Sign In to Follow Application
View All Documents & Correspondence

Systems And Methods Of Intent Based Lawful Interception (Li) In Communication Networks

Abstract: This disclosure relates to intent based Lawful Interception (LI) in a communication network. The method includes interpreting an LI intent of a Law Enforcement Agency (LEA) based on LI intent information provided by the LEA; determining LI content required by the LEA and at least one LI trigger associated with the LI content based on an analysis of the LI intent information; monitoring ongoing communication session associated with an LI target user to detect matching of the at least one LI trigger; processing duplicated LI content in response to matching of the at least one LI trigger; inserting at least one marker tag in the duplicated LI content to generate marked LI content; and sending the marked LI content and a notification comprising information associated with matching of the at least one LI trigger and the at least one marker tag to the LEA. FIG. 2

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
13 January 2017
Publication Number
29/2018
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
ipo@knspartners.com
Parent Application
Patent Number
Legal Status
Grant Date
2024-02-26
Renewal Date

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore 560035, Karnataka, India.

Inventors

1. SWAMINATHAN SEETHARAMAN
36/A4, Rajaji Street, Radha Nagar, Chromepet, Chennai – 600 044, Tamil Nadu, India.
2. VENKATA SUBRAMANIAN JAYARAMAN
41, Venkateswara Colony, 10th Street, M.M.C, Chennai - 600051, Tamil Nadu, India

Specification

Claims:WE CLAIM
1. A method of intent based Lawful Interception (LI) in a communication network, the method comprising:
interpreting, by a network device, an LI intent of a Law Enforcement Agency (LEA) based on LI intent information provided by the LEA;
determining, by the network device, LI content required by the LEA and at least one LI trigger associated with the LI content based on an analysis of the LI intent information;
monitoring, by the network device, ongoing communication session associated with an LI target user to detect matching of the at least one LI trigger;
processing, by the network device, duplicated LI content in response to matching of the at least one LI trigger, wherein the duplicated LI content captures at least a part of the LI content in the ongoing communication session of the LI target user;
inserting, by the network device, at least one marker tag in the duplicated LI content to generate marked LI content; and
sending, by the network device, the marked LI content and a notification comprising information associated with matching of the at least one LI trigger and the at least one marker tag to the LEA.
2. The method of claim 1 further comprising identifying at least one trigger detection network node to detect the at least one LI trigger based on a network node lookup table.
3. The method of claim 2 further comprising selecting a trigger detection network node from the at least one trigger detection node based on selection criteria comprising: location of the trigger detection node in the communication network, current load on the trigger detection node, and traffic conditions in network segments associated with the trigger detection node.
4. The method of claim 3, wherein the trigger detection node is selected when a content duplication node lacks capability to detect at least one of the at least one LI trigger.
5. The method of claim 1, wherein processing duplicated LI content comprises:
initiating sending at least a part of the duplicated LI content based on matching of at least one start LI trigger from the at least one LI trigger; and
terminating sending at least a part of the duplicated LI content based on matching of at least one stop LI trigger from the at least one LI trigger.
6. The method of claim 1 further comprising determining a confidence level associated with matching of the at least one LI trigger based on historical data associated with partial matching of the at least one LI trigger, the confidence level being determined in response to partial matching of the at least one LI trigger.
7. The method of claim 6 further comprising comparing the confidence level with a predefined confidence level, wherein the content duplication is selectively performed, when the confidence level is greater than the predefined confidence level.
8. The method of claim 1 further comprising receiving the LI intent information from the LEA at start of an LI session.
9. The method of claim 1, wherein the LI intent information comprises lookup tables, the lookup tables being used to determine the LI content required by the LEA and the at least one LI trigger.
10. The method of claim 1 further comprising performing auto-tuning of confidence levels for partial LI trigger matches and the lookup tables, based on LEA’s feedback and analysis of LI trigger matching events, wherein the LEA’s feedback comprises relevance of the duplicated LI content received by the LEA when compared with the intent of the LEA.
11. The method of claim 1, wherein each of the at least one LI trigger comprise at least one trigger condition, the content duplication being performed in response to matching of the at least one trigger.
12. The method of claim 1 further comprising sending a session ending report to the LEA, the session ending report comprising information associated with number of LI triggers that were matched, frequency and duration of matching of the LI triggers, delay between detection of matching of the LI triggers and initiation of content duplication.
13. A network device enabling intent based Lawful Interception (LI) in a communication network, the network device comprising:
a processor; and
a memory communicatively coupled to the processor, wherein the memory stores processor instructions, which, on execution, causes the processor to:
interpret an LI intent of a Law Enforcement Agency (LEA) based on LI intent information provided by the LEA;
determine LI content required by the LEA and at least one LI trigger associated with the LI content based on an analysis of the LI intent information;
monitor ongoing communication session associated with an LI target user to detect matching of the at least one LI trigger;
process duplicated LI content in response to matching of the at least one LI trigger, wherein the duplicated LI content captures at least a part of the LI content in the ongoing communication session of the LI target user;
insert at least one marker tag in the duplicated LI content to generate marked LI content; and
send the marked LI content and a notification comprising information associated with matching of the at least one LI trigger and the at least one marker tag to the LEA.
14. The network device of claim 13, wherein the processor is further configured to identify at least one trigger detection network node to detect the at least one LI trigger based on a network node lookup table.
15. The network device of claim 14, wherein the processor is further configured to select a trigger detection network node from the at least one trigger detection node based on selection criteria comprising: location of the trigger detection node in the communication network, current load on the trigger detection node, and traffic conditions in network segments associated with the trigger detection node.
16. The network device of claim 13, wherein to process duplicated LI content, the processor is further configured to:
initiate sending at least a part of the duplicated LI content based on matching of at least one start LI trigger from the at least one LI trigger; and
terminate sending at least a part of the duplicated LI content based on matching of at least one stop LI trigger from the at least one LI trigger.
17. The network device of claim 13, wherein the processor is further configured to determine a confidence level associated with matching of the at least one LI trigger based on historical data associated with partial matching of the at least one LI trigger, the confidence level being determined in response to partial matching of the at least one LI trigger.
18. The network device of claim 17, wherein the processor is further configured to compare the confidence level with a predefined confidence level, wherein the content duplication is selectively performed, when the confidence level is greater than the predefined confidence level.
19. The network device of claim 13, wherein the processor is further configured to perform auto-tuning of confidence levels for partial LI trigger matches and the lookup tables, based on LEA’s feedback and analysis of LI trigger matching events, wherein the LEA’s feedback comprises relevance of the duplicated LI content received by the LEA when compared with the intent of the LEA.
20. The network device of claim 13, wherein the processor is further configured to send a session ending report to the LEA, the session ending report comprising information associated with number of LI triggers that were matching, frequency and duration of matching of the LI triggers, delay between detection of matching of the LI triggers and initiation of content duplication.

Dated this 13th day of January 2017

Swetha SN
Of K&S Partners
Agent for the Applicant
, Description:TECHNICAL FIELD
This disclosure relates generally to Lawful Interception (LI) and more particularly to systems and methods of intent-based LI in communication networks.

Documents

Application Documents

# Name Date
1 Power of Attorney [13-01-2017(online)].pdf 2017-01-13
2 Form 5 [13-01-2017(online)].pdf 2017-01-13
3 Form 3 [13-01-2017(online)].pdf 2017-01-13
4 Form 18 [13-01-2017(online)].pdf_14.pdf 2017-01-13
5 Form 18 [13-01-2017(online)].pdf 2017-01-13
6 Drawing [13-01-2017(online)].pdf 2017-01-13
7 Description(Complete) [13-01-2017(online)].pdf_15.pdf 2017-01-13
8 Description(Complete) [13-01-2017(online)].pdf 2017-01-13
9 REQUEST FOR CERTIFIED COPY [16-01-2017(online)].pdf 2017-01-16
10 Request For Certified Copy-Online.pdf 2017-01-17
11 Request For Certified Copy-Online.pdf_1.pdf 2017-01-24
12 REQUEST FOR CERTIFIED COPY [21-03-2017(online)].pdf 2017-03-21
13 Other Patent Document [27-04-2017(online)].pdf 2017-04-27
14 Correspondence by Agent_Form30, Form1_02-05-2017.pdf 2017-05-02
15 abstract 201741001408 .jpg 2017-05-27
16 201741001408-FER.pdf 2019-12-13
17 201741001408-FER_SER_REPLY [12-06-2020(online)].pdf 2020-06-12
18 201741001408-US(14)-HearingNotice-(HearingDate-22-12-2023).pdf 2023-12-11
19 201741001408-POA [14-12-2023(online)].pdf 2023-12-14
20 201741001408-FORM 13 [14-12-2023(online)].pdf 2023-12-14
21 201741001408-Correspondence to notify the Controller [14-12-2023(online)].pdf 2023-12-14
22 201741001408-AMENDED DOCUMENTS [14-12-2023(online)].pdf 2023-12-14
23 201741001408-Written submissions and relevant documents [06-01-2024(online)].pdf 2024-01-06
24 201741001408-PETITION UNDER RULE 137 [06-01-2024(online)].pdf 2024-01-06
25 201741001408-MARKED COPY [06-01-2024(online)].pdf 2024-01-06
26 201741001408-Information under section 8(2) [06-01-2024(online)].pdf 2024-01-06
27 201741001408-FORM-26 [06-01-2024(online)].pdf 2024-01-06
28 201741001408-FORM 3 [06-01-2024(online)].pdf 2024-01-06
29 201741001408-CORRECTED PAGES [06-01-2024(online)].pdf 2024-01-06
30 201741001408-PatentCertificate26-02-2024.pdf 2024-02-26
31 201741001408-IntimationOfGrant26-02-2024.pdf 2024-02-26
32 201741001408-CORRECTED PAGES [26-02-2024(online)].pdf 2024-02-26

Search Strategy

1 tpo_22-11-2019.pdf

ERegister / Renewals

3rd: 24 May 2024

From 13/01/2019 - To 13/01/2020

4th: 24 May 2024

From 13/01/2020 - To 13/01/2021

5th: 24 May 2024

From 13/01/2021 - To 13/01/2022

6th: 24 May 2024

From 13/01/2022 - To 13/01/2023

7th: 24 May 2024

From 13/01/2023 - To 13/01/2024

8th: 24 May 2024

From 13/01/2024 - To 13/01/2025

9th: 03 Jan 2025

From 13/01/2025 - To 13/01/2026