发明名称 POLICY ROUTING-BASED LAWFUL INTERCEPTION IN COMMUNICATION SYSTEM WITH END-TO-END ENCRYPTION
摘要 Techniques are disclosed for lawfully intercepting information in communication environments with end-to-end encryption. For example, a method for intercepting encrypted communications exchanged between a first computing device and a second computing device in a communication network, wherein the interception is performed by a third computing device in the communication network, comprises the following steps. The third computing device obtains one or more packets having a packet address associated with one of the first computing device and the second computing device. The one or more packets are obtained by the third computing device, in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the one or more obtained packets may be decrypted so as to obtain data contained therein. The third computing device preserves the packet address of the one or more obtained packets. The third computing device forwards the one or more packets toward a packet-destination one of the first computing device and the second computing device such that the packet-destination one of the first computing device and the second computing device is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.
申请公布号 EP2708052(A1) 申请公布日期 2014.03.19
申请号 EP20120720742 申请日期 2012.04.27
申请人 ALCATEL LUCENT 发明人 HECK, JOHN, FREDERICK;SUNDARAM, GANAPATHY, S.;VARNEY, DOUGLAS, WILLIAM
分类号 H04W12/02;H04L29/06 主分类号 H04W12/02
代理机构 代理人
主权项
地址