The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Oct. 05, 2010
Filed:
Sep. 07, 2006
Manoj Apte, San Jose, CA (US);
Sandeep Jain, Santa Clara, CA (US);
Fritz Budiyanto, Sunnyvale, CA (US);
Senthil Kumar Duraiswamy, Coimbatore, IN;
Saravanan Deenadayalan, San Jose, CA (US);
Yulianto Kokasih Ko, Fremont, CA (US);
Manoj Apte, San Jose, CA (US);
Sandeep Jain, Santa Clara, CA (US);
Fritz Budiyanto, Sunnyvale, CA (US);
Senthil Kumar Duraiswamy, Coimbatore, IN;
Saravanan Deenadayalan, San Jose, CA (US);
Yulianto Kokasih Ko, Fremont, CA (US);
Juniper Networks, Inc., Sunnyvale, CA (US);
Abstract
A network device comprises a service card (e.g., a lawful intercept (LI) service card) executing a communication protocol to receive, from one or more sources (e.g., law enforcement agents), intercept information specifying at least one destination and criteria for matching one or more packet flows. The network device further includes a network interface card to receive a packet from a network, and a control unit to provide the packet from the interface card to the LI service card. The LI service card executes a flow match detection module that, when the packet matches the criteria of the intercept information, forwards the packet to the destination specified by the intercept information. The network device may provide real-time intercept and relaying of specified network-based communications. Moreover, the techniques described herein allow LEAs to tap packet flows with little delay after specifying intercept information, e.g., within 50 milliseconds, even under high-volume networks.