최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0423112 (2012-03-16) |
등록번호 | US-RE45348 (2015-01-20) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 562 |
An intercept system provides more effective and more efficient compliance with legal intercept warrants. The intercept system can provide any combination of operations that include near-real-time intercept, capture of intercepted data in structured authenticated form, clear text intercept for commun
An intercept system provides more effective and more efficient compliance with legal intercept warrants. The intercept system can provide any combination of operations that include near-real-time intercept, capture of intercepted data in structured authenticated form, clear text intercept for communications where there is access to encryption keys, cipher text intercept for communications where there is no access to encryption keys, provision of transactional logs to the authorized agency, interception without altering the operation of the target services, and encryption of stored intercepted information.
1. A method for intercepting data, comprising: receiving, at a management server, a connection from a remote client, the connection being initiated by the remote client and established outbound from the remote client;negotiating a point-to-point encryption scheme with a remote mobile device, the poi
1. A method for intercepting data, comprising: receiving, at a management server, a connection from a remote client, the connection being initiated by the remote client and established outbound from the remote client;negotiating a point-to-point encryption scheme with a remote mobile device, the point-to-point encryption scheme negotiated between the management server and the remote mobile device;receiving, at the management server, a value identifying an intercept target for a legal intercept and an indication that interception is authorized by a warrant, the intercept target corresponding to the remote mobile device;automatically intercepting, at the management server, data received and/or sent by the intercept target identified by the value, wherein data is intercepted without altering operation of email application services that operate on the remote mobile device;inspecting packets having the intercepted data to distinguish end-to-end encrypted information from other information that is encrypted according to the point-to-point encryption scheme negotiated with the remote mobile device;preserving encryption that is included on the end-to-end encrypted information when received while removing encryption that is included on at least a portion of the other information, said other information decrypted using a key obtained during the point-to-point encryption scheme negotiation; andtransferring both the decrypted other information and the end-to-end information from the management server to a remote device. 2. The method of claim 1, wherein the packets are intercepted during a requested time period, and the method further comprises: formatting the data that is intercepted during the requested time period and associated with the target user into one or more first log files, each of the first log files corresponding to a different time segment occurring during the requested time period and indicating one or more intercept events for its corresponding time segment; andformatting one or more second different log files associated with the requested time period, the second log files indicating inactivity and corresponding to different remaining time segments that occur during the requested time period and that are unrepresented by the first log files that indicate the intercept events such that the first and second log files record monitoring for the entire requested time period independently of whether the data is intercepted intermittently during the requested time period. 3. The method of claim 2, wherein the data is intercepted according to an intercept configuration file that includes at least a unique intercept identifier and a user ID identifying the target user. 4. The method of claim 2, wherein the log files record an unbroken sequence of continuous monitoring over the requested time period independently of whether the data is intercepted intermittently. 5. The method of claim 2, further comprising transferring the log files to the remote device. 6. The method of claim 2, further comprising formatting the log files with different time values usable for verifying that communications from the remote mobile device were continuously monitored during the requested time period regardless of whether the data was intercepted intermittently. 7. The method according to claim 1, wherein the encryption that is included on the end-to-end encrypted information uses a security association that is kept secret from the management server such that the end-to-end encrypted information is kept private with respect to employees associated with the management server. 8. The method of claim 1, further comprising determining whether to encrypt at least one of the end-to-end information and the decrypted information prior to said transferring. 9. The method according to claim 1, further comprising: combining, at the management server, the end-to-end encrypted information of the intercepted data with the decrypted other information of the intercepted data in a same log file. 10. The method according to claim 1, further comprising: storing, at the management server, the intercepted data in a structure format that identifies when the data was intercepted and at the same time provides authentication that the stored intercepted data has not been altered or deleted. 11. The method according to claim 10, further comprising monitoring communications between the remote client and the remote mobile device for multiple contiguous time periods. 12. The method according to claim 11, further comprising: generating, using the management server, log files over an intercept period that encompasses the multiple contiguous time periods;storing the log files in a same intercept directory;inserting a warrant identifier received together with the value into the intercept directory; andgenerating a name for the intercept directory that identifies the intercept target and the intercept period over which the log files were generated. 13. The method according to claim 12, further comprising: encrypting the log files in the intercept directory with an encryption scheme known by an agency issuing the warrant, said encryption performed using the management server that intercepted the data; andsending the encrypted intercept directory to an electronic mailbox accessible by the agency. 14. The method according to claim 13, further comprising: generating a Cyclic Redundancy Check (CRC) or other digital signature value for all of the log files in the intercept directory;encrypting the resulting generated value; andproviding the encrypted generated value to the enforcement agency, said encrypted generated value sent in a different communication than the encrypted intercept directory, said encrypted generated value verifying that the log files have not been altered. 15. The method according to claim 1, further comprising: reading an intercept configuration file that contains a warrant identifier, the value identifying the user, an enforcement agency known encryption key and an electronic mailbox address; upon reading the intercept configuration file automatically intercepting data received and/or sent by the remote mobile device;formatting any intercepted data into log files that identify when the data was intercepted; andencrypting the log files using the encryption key. 16. The method according to claim 1, wherein the end-to-end encrypted information is associated with content and is protected with an end-to-end encryption scheme that is kept secret from any midpoints located on a call path between transmitting and receiving endpoints, and the other information is associated with transaction routing information and is protected with the negotiated point-to-point encryption scheme. 17. A communication management system, comprising: a management server configured to receive a connection initiated by a remote client and established outbound from the remote client;the management server configured to negotiate a point-to-point encryption scheme with a remote mobile device, the point-to-point encryption scheme negotiated between the management server and the remote mobile device;the management server configured to receive a value identifying an intercept target for a legal intercept and an indication that interception is authorized by a warrant, the intercept target corresponding to the remote mobile device;the management server configured to automatically intercept data received and/or sent by the intercept target identified by the value, wherein the data is intercepted without altering operation of email application services that operate on the remote mobile device;the management server configured to inspect packets having the intercepted data to distinguish end-to-end encrypted information from other information that is encrypted according to the point-to-point encryption scheme negotiated with the remote mobile device;the management server configured to preserve encryption that is included on the end-to-end encrypted information when received while removing encryption that is included on at least a portion of the other information, said other information decrypted using a key obtained during the point-to-point encryption scheme negotiation; andthe management server configured to transfer both the decrypted other information and the end-to-end information from the management server to a remote device. 18. The communication management system of claim 17, further comprising: the management server configured to automatically format the intercepted data into log files;the management server configured to generate multiple log files that identify any intercepted data for associated contiguous predetermined time periods extending over a continuous intercept period; andthe management server configured to generate the log files for back-to-back time periods, the management server further configured to generate each log file by selecting between inserting the intercepted data and an inactivity indication therein such that each of the log files contains at least one selected from the group comprising the intercepted data for the associated time period and an indication that no data was intercepted during the associated time period. 19. The communication management system of claim 18, further comprising: the management server is configured to select a same duration for the time periods according to selectable time interval values included in an intercept configuration file. 20. The communication management system of claim 18, further comprising: the management server configured to encrypt the log files according to an encryption key known by an enforcement agency associated with the warrant before emailing the encrypted log files to a mailbox for the enforcement agency. 21. The communication management system of claim 18, further comprising: the management server configured to identify a first portion of the intercepted data encrypted using a first known security association for which the management server has knowledge of the encryption key and identify a second portion of the intercepted data encrypted using a second unknown security association, the management server configured to decrypt and store the first portion of the intercepted data into an associated one of the log files and combine the encrypted second portion of the intercepted data with the decrypted first portion of the intercepted data in the same associated log file. 22. The communication management system of claim 21, wherein the first portion of the intercepted data is encrypted with a known point-to-point encryption key and the second portion of the intercepted data is encrypted with an unknown end-to-end encryption key. 23. The communication management system of claim 21, further comprising: the management server is configured to encrypt both the decrypted first portion of the intercepted data and the second encrypted portion of the intercepted data. 24. The communication management system of claim 21, wherein the first portion of the intercepted data includes transaction authentication and routing information and the second portion of the intercepted data includes the contents of email messages, electronic files, or other electronic data. 25. The communication management system of claim 17, wherein the management server is configured to process communications exchanged between a local device operating in an enterprise or local network and a mobile wireless device that synchronizes with a portion of the data in the local device. 26. A method for intercepting data, comprising: in response to receiving a connection request, negotiating a point-to-point encryption scheme with a mobile device, the point-to-point encryption scheme negotiated between a management server and the mobile device;automatically intercepting, at the management server, data received and/or sent by an intercept target, wherein data is intercepted without altering operation of application services on the mobile device;inspecting packets having the intercepted data to distinguish end-to-end encrypted information from other information that is encrypted according to the point-to-point encryption scheme negotiated with the device;preserving encryption that is included on the end-to-end encrypted information when received while removing encryption that is included on at least a portion of the other information, said other information decrypted using a key obtained during the point-to-point encryption scheme negotiation; andtransferring both the decrypted other information and the end-to-end information. 27. The method of claim 26, further comprising, receiving, at the management server, a value identifying the intercept target for a legal intercept and an indication that interception is authorized by a warrant, the intercept target corresponding to the mobile device. 28. The method of claim 26, wherein the packets are intercepted during a requested time period, and the method further comprises: formatting the data that is intercepted during the requested time period and associated with a target user into one or more first log files. 29. The method of claim 28, wherein: each of the first log files corresponding to a different time segment occurring during the requested time period and indicating one or more intercept events for its corresponding time segment. 30. The method of claim 29, further comprising: formatting one or more second different log files associated with the requested time period, the second log files indicating inactivity and corresponding to different remaining time segments that occur during the requested time period and that are unrepresented by the first log files that indicate the intercept events such that the first and second log files record monitoring for the entire requested time period independently of whether the data is intercepted intermittently during the requested time period. 31. The method of claim 28, wherein the log files record an unbroken sequence of continuous monitoring over the requested time period independently of whether the data is intercepted intermittently. 32. The method of claim 28, further comprising formatting the log files with different time values usable for verifying that communications from the mobile device were continuously monitored during the requested time period regardless of whether the data was intercepted intermittently. 33. The method of claim 26, wherein the data is intercepted according to an intercept configuration file that includes at least a intercept identifier and a user ID identifying a target user. 34. The method of claim 26, wherein the encryption that is included on the end-to-end encryption information uses a security association that is kept secret from the management. 35. The method of claim 26, further comprising determining whether to encrypt at least one of the end-to-end information and the decrypted information prior to said transferring. 36. The method according to claim 26, further comprising: combining the end-to-end encrypted information of the intercepted data with the decrypted other information of the intercepted data in a log file. 37. The method according to claim 26, further comprising: storing the intercepted data in a structure format that identifies when the data was intercepted and provides authentication that the stored intercepted data has not been altered or deleted. 38. The method according to claim 26, further comprising monitoring communications between a remote client and the device for multiple contiguous time periods. 39. The method according to claim 38, further comprising: generating log files over an intercept period that encompasses the multiple contiguous time periods;storing the log files in a same intercept directory. 40. The method according to claim 39, further comprising: inserting a warrant identifier received together with the value into the intercept directory; andgenerating a name for the intercept directory that identifies the intercept target and the intercept period over which the log files were generated. 41. The method according to claim 39, further comprising: encrypting the log files in the intercept directory with an encryption scheme known by an agency issuing the warrant, said encryption performed using the management server that intercepted the data; andsending the encrypted intercept directory to an electronic mailbox accessible by the agency. 42. The method according to claim 39, further comprising: generating a Cyclic Redundancy Check (CRC) or other digital signature value for all of the log files in the intercept directory;encrypting the resulting generated value; andproviding the encrypted generated value to the enforcement agency, said encrypted generated value sent in a different communication than the encrypted intercept directory, said encrypted generated value verifying that the log files have not been altered. 43. The method according to claim 26, further comprising: reading an intercept configuration file that contains a warrant identifier, the value identifying the user, an enforcement agency known encryption key and an electronic mailbox address;upon reading the intercept configuration file automatically intercepting data received and/or sent by the remote mobile device;formatting any intercepted data into log files that identify when the data was intercepted; andencrypting the log files using the encryption key. 44. The method according to claim 26, wherein the end-to-end encrypted information is associated with content and is protected with an end-to-end encryption scheme that is kept secret from any midpoints located between transmitting and receiving endpoints, and the other information is associated with transaction routing information and is protected with the point-to-point encryption scheme. 45. A communication management system for intercepting data, comprising: a processor;a network interface configured to receive a connection request; anda memory unit having instructions stored thereon, wherein the instructions, when executed by the processor, causes the communication management system to: negotiate a point-to-point encryption scheme;inspect packets having the data to be intercepted to distinguish end-to-end encrypted information from other information that is encrypted according to the point-to-point encryption scheme;preserve encryption that is included on the encrypted information when received while removing encryption that is included on at least a portion of the other information, said other information decrypted using a key obtained in association with the point-to-point encryption scheme;transfer both the decrypted other information and the end-to-end encrypted information;automatically format the intercepted data into log files including: generating log files that identify intercepted data for associated contiguous predetermined time periods extending over a continuous intercept period; andgenerating the log files for back-to-back time periods, the management server generating each log file by selecting between inserting the intercepted data and an inactivity indication therein such that each of the log files contains at least one selected from the group including the intercepted data for the associated time period and an indication that no data was intercepted during the associated time period;negotiate the point-to-point encryption scheme with a mobile device in response to receiving the connection request, andintercept data received and/or sent by an intercept target, wherein data is intercepted without altering operation of application services on the mobile device.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.