Abstract: This disclosure relates generally to lawful interception and more particularly to methods and systems for lawful interception. In one embodiment, a method for lawful interception in a communication network is disclosed. The method includes detecting in real-time, via at least one network device, adulteration in communication data based on comparison of a set of adulteration parameters derived from the communication data with associated thresholds within a set of thresholds. The method further includes analyzing, via the at least one network device, adulterated content in the communication data to determine feasibility of correcting the adulterated content based on satisfaction of predefined criteria. Moreover, the method includes correcting, selectively, the adulterated content based on satisfaction of the predefined criteria. Figure 5
Claims:WE CLAIM:
1. A method for performing lawful interception in a communication network, the method comprising:
detecting in real-time, via at least one network device, adulteration in communication data based on comparison of a set of adulteration parameters derived from the communication data with associated thresholds within a set of thresholds;
analyzing, via the at least one network device, adulterated content in the communication data to determine feasibility of correcting the adulterated content based on satisfaction of predefined criteria; and
correcting, selectively, the adulterated content based on satisfaction of the predefined criteria.
2. The method of claim 1 further comprising monitoring, by the at least one network device, a set of network parameters to detect a change in one or more of the set of network parameters.
3. The method of claim 2, wherein the set of network parameters are selected from a group comprising network congestion, network choke, packet queueing, buffer overflows, insufficient network coverage, link unavailability, network delays, packet drops, and users involved in session for the communication data.
4. The method of claim 2 further comprising dynamically adapting one or more of the set of thresholds in response to detecting a change in one or more of the set of network parameters.
5. The method of claim 4, wherein the one or more of the set of thresholds are dynamically adapted in real time.
6. The method of claim 1, wherein the set of adulteration parameters are selected from a group comprising packets with insufficient hop length, packets with unused protocol headers filled in, packets with invalid, not used, or intentionally misleading Real-time Transport Protocol (RTP) header contents (for example, an old time stamp), interval between retransmission of the same packet, packets with difference in content between the initially sent and retransmitted version(s) of the same packet, packets with unacceptable protocol or packet header values, port changes, RST and other flag adulterations, packets with insufficient or invalid TTL contents, and packets with content length lower than the minimum possible content length for that packet type or protocol.l
7. The method of claim 1, wherein the predefined criteria comprises meeting a confidence level of accuracy in correcting the adulterated content.
8. The method of claim 1, wherein correcting comprises:
identifying unwanted packets within the communication data; and
determining a confidence level of accurately identifying the unwanted packets, wherein the confidence level satisfies one of a set of confidence level ranges.
9. The method of claim 8 further comprising removing the unwanted packets from the communication data in response to the identifying.
10. The method of claim 9 further comprising sending a corrected data stream to a lawful interception gateway in response to removing the unwanted packets.
11. The method of claim 9 further comprising sending to a lawful interception gateway, through a secondary data stream, at least one of removed unwanted packets and information associated with the removed unwanted packets based on a confidence level range which the confidence level satisfies.
12. The method of claim 9 further comprising retaining the unwanted packets in the communication data in response to the identifying, when the confidence level is within lowest confidence level range.
13. The method of claim 1 further comprising sending additional information to a lawful interception gateway, the additional information comprising at least one of entity causing adulteration, means of adulteration, frequency of adulterated packets, which adulteration parameter thresholds were crossed, and at least one of indication of inability to correct the adulterated content along with the reason and other relevant information, and indication of adulterated content being corrected along with relevant information.
14. The method of claim 1 further comprising:
sending feedback comprising information associated with the adulteration identified to a controller; and
adapting the set of threshold based on the feedback for future communication sessions.
15. A system for performing lawful interception in a communication network, the system comprising at least one network device comprising:
at least one processors; and
a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising
detecting in real-time, via at least one network device, adulteration in communication data based on comparison of a set of adulteration parameters derived from the communication data with associated thresholds within a set of thresholds;
analyzing, via the at least one network device, adulterated content in the communication data to determine feasibility of correcting the adulterated content based on satisfaction of predefined criteria; and
correcting, selectively, the adulterated content based on satisfaction of the predefined criteria.
16. The system of claim 15, wherein the operations further comprise monitoring, by the at least one network device, a set of network parameters to detect a change in one or more of the set of network parameters.
17. The system of claim 16, wherein the operations further comprise dynamically adapting one or more of the set of thresholds in response to detecting a change in one or more of the set of network parameters.
18. The system of claim 15, wherein the operations further comprise:
identifying unwanted packets within the communication data; and
determining a confidence level of accurately identifying the unwanted packets, wherein the confidence level satisfies one of a set of confidence level ranges.
19. The system of claim 15, wherein the operations further comprise removing the unwanted packets from the communication data in response to the identifying.
20. The method of claim 19, wherein the operations further comprise sending a corrected data stream to a lawful interception gateway in response to removing the unwanted packets.
21. The system of claim 19, wherein the operations further comprise sending to a lawful interception gateway, through a secondary data stream, at least one of removed unwanted packets and information associated with the removed unwanted packets based on a confidence level range which the confidence level satisfies.
22. The system of claim 19, wherein the operations further comprise retaining the unwanted packets in the communication data in response to the identifying, when the confidence level is within lowest confidence level range.
23. The system of claim 15, wherein the operations further comprise:
sending feedback comprising information associated with the adulteration identified to a controller; and
adapting the set of threshold based on the feedback for future communication sessions.
24. A non-transitory computer-readable storage medium for lawful interception in a communication network, when executed by a computing device, cause the computing device to:
detect in real-time, via at least one network device, adulteration in communication data based on comparison of a set of adulteration parameters derived from the communication data with associated thresholds within a set of thresholds;
analyze, via the at least one network device, adulterated content in the communication data to determine feasibility of correcting the adulterated content based on satisfaction of predefined criteria; and
correct, selectively, the adulterated content based on satisfaction of the predefined criteria.
Dated this on 30th day of September, 2015
Swetha SN
Of K&S Partners
Agent for the Applicant
, Description:TECHNICAL FIELD
This disclosure relates generally to lawful interception and more particularly to methods and systems for performing lawful interception in communication networks.
| # | Name | Date |
|---|---|---|
| 1 | 5233-CHE-2015-RELEVANT DOCUMENTS [20-09-2023(online)].pdf | 2023-09-20 |
| 1 | Form 9 [30-09-2015(online)].pdf | 2015-09-30 |
| 2 | 5233-CHE-2015-PROOF OF ALTERATION [05-09-2022(online)].pdf | 2022-09-05 |
| 2 | Form 5 [30-09-2015(online)].pdf | 2015-09-30 |
| 3 | Form 3 [30-09-2015(online)].pdf | 2015-09-30 |
| 3 | 5233-CHE-2015-IntimationOfGrant18-06-2021.pdf | 2021-06-18 |
| 4 | Form 18 [30-09-2015(online)].pdf | 2015-09-30 |
| 4 | 5233-CHE-2015-PatentCertificate18-06-2021.pdf | 2021-06-18 |
| 5 | Drawing [30-09-2015(online)].pdf | 2015-09-30 |
| 5 | 5233-CHE-2015-FER_SER_REPLY [28-02-2020(online)].pdf | 2020-02-28 |
| 6 | Description(Complete) [30-09-2015(online)].pdf | 2015-09-30 |
| 6 | 5233-CHE-2015-FORM 3 [28-02-2020(online)].pdf | 2020-02-28 |
| 7 | REQUEST FOR CERTIFIED COPY [01-10-2015(online)].pdf | 2015-10-01 |
| 7 | 5233-CHE-2015-Information under section 8(2) [28-02-2020(online)].pdf | 2020-02-28 |
| 8 | abstract 5233-CHE-2015.jpg | 2015-10-07 |
| 8 | 5233-CHE-2015-FER.pdf | 2019-08-30 |
| 9 | 5233-CHE-2015-Correspondence-180216.pdf | 2016-06-30 |
| 9 | REQUEST FOR CERTIFIED COPY [02-03-2016(online)].pdf | 2016-03-02 |
| 10 | 5233-CHE-2015-Form 1-180216.pdf | 2016-06-30 |
| 10 | 5233-CHE-2015-Power of Attorney-180216.pdf | 2016-06-30 |
| 11 | 5233-CHE-2015-Form 1-180216.pdf | 2016-06-30 |
| 11 | 5233-CHE-2015-Power of Attorney-180216.pdf | 2016-06-30 |
| 12 | 5233-CHE-2015-Correspondence-180216.pdf | 2016-06-30 |
| 12 | REQUEST FOR CERTIFIED COPY [02-03-2016(online)].pdf | 2016-03-02 |
| 13 | 5233-CHE-2015-FER.pdf | 2019-08-30 |
| 13 | abstract 5233-CHE-2015.jpg | 2015-10-07 |
| 14 | 5233-CHE-2015-Information under section 8(2) [28-02-2020(online)].pdf | 2020-02-28 |
| 14 | REQUEST FOR CERTIFIED COPY [01-10-2015(online)].pdf | 2015-10-01 |
| 15 | 5233-CHE-2015-FORM 3 [28-02-2020(online)].pdf | 2020-02-28 |
| 15 | Description(Complete) [30-09-2015(online)].pdf | 2015-09-30 |
| 16 | 5233-CHE-2015-FER_SER_REPLY [28-02-2020(online)].pdf | 2020-02-28 |
| 16 | Drawing [30-09-2015(online)].pdf | 2015-09-30 |
| 17 | 5233-CHE-2015-PatentCertificate18-06-2021.pdf | 2021-06-18 |
| 17 | Form 18 [30-09-2015(online)].pdf | 2015-09-30 |
| 18 | Form 3 [30-09-2015(online)].pdf | 2015-09-30 |
| 18 | 5233-CHE-2015-IntimationOfGrant18-06-2021.pdf | 2021-06-18 |
| 19 | Form 5 [30-09-2015(online)].pdf | 2015-09-30 |
| 19 | 5233-CHE-2015-PROOF OF ALTERATION [05-09-2022(online)].pdf | 2022-09-05 |
| 20 | Form 9 [30-09-2015(online)].pdf | 2015-09-30 |
| 20 | 5233-CHE-2015-RELEVANT DOCUMENTS [20-09-2023(online)].pdf | 2023-09-20 |
| 1 | 2019-08-2918-59-13_29-08-2019.pdf |