Abstract: This disclosure relates generally to lawful interception of communication networks, and more particularly to system and method for improved Lawful Interception of encrypted message. The method may involve, receiving, a copy of the one or more encrypted messages; receiving, one or more message encryption key generation parameters associated with the one or more encrypted messages from the communication network; receiving, one or more composite decryption logics, from an encryption device, to decrypt the one or more encrypted messages; decrypting, the one or more encrypted messages based on the one or more message encryption key generation parameters and the one or more composite decryption logics for the lawful interception.
CLIAMS:We claim:
1. A method for a lawful Interception of one or more encrypted messages in a communication network, the method comprising:
receiving, by a lawful interception device, a copy of the one or more encrypted messages;
receiving, by the lawful interception device, one or more message encryption key generation parameters associated with the one or more encrypted messages from the communication network;
receiving, by the lawful interception device, one or more composite decryption logics, from an encryption device, to decrypt the one or more encrypted messages;
decrypting, by the lawful interception device, the one or more encrypted messages based on the one or more message encryption key generation parameters and the one or more composite decryption logics for the lawful interception.
2. The method of claim 1, wherein receiving the one or more composite decryption logics further comprises identifying the encryption device to receive the one or more composite decryption logics based on at least one of a physical distance between the communication network and the encryption device, an overload indication, a network congestion data, and a route availability data.
3. The method of claim 1, receiving by the lawful interception device, one or more notifications indicating transmission of the one or more encrypted messages.
4. The method of claim 1, wherein each of the one or more encrypted messages comprises an encrypted text message and an encrypted message encryption key.
5. The method of claim 1, wherein the one or more composite decryption logics are determined, by the encryption device, based on one or more service information and the one or more message encryption key generation parameters associated with the one or more encrypted messages received from the communication network.
6. The method of claim 1, wherein the one or more message encryption key generation parameters comprise at least one of a random seed value, an International Mobile Subscriber Identity (IMSI), and one or more time stamp of executing the encryption algorithm.
7. The method of claim 1, wherein the lawful Interception is reported to a law enforcement agency.
8. A lawful interception device comprising:
a memory;
a processor coupled to the memory storing processor executable instructions which when executed by the processor causes the processor to perform operations comprising:
receiving, by the lawful interception device, a copy of the one or more encrypted messages;
receiving, by the lawful interception device, one or more message encryption key generation parameters associated with the one or more encrypted messages from the communication network;
receiving, by the lawful interception device, one or more composite decryption logics, from an encryption device, to decrypt the one or more encrypted messages;
decrypting, by the lawful interception device, the one or more encrypted messages based on the one or more message encryption key generation parameters and the one or more composite decryption logics for a lawful interception.
9. The lawful interception device of claim 8, wherein operations of receiving the one or more composite decryption logics further comprise identifying the encryption device to receive the one or more composite decryption logics based on at least one of a physical distance between the communication network and the encryption device, an overload indication, a network congestion data, and a route availability data.
10. The lawful interception device of claim 8, wherein the operations further comprise receiving one or more notifications indicating transmission of the one or more encrypted messages.
11. The lawful interception device of claim 8, wherein each of the one or more encrypted messages comprises an encrypted text message and an encrypted message encryption key.
12. The lawful interception device of claim 8, wherein the one or more composite decryption logics are determined, by the encryption device, based on one or more service information and the one or more message encryption key generation parameters associated with the one or more encrypted messages received from the communication network.
13. The lawful interception device of claim 8, wherein the one or more message encryption key generation parameters comprise at least one of a random seed value, an International Mobile Subscriber Identity (IMSI), and one or more time stamp of executing the encryption algorithm.
14. A non-transitory computer readable medium including instructions stored thereon that when processed by at least one processor cause a lawful interception device to perform operations comprising:
receiving a copy of the one or more encrypted messages;
receiving one or more message encryption key generation parameters associated with the one or more encrypted messages from the communication network;
receiving one or more composite decryption logics, from an encryption device, to decrypt the one or more encrypted messages;
decrypting the one or more encrypted messages based on the one or more message encryption key generation parameters and the one or more composite decryption logics for lawful interception.
Dated this 11th day of March, 2015
Swetha S.N
Of K&S Partners
Agent for the Applicant
,TagSPECI:TECHNICAL FIELD
This disclosure relates generally to lawful interception of communication networks, and more particularly to system and method for improved Lawful Interception of encrypted message.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 1206-CHE-2015 FORM-9 11-03-2015.pdf | 2015-03-11 |
| 1 | 1206-CHE-2015-RELEVANT DOCUMENTS [20-09-2023(online)].pdf | 2023-09-20 |
| 2 | 1206-CHE-2015 FORM-18 11-03-2015.pdf | 2015-03-11 |
| 2 | 1206-CHE-2015-PROOF OF ALTERATION [11-03-2022(online)].pdf | 2022-03-11 |
| 3 | IP30433-Spec.pdf | 2015-03-13 |
| 3 | 1206-CHE-2015-US(14)-HearingNotice-(HearingDate-12-03-2021).pdf | 2021-10-17 |
| 4 | IP30433-fig.pdf | 2015-03-13 |
| 4 | 1206-CHE-2015-IntimationOfGrant11-06-2021.pdf | 2021-06-11 |
| 5 | FORM 5-IP30433.pdf | 2015-03-13 |
| 5 | 1206-CHE-2015-PatentCertificate11-06-2021.pdf | 2021-06-11 |
| 6 | FORM 3-IP30433.pdf | 2015-03-13 |
| 6 | 1206-CHE-2015-Written submissions and relevant documents [23-03-2021(online)].pdf | 2021-03-23 |
| 7 | 1206CHE2015_CertifiedCopy.pdf | 2015-03-16 |
| 7 | 1206-CHE-2015-Correspondence to notify the Controller [01-03-2021(online)].pdf | 2021-03-01 |
| 8 | 1206-CHE-2015-FORM-26 [01-03-2021(online)].pdf | 2021-03-01 |
| 8 | 1206-CHE-2015 POWER OF ATTORNEY 25-06-2015.pdf | 2015-06-25 |
| 9 | 1206-CHE-2015 FORM-1 25-06-2015.pdf | 2015-06-25 |
| 9 | 1206-CHE-2015-FER_SER_REPLY [26-07-2019(online)].pdf | 2019-07-26 |
| 10 | 1206-CHE-2015 CORRESPONDENCE OTHERS 25-06-2015.pdf | 2015-06-25 |
| 10 | 1206-CHE-2015-FORM 3 [26-07-2019(online)].pdf | 2019-07-26 |
| 11 | 1206-CHE-2015-Information under section 8(2) (MANDATORY) [26-07-2019(online)].pdf | 2019-07-26 |
| 11 | REQUEST FOR CERTIFIED COPY [16-09-2015(online)].pdf | 2015-09-16 |
| 12 | 1206-CHE-2015-FER.pdf | 2019-01-29 |
| 12 | 1206-CHE-2015-PETITION UNDER RULE 137 [26-07-2019(online)].pdf | 2019-07-26 |
| 13 | 1206-CHE-2015-FER.pdf | 2019-01-29 |
| 13 | 1206-CHE-2015-PETITION UNDER RULE 137 [26-07-2019(online)].pdf | 2019-07-26 |
| 14 | 1206-CHE-2015-Information under section 8(2) (MANDATORY) [26-07-2019(online)].pdf | 2019-07-26 |
| 14 | REQUEST FOR CERTIFIED COPY [16-09-2015(online)].pdf | 2015-09-16 |
| 15 | 1206-CHE-2015 CORRESPONDENCE OTHERS 25-06-2015.pdf | 2015-06-25 |
| 15 | 1206-CHE-2015-FORM 3 [26-07-2019(online)].pdf | 2019-07-26 |
| 16 | 1206-CHE-2015 FORM-1 25-06-2015.pdf | 2015-06-25 |
| 16 | 1206-CHE-2015-FER_SER_REPLY [26-07-2019(online)].pdf | 2019-07-26 |
| 17 | 1206-CHE-2015-FORM-26 [01-03-2021(online)].pdf | 2021-03-01 |
| 17 | 1206-CHE-2015 POWER OF ATTORNEY 25-06-2015.pdf | 2015-06-25 |
| 18 | 1206CHE2015_CertifiedCopy.pdf | 2015-03-16 |
| 18 | 1206-CHE-2015-Correspondence to notify the Controller [01-03-2021(online)].pdf | 2021-03-01 |
| 19 | FORM 3-IP30433.pdf | 2015-03-13 |
| 19 | 1206-CHE-2015-Written submissions and relevant documents [23-03-2021(online)].pdf | 2021-03-23 |
| 20 | FORM 5-IP30433.pdf | 2015-03-13 |
| 20 | 1206-CHE-2015-PatentCertificate11-06-2021.pdf | 2021-06-11 |
| 21 | IP30433-fig.pdf | 2015-03-13 |
| 21 | 1206-CHE-2015-IntimationOfGrant11-06-2021.pdf | 2021-06-11 |
| 22 | IP30433-Spec.pdf | 2015-03-13 |
| 22 | 1206-CHE-2015-US(14)-HearingNotice-(HearingDate-12-03-2021).pdf | 2021-10-17 |
| 23 | 1206-CHE-2015-PROOF OF ALTERATION [11-03-2022(online)].pdf | 2022-03-11 |
| 23 | 1206-CHE-2015 FORM-18 11-03-2015.pdf | 2015-03-11 |
| 24 | 1206-CHE-2015-RELEVANT DOCUMENTS [20-09-2023(online)].pdf | 2023-09-20 |
| 24 | 1206-CHE-2015 FORM-9 11-03-2015.pdf | 2015-03-11 |
| 1 | SearchStrategy_26-12-2018.pdf |