TAP has no transmission lines, it cannot be called by another entity and therefore is undetectable by a calling method. In addition to these, because the TAP is a passive entity, the TAP is not susceptible to Denial of Service (DOS) attack.
- DOS Denial of Service
- the entire system cannot be accessed via the network as data can only flow into the system from the network side and cannot flow out.
- the target data may be retrieved in an efficient manner and may be transmitted over a secure connection to the management system for storage and eventual onward transmission to a law enforcement agency.
- the network filtering stage implements Policy Based Routing (PBR) to filter unwanted data transmissions from the duplicated data set as unmatched data.
- PBR Policy Based Routing
- the network filtering stage is provided by a layer 3 switch.
- the switch may implement policy based routing in hardware. This further speeds up the filtration of the data as the filtering is now achieved in hardware rather than software. The cost in both time and monetary terms of software processing of the data is much reduced and the entire system becomes highly scaleable and much cheaper to assemble. Should the filtering demands of the system increase substantially, an additional switch may be added which would be far cheaper, for example, than installing further servers such as SUN servers.
- the means to transmit the data in a secure manner to the management system is provided by way of a fast ethernet Local Area Network (LAN).
- LAN Local Area Network
- the TAP may be additionally provided with a dedicated line for connection to the network filter stage. By having a fast ethernet line and dedicated lines, a highly secure system will be operated. Attack from outside is prevented.
- the system may retrieve a temporary IP address for the target should he contact a radius server. The IP address may then be added to the target identifier database and communications to and from that IP address may be traced. This will allow for a much more comprehensive system. Items may also be removed from the list thereby preventing clogging the list up with data that is no longer relevant.
- a WAP server and the TAP intercepts data from the WAP server in an unobtrusive manner.
- an SMTP server in which the TAP intercepts data from the SMTP server.
- a DHCP server and the TAP intercepts data to and from the DHCP server in an unobtrusive manner.
- the system may have target identified data comprising an IP address and the TAP intercepts data to and from that IP address in an unobtrusive manner.
- the system can be adapted to intercept a variety of different technologies and data formats and retrieve data from them.
- a system in which the service filter is provided with a protocol service filter for each protocol to be intercepted in the communications network. This will allow for one system to handle a multitude of different technologies and report them to a single point.
- the management system further comprises an Intercept Region Manager and Delivery Manager.
- This will reduce the workload of the Delivery Manager by providing Intercept Region Managers (IRMs) that can control the local network filter and service filters at a local level.
- IRMs Intercept Region Managers
- Certain networks may comprise several IRMs and the Delivery Manager can be used to control and synchronise the IRMs by keeping all the IRMs with the most up-to-date data.
- the Intercept Region Manager further comprises a Network Filter Manager and Service Filter Manager.
- the IRM may have these to control the several network filters and service filters under its control.
- the managers can keep their filters synchronised with the most up-to-date information.
- the Delivery Manager further comprises means to receive and process a warrant from an Law Enforcement Agency (LEA) as an active warrant, means to store the active warrants and assign a unique target ID to each warrant, storage means to store data pertaining to the Intercept Region Manager and means to establish a secure connection to a LEA and transmit matching data to the LEA.
- LSA Law Enforcement Agency
- the Delivery Manager may authenticate a warrant and associated target data before updating any databases.
- the Delivery Manager can also be concerned with obtaining secure transmissions of data which will not delay other functions of the system by keeping this feature separate.
- At the Delivery Manager there may be provided a billing means to calculated and bill out information that was retrieved for an LEA.
- a method of unobtrusive interception of data communications in a communications network comprising a plurality of user terminals, a POP server, a NAS server and a radius server, the method comprising the steps of receiving a warrant from a Law Enforcement Agency containing target identifier data; entering the target identifier data in a target identifier database and comparing the processing data with target identifier data in the target identifier database, characterised in that the method comprises the steps of:-
- This method will allow the data communications to be retrieved without the target being aware of any surveillance taking place. There is no trace of the data being duplicated and there is no way for the target entity to find out whether his transmissions are being monitored. Furthermore, it is a relatively simple and inexpensive method to implement.
- the method in another embodiment of the invention, includes the step of filtering according to policy based routing. This will enable the filtering to be done predominantly in hardware and avoid excessive processing requirements.
- the method includes the steps of passing data through a layer 3 switch. All the benefits of the layer 3 switch, including policy based routing, may be used by the method, thereby decreasing the processing requirements and decreasing the time taken for filtering the data.
- a method which includes the step of dynamically updating the target identifier database with data retrieved from the network.
- the system may add and delete information from its database as it becomes no longer relevant. Also, the most up-to-date information is sent to all IRMs so that they may monitor all forms of communication used by the target entity.
- the communications network further comprises a WAP server and the method includes the step of intercepting the data communications to and from a WAP server.
- the communications network further comprises a SMTP server and the method includes the step of intercepting the data communications to and from the SMTP server.
- the method may also include the steps of monitoring an IP address and intercepting data communications to and from that IP address.
- the communications network may further comprise a DHCP server and the method includes the step of intercepting the data communications to and from the DHCP server.
- the method includes the step of generating billing information according to the data downloaded to the management system. This will enable the ISP to recoup some of the costs in implementing one of these systems by billing the LEA for data obtained over its network.
- suitable GURs may be provided in a known manner. Detailed Description of the Invention
- Fig. 1 is a diagrammatic view of the system for the lawful interception of data according to the invention
- FIGs. 2 and 3 are flow diagrams of one way of carrying out the invention.
- Fig. 4 is an overview of service filters used in the invention.
- Fig. 1 there is illustrated the internet 1 and an access network 2, having dial up input devices 3 and permanent IP connection devices 4, all of which are fed through routers 5 and load balancers 6 to an internet service provider network (ISP) 7, either by wires or wireless connectors 8.
- ISP internet service provider network
- Traffic interceptors 9 are provided in this embodiment by traffic analyser ports (TAP) node which in turn feed through an interceptor system, indicated generally by the reference numeral 10, through dedicated lines 11.
- TEP traffic analyser ports
- the interceptor system 10 is illustrated as a lawful interception mediation device for IP (LMD-IP) connected to a lawful interception middleware (LAN) 12 and a lawful interception management system (LMS) 13.
- LMD-IP lawful interception mediation device for IP
- LAN lawful interception middleware
- LMS lawful interception management system
- the LMS 13 enables the set-up of maintenance of lawful interception ancillary services, while the LMW is the middleware product which includes message routing, queuing, formatting and protocol conversion which enables this LMW 12 to communicate with third party systems, for example, mediation devices.
- third party systems for example, mediation devices.
- the interceptor system 10 includes a management system 16, referred to sometimes as a management and delivery system, connected to a target identifier database 17 and is fed through an Intercept Region Manager (TRM) 18, a network filter stage, indicated generally by the reference numeral 20, which network filter stage 20 comprises a receiver filter 21 and service filters 22.
- TRM Intercept Region Manager
- a network filter stage indicated generally by the reference numeral 20
- LSA legal law enforcement agency
- customer warrants they may not necessarily always allow full interception.
- the type of interception the customer could require would have to be closely monitored and agreed under general legal data protection law in the particular jurisdiction.
- a customer might be able to have monitored and downloaded, all traffic to certain sites e.g. for suspected industrial espionage which could give rise to a court order following interception and delivery to a third party and not a LEA.
- step 104 traffic is received and then in step 105, it is duplicated.
- step 106 one set of the traffic is transmitted onwards seamlessly and the other set of the traffic in step 107 is transmitted to the system where the database is again consulted and in step 109, a match is queried and either there is no match, in which case, in step 110, the data is destroyed, or, if there is a match, then in step 111 , the data is processed and delivered to the law enforcement agency or customer, as required by the legal warrant.
- the lawful interception mediation device for IP enables ISPs to intercept IP traffic concerning targets for whom a valid warrant has been received from a Law Enforcement Agency (LEA).
- LEO Law Enforcement Agency
- the target's traffic is intercepted on the ISP's network based on its assigned IP address or on specific application level attribute values.
- the intercepted traffic content together with associated intercept related events are delivered to the Law Enforcement Monitoring Facility (LEMF). Obviously, these will vary from organisation to organisation.
- the LMD-IP comprises the following modules.
- the management system 16 or what is effectively delivery and management D8M 18 which is responsible for receiving the intercept warrant and forwarding the information to the Intercept Region Managers IRMS 18. Subsequently on reception of the resulting intercepted traffic it formats the data for delivery to the LEMF.
- the D&M is responsible for the delivery of the intercepted data to the monitoring facilities.
- the architecture allows for the deployment of distributed Delivery Agents throughout the network.
- Intercept Region Manager IRM 18, is located at each of the interception points on the network and ensures that the active Service and Network Filters at the local interception point are updated as targets are added and deleted. In addition as dynamic information pertaining to an active intercept is learnt the IRM ensures the appropriate Filters remain synchronised.
- the interaction between the IRM and the Service and Network Filters 21 and 22 is shown in Fig. 1
- An RPC based middleware component is provided to allow for the deployment of geographically dispersed interception nodes.
- Service Filter (SF) 22 reassembles the IP application data streams and applies filters based on the application layer protocols.
- the intercepted traffic is encrypted and forwarded to the management system 16 for onward delivery.
- the service filter implements filtering of IP data.
- Network Filter 22 filters traffic based on layer 3 and 4 protocol information.
- the packet's source and destination IP addresses and port numbers are compared against the defined filters and candidate traffic forwarded to dedicated service filters.
- the NF implements stateless filtering of datagrams. Traffic flows requiring IP reassembly, for example SMTP data, are forwarded to specific Service Filter nodes. All other traffic is load balanced by the network filter 21 to a logical grouping of service filter nodes.
- the network filter 21 's functionality is implemented in dedicated Commercial Off the Shelf (COTS) hardware using the policy based routing feature of COTS L3 switch/routers. Due to the high volumes of data only L3 switch/routers supporting hardware based implementation of access lists are deployed. The network filter 21 is not further discussed in this specification.
- COTS Commercial Off the Shelf
- the Traffic Interceptor (Tl) 9 duplicates the traffic on the ISP's networks and forwards it to the network filters 21.
- the Tl's 9 are dedicated hardware devices which may be realised using Traffic Analyser Ports (TAP) nodes or alternatively by spanning a Layer 2 switch's port.
- TTP Traffic Analyser Ports
- the Tl 9 ensures that traffic can only flow from the backbone to the network filter 21 and that no traffic flows from the network filter 21 to the backbone.
- Tl 9 is not further discussed in this specification as such hardware construction and functionality is well known.
- All communication between the IRM 18 and the Filters 20 is achieved using a physically isolated Fast Ethernet LAN thus ensuring only the IRM 18 can communicate with the Filters 20.
- the network filters 21 are physically isolated from the ISP's backbone, via the Traffic Interceptors 9, they are not detectable from the ISP's network.
- the traffic intercepted by the network filter 21 is forwarded on dedicated point-to-point links to the relevant service filter 22.
- the communication between the D&M 18 and IRM 18 may optionally be configured to use either a secure or non-secure transport connection based on the deployment topology
- the management system or DRM 16. provides the external interface to the LMD-IP. It allows for the activation of warrants and delivery of the intercepted data to the specified LEMF. On reception of a warrant, the management system 16 stores the warrant information within the database 17. If required, connections are established to the specified LEMF delivery points. Any information useful in identifying the target is forwarded to the IRMs 18 for onward propagation to the Service and Network Filters 21, 22.
- the identification information specified may include one of more of the following: the target's email address(es), user name, hardware address, MSISDN and permanent IP address, if available. Other suitable identifiers may be added.
- the management system or D8M 16 provides time synchronisation between the components modules and is comprised of various components detailed below.
- An Interception Management Controller handles all interaction with external users concerning the adding and deleting of validated warrants. Activation requests received from either the User Interface or LWM are recorded in the database 17 prior to onward propagation to the interception points. The received warrant will necessarily contain data relating to the target's identification together with delivery instructions. Only data pertaining to the identification of the target is forwarded to the Intercept Region Managers 18.
- the database 17 is a repository of all active warrants and acts as a central data store for other components of the system. New warrants received are stored and a unique target ID assigned to them prior to being forwarded to the Intercept Region Managers 18.
- a region manager store is provided and maintains data concerning all Intercept Region Managers 18 under the control of this management system 16. Information regarding the connectivity to each of the IRMs 18 is stored together with details of the current status of the particular interception nodes.
- a Delivery Point Directory is provided and is responsible for the establishment and maintenance of secure connections to the Law Enforcement Monitoring Facility.
- the establishment of secure communications requires both server and client side authentication.
- a delivery agent module receives the data from the interception nodes.
- the data consists of intercepted related events, IRI, together with the intercepted content (CC).
- the Delivery Agent is responsible for formatting the data for delivery to the LEMF.
- the module receives management information form the interception nodes, i.e. traffic interceptors 9, which it forwards to the Region Manager Store. In addition management information is generated to enable subsequent billing for the interception service.
- management information form the interception nodes, i.e. traffic interceptors 9, which it forwards to the Region Manager Store.
- management information is generated to enable subsequent billing for the interception service.
- the Intercept Region Manager 18 is responsible for the local management of the interception points on the network.
- each interception node is comprised of a number of service filters 22 and network filters 21 together with components required for the management of these entities.
- the IRM 18 consists of a Service Filter Manager and a Network Filter Manager.
- the Service Filter Manager function of the IRM 18 is responsible for managing the communications with the Service Filters 22. It ensures that all target identification data specified in the received warrant is propagated to all Service Filters 22. As the set of identification information changes during the lifetime of a warrant, such as a dynamically assigned IP address, the Service Filter Manager ensures all SFs under its control remain synchronised.
- the Service Filter Manager is the point of delivery for all data originating at the service filters 22.
- the data received from the service filter 22 includes:
- Keep-alive messages On failure to receive a keep-alive message from a particular service filter 22 within the allotted time the Service Filter Manager forwards an alarm to the management system D8M 16.
- Network events to be delivered to the LEMF are forwarded to the Delivery Agent located at the management system D8M 16.
- Delivery Agent located at the management system D8M 16.
- these events may result in updates being forwarded to a Network Filter
- the Service Filter Manager handles the synchronisation of time between all the filters 20.
- the Network Filter Manager module manages the dedicated network filter 21 hardware.
- Network filtering is based on the use of the Policy Based Routing, PBR, features of L3 switch routers.
- PBR Policy Based Routing
- This feature allows the filtering of traffic streams of interest thus greatly reducing the volume of traffic to be processed by the service filters.
- the following is an example of the streams typically of interest:
- the Network Filter Manager allows the dynamic configuration of filters as targets are added and removed and IP addresses assigned and unassigned to these targets.
- the Network Filter Manager is comprised of two components.
- the device independent component presents a view of the configured system while at the same time abstracting the device specific details. This component permits the initialisation and status monitoring of the device together with allowing the adding, deleting and viewing of the configured filters.
- the device dependent component maps the device neutral view of the system configuration to the particular L3 device. This clean separation between the two components provides a flexible approach in allowing for the deployment of different vendor devices as dictated by the customer's network topology.
- the Network Filter Manager When supported by the device the Network Filter Manager supports the configuration of load balancing across multiple ports to the relevant service filter 22.
- the service filtering sub-system of service filters is responsible for filtering on application level data streams and determining if the traffic is to be intercepted.
- the service filter 22 is a software component that comprises one or more service filter functions together with supporting functionality. A service filter function is provided for each protocol to be filtered. On detecting data to be intercepted the service filter 22 formats the data as required for delivery to the LEA. The physical delivery of the data to the LEMF is the responsibility of the management system D8M 16. An overview of the service filter functionality is shown in Fig 4
- Service Filter platforms can be deployed as dictated by the volume of data to be intercepted.
- the co-ordination between the deployed service filters 22 is the responsibility of the Sen/ice Filter Manager.
- the Service Filter 22 module is comprised of a number of components, including, an IP re-assembly module, filter module, a Local Delivery Manager and Local Manager protocol service filters.
- the IP Re-assembly module receives the incoming IP datagrams and builds up the TCP/UDP data streams. Users of the service register with the module by specifying what application protocol streams are of interest. An application data stream is specified via the following parameters:
- the protocol type together with the source and destination port are compared against the list of registered users and if a match occurs the IP datagram is reassembled in an IP reassembly module.
- the reconstructed application protocol data of the specified type is then forwarded to that registered user. All other datagrams are forwarded unassembled to a default service level filter.
- the default service filter handles raw IP datagrams and is not concerned with the application data stream.
- the information passed to the service user includes the source and destination IP Addresses and port numbers together with the received application data stream. All non-IP traffic received is discarded by the module.
- the module is implement over a libpcap interface (see Fig. 4).
- the libpcap provides a system independent interface to enable portability between different operating systems.
- This filter module maintains the list of active targets.
- the target identifier information is maintained is such a manner as to allow fast matching of targets based on the specified selection criteria.
- the module includes the matching of targets based on email address, IP address, user name, MSISDN and hardware address. On the matching of an entry in the active target list the corresponding target-ID is returned. The module also provides an indication as to whether a specified address is internal or external to the domain.
- Intercepted data passed to the Local Delivery Manager is formatted for delivery to the Service Filter Manager.
- the module packages the call content (CC) data based on associated target-Id and ensures its delivery to the SFM in a timely manner.
- the intercepted data is interpreted by the module and where required an associated intercept related information (IRI) event is generated and forwarded to the SFM.
- IRI intercept related information
- the Local Manager handles all communication with the Service Filter Managers.
- the data exchanged includes updates to the active target list received from the SFM together with the data intercepted by the active Service Filters being forwarded to the SFM.
- Management information is also exchanged between the SFM and Local Manager.
- the module maintains information on the local platform including counters and thresholds and is responsible for the generation of alarms and keep-alive messages.
- the protocol service filters interpret specific application level data flows and intercept data pertaining to active targets.
- a Radius Service Filter module registers with the IP Re-assembly module for the interception of traffic to and from the Radius server and thus detects when a temporary IP address is assigned to a target (Network Login) and additionally, when the temporary IP address is unassigned.
- the User-Name attribute contained in either in a Radius Access Request or Start Accounting-Request is passed to the Filter Module which returns an indication as to whether it identifies a target for which a warrant is open. For an active target the target-id is returned.
- the Service Filter extracts the Framed-IP-Address either from the Accounting request or from the subsequent Access Accept and forwards the event to the Local Delivery Manager. If the user specified in the Radius packet is not the subject of an outstanding warrant the data is discarded.
- the module On detection of a Radius Stop Accounting-Request indicating the termination of a session for an active target the module informs the Local Delivery Manager.
- a POP3 Service filter receives all data transferred to or from the POP3 server from the IP Re-assembly module.
- the User attribute of the POP3 data stream is passed to the Filter Module and if it matches a target the associated target-ID is returned and assigned to the data stream.
- the Local Delivery Manager is informed that an email read event has occurred. All subsequent traffic received for the specific target is forwarded to the Local Delivery Manager. On termination of the TCP connection all local data is discarded and the Local Delivery Manager informed.
- the RCPT and FROM attributes are extracted from the application data stream and passed to the Filter Module. If one of the attributes matches an active filter the associated target-ids, if any, are returned. If no target-id is returned the data stream is discarded. Otherwise the message content and associated target-ID is forwarded to the Local Delivery Manager.
- a WAP Server Filter receives all data to and from a WAP Gateway.
- the associated MSISDN attribute is retrieved from the data stream and passed to the Filter Module. If a target-id is returned the data stream is passed to the Local Delivery Manager. Otherwise, if no target-id is returned, the data is discarded.
- a DHCP Service Filter processing the intercepted DHCF traffic flows between the client and the DHCP Server(s).
- the client hardware address, chaddr, specified in the DHCP Acknowledgement is passed to the Filter Module and compared against the list of active targets' hardware addresses. If a match occurs the IP Address specified in the Acknowledgement is extracted.
- the Local Delivery Manager is informed of the new IP Address together with the associated target ID.
- a SSL Decryption module intercepts https traffic between the ISP's Web Server and the known target identified by the target's assigned IP Address. The encrypted data together with the associated target-ID is forwarded to the Local Delivery Manager for deciphering and forwarding to the LEMF.
- This approach avoids the necessity of propagating the ISP's private key to the interception nodes. However it requires that the ISP provides an interface to retrieve the secret key associated with the target's SSL session or alternatively that the ISP's makes available its private key to the D&M.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP01274823A EP1451995A1 (en) | 2001-11-15 | 2001-11-15 | A system for the unobtrusive interception of data transmissions |
| PCT/IE2001/000144 WO2003047205A1 (en) | 2001-11-15 | 2001-11-15 | A system for the unobtrusive interception of data transmissions |
| AU2002223974A AU2002223974A1 (en) | 2001-11-15 | 2001-11-15 | A system for the unobtrusive interception of data transmissions |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/IE2001/000144 WO2003047205A1 (en) | 2001-11-15 | 2001-11-15 | A system for the unobtrusive interception of data transmissions |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2003047205A1 true WO2003047205A1 (en) | 2003-06-05 |
Family
ID=11042210
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IE2001/000144 Ceased WO2003047205A1 (en) | 2001-11-15 | 2001-11-15 | A system for the unobtrusive interception of data transmissions |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP1451995A1 (en) |
| AU (1) | AU2002223974A1 (en) |
| WO (1) | WO2003047205A1 (en) |
Cited By (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005088938A1 (en) * | 2004-03-10 | 2005-09-22 | Enterasys Networks, Inc. | Method for network traffic mirroring with data privacy |
| WO2006127240A1 (en) * | 2005-05-24 | 2006-11-30 | The Boeing Company | Method and apparatus for user identification in computer traffic |
| CN100334844C (en) * | 2004-04-30 | 2007-08-29 | 华为技术有限公司 | A monitoring method based on business |
| WO2007097667A1 (en) * | 2006-02-27 | 2007-08-30 | Telefonaktiebolaget Lm Ericsson | Lawful access; stored data handover enhanced architecture |
| WO2009038510A1 (en) * | 2007-09-21 | 2009-03-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Monitoring of instant messaging and presence services |
| US20100199189A1 (en) * | 2006-03-12 | 2010-08-05 | Nice Systems, Ltd. | Apparatus and method for target oriented law enforcement interception and analysis |
| US20110202980A1 (en) * | 2008-10-10 | 2011-08-18 | Telefonaktiebolaget L M Ericsson (Publ) | Lawful Authorities Warrant Management |
| RU2434343C2 (en) * | 2006-02-27 | 2011-11-20 | Телефонактиеболагет Лм Эрикссон (Пабл) | Lawful access; stored data handover enhanced architecture |
| RU2468527C2 (en) * | 2006-10-02 | 2012-11-27 | Телефонактиеболагет Лм Эрикссон (Пабл) | Lawful interception in wire broadband networks |
| US8819213B2 (en) | 2004-08-20 | 2014-08-26 | Extreme Networks, Inc. | System, method and apparatus for traffic mirror setup, service and security in communication networks |
| US9043862B2 (en) | 2008-02-06 | 2015-05-26 | Qualcomm Incorporated | Policy control for encapsulated data flows |
| WO2015076715A1 (en) * | 2013-11-22 | 2015-05-28 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for synchronization of two databases in a lawful interception network by comparing checksum values |
| CN113411292A (en) * | 2020-03-16 | 2021-09-17 | 瞻博网络公司 | Demultiplexing lawful intercepted traffic and providing traffic to content destinations based on chained traffic |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1999017499A2 (en) * | 1997-09-26 | 1999-04-08 | Nokia Networks Oy | Legal interception in a telecommunications network |
| WO2000042742A1 (en) * | 1999-01-14 | 2000-07-20 | Nokia Networks Oy | Interception method and system |
| WO2001047222A2 (en) * | 1999-12-23 | 2001-06-28 | Ericsson Inc. | Transparent communication interception in a core transport network |
-
2001
- 2001-11-15 EP EP01274823A patent/EP1451995A1/en not_active Withdrawn
- 2001-11-15 AU AU2002223974A patent/AU2002223974A1/en not_active Abandoned
- 2001-11-15 WO PCT/IE2001/000144 patent/WO2003047205A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1999017499A2 (en) * | 1997-09-26 | 1999-04-08 | Nokia Networks Oy | Legal interception in a telecommunications network |
| WO2000042742A1 (en) * | 1999-01-14 | 2000-07-20 | Nokia Networks Oy | Interception method and system |
| WO2001047222A2 (en) * | 1999-12-23 | 2001-06-28 | Ericsson Inc. | Transparent communication interception in a core transport network |
Cited By (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005088938A1 (en) * | 2004-03-10 | 2005-09-22 | Enterasys Networks, Inc. | Method for network traffic mirroring with data privacy |
| US7690040B2 (en) | 2004-03-10 | 2010-03-30 | Enterasys Networks, Inc. | Method for network traffic mirroring with data privacy |
| US8239960B2 (en) | 2004-03-10 | 2012-08-07 | Enterasys Networks, Inc. | Method for network traffic mirroring with data privacy |
| CN100334844C (en) * | 2004-04-30 | 2007-08-29 | 华为技术有限公司 | A monitoring method based on business |
| US8819213B2 (en) | 2004-08-20 | 2014-08-26 | Extreme Networks, Inc. | System, method and apparatus for traffic mirror setup, service and security in communication networks |
| WO2006127240A1 (en) * | 2005-05-24 | 2006-11-30 | The Boeing Company | Method and apparatus for user identification in computer traffic |
| US7567568B2 (en) | 2005-05-24 | 2009-07-28 | The Boeing Company | Method and apparatus for user identification in computer traffic |
| WO2007097667A1 (en) * | 2006-02-27 | 2007-08-30 | Telefonaktiebolaget Lm Ericsson | Lawful access; stored data handover enhanced architecture |
| RU2434343C2 (en) * | 2006-02-27 | 2011-11-20 | Телефонактиеболагет Лм Эрикссон (Пабл) | Lawful access; stored data handover enhanced architecture |
| US20100199189A1 (en) * | 2006-03-12 | 2010-08-05 | Nice Systems, Ltd. | Apparatus and method for target oriented law enforcement interception and analysis |
| RU2468527C2 (en) * | 2006-10-02 | 2012-11-27 | Телефонактиеболагет Лм Эрикссон (Пабл) | Lawful interception in wire broadband networks |
| WO2009038510A1 (en) * | 2007-09-21 | 2009-03-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Monitoring of instant messaging and presence services |
| US9043862B2 (en) | 2008-02-06 | 2015-05-26 | Qualcomm Incorporated | Policy control for encapsulated data flows |
| US20110202980A1 (en) * | 2008-10-10 | 2011-08-18 | Telefonaktiebolaget L M Ericsson (Publ) | Lawful Authorities Warrant Management |
| WO2015076715A1 (en) * | 2013-11-22 | 2015-05-28 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for synchronization of two databases in a lawful interception network by comparing checksum values |
| US10091249B2 (en) | 2013-11-22 | 2018-10-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and system for synchronization of two databases in a lawful interception network by comparing checksum values |
| CN113411292A (en) * | 2020-03-16 | 2021-09-17 | 瞻博网络公司 | Demultiplexing lawful intercepted traffic and providing traffic to content destinations based on chained traffic |
| CN113411292B (en) * | 2020-03-16 | 2023-06-30 | 瞻博网络公司 | Intercepting services and providing services to content destinations based on chained service tapping |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2002223974A1 (en) | 2003-06-10 |
| EP1451995A1 (en) | 2004-09-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1484892B1 (en) | Method and system for lawful interception of packet switched network services | |
| CN102308550B (en) | Lawful interception and data retention of messages | |
| US7747768B1 (en) | Digital asset monitoring system and method | |
| RU2468527C2 (en) | Lawful interception in wire broadband networks | |
| CN102124714A (en) | Lawful interception of NAT/PAT | |
| US20070104180A1 (en) | Connected communication terminal, connecting communication terminal, session management server and trigger server | |
| KR20090095621A (en) | Intercepting voice over ip communications and other data communications | |
| CN101953138A (en) | Data retention and lawful interception for IP services | |
| WO2003047205A1 (en) | A system for the unobtrusive interception of data transmissions | |
| EP1299974B1 (en) | Method and apparatus for intercepting packets in a packet-oriented network | |
| US20040243843A1 (en) | Content server defending system | |
| US20150085670A1 (en) | Lte probe | |
| AU2008258126A1 (en) | Method, systems and apparatus for monitoring and/or generating communications in a communications network | |
| US20060222158A1 (en) | Call contents interception method for a communications network | |
| Xin et al. | Design improvement for tor against low-cost traffic attack and low-resource routing attack | |
| KR101257067B1 (en) | Method and system for lawful interception of internet services | |
| JP2005328108A (en) | Network, authentication server, router, and terminal managing method used therefor | |
| CN115834534B (en) | System for global virtual network | |
| Held | Virtual networking and the Internet. | |
| JP2009181230A (en) | Firewall device | |
| JP2009159163A (en) | Call origination control apparatus | |
| JP2009151581A (en) | Database access control device | |
| JP2009151728A (en) | Accounting management device | |
| JP2009151729A (en) | Accounting management device | |
| JP2009153082A (en) | Accounting management device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2001274823 Country of ref document: EP |
|
| WWP | Wipo information: published in national office |
Ref document number: 2001274823 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: JP |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: 2001274823 Country of ref document: EP |