发明授权
US09544334B2 Policy routing-based lawful interception in communication system with end-to-end encryption 有权
基于策略路由的通信系统中的合法拦截采用端到端加密

Policy routing-based lawful interception in communication system with end-to-end encryption
摘要:
A method for intercepting encrypted communications exchanged between first and second computing devices in a communication network, wherein interception is performed by a third computing device in the computing network. The third computing device obtains one or more packets having a packet address associated with one of the first and second computing devices in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the obtained packets may be decrypted to obtain data contained therein. The third computing device preserves the packet address of the obtained packets and forwards the obtained packets toward a packet-destination one of the first and second computing devices such that the packet-destination one of the first and second computing devices is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.
信息查询
0/0