EP2014069A1 - Judicial monitoring on peer-to-peer networks - Google Patents
Judicial monitoring on peer-to-peer networksInfo
- Publication number
- EP2014069A1 EP2014069A1 EP07728242A EP07728242A EP2014069A1 EP 2014069 A1 EP2014069 A1 EP 2014069A1 EP 07728242 A EP07728242 A EP 07728242A EP 07728242 A EP07728242 A EP 07728242A EP 2014069 A1 EP2014069 A1 EP 2014069A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- peer
- networks
- monitoring
- network
- judicial
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
Definitions
- the invention relates to a method for judicial monitoring in peer-to-peer networks.
- Peer-to-peer networks are networks without central access control, in which all participants (peers) act on an equal footing. A connection exists in contrast to
- Client-server systems directly between two nodes without interposing a network server.
- the omission of central servers leads to a reduction of data traffic in the network, enables the decentralized storage of large amounts of data in a simple way and increases the resilience of the network.
- a disadvantage of peer-to-peer networks, in addition to the high demands on the performance of the terminals is often seen the lack of opportunity to monitor based on communication.
- This monitoring i. the interception of telephone conversations or the reading of e-mails, short messages (so-called SMS), faxes, etc. are read on the basis of legal provisions and / or regulations is a requirement of many facilities to the operators of communication networks. This should usually be prevented on the basis of a judicial decision offenses.
- LMA Law Enforcement Agency
- a so-called Lawful Interception interface for data transmission between the telecommunications network operator or telecommunications service provider and the monitoring body or authority is set up for this purpose in the telecommunications network.
- data such as e.g. Call content, fax data, connection-relevant data, contents of e-mails or short messages - usually transmitted in real time from the telecommunications network to a monitoring device of the statutory authority or authority.
- ETSI European Telecommunications Standards Institute
- CALEA Communications Assistance for Law Enforcement Act
- PTSC LAES Packet Technologies and Systems Committee Lawfully Authorized Electronic Surveillance
- WTSC LI Wireless Technologies and Systems Lawful Intercept Committee
- the invention has for its object to provide a method by which judicial listening in peer-to-peer networks zen can be realized.
- this is done with a method of the type mentioned above, are marked at the participants to be monitored, in which further in the establishment of a peer-to-peer communication with a marked subscriber, the connection is redirected via a monitoring server and in which with a suitable service of Monitoring server access to the communication data takes place.
- the way of marking the subscriber depends on the architecture of the network. In a centralized architecture of the peer-to-peer network, where one or more Server are responsible for the search for data, the marking of the subscriber takes place in an advantageous manner in the search servers.
- the peer-to-peer network shown schematically in the figures comprises a first subscriber A and a second subscriber B, and a monitoring server MID server.
- the communication of the second party B is to be monitored on the basis of a judicial order.
- the second participant is marked by appropriate means, i. its data in the distributed peer-to-peer database will be supplemented accordingly.
- the decentralized (pure) peer-to-peer networks which dispense with any centralized facilities and have no hierarchy in the network, the marking is made in the application software of each participant itself.
- the third category of peer-to-peer network architectures represents a hybrid of the two other network forms.
- so-called super-peers with connected "clients” form clusters, where the super peer manages meta information about the connected clients, in this architecture the super peer lends itself as the bearer of the listening mark.
- Subscriber A and the called to be monitored second subscriber B detected and then the data connection is not - as common in peer-to-peer networks generally common, directly between the two participants A, B, but redirected via a U- monitoring server MID server.
- the monitoring server MID server now includes the means for providing a monitoring interface, for example according to ES 201 671 Telecommunications Security; Lawful interception (LI); Handover Interface for Lawful Interception of Telecommunications Traffic; TS 101 232 Telecommunications Security; Lawful interception (LI); Handover Specification for IP delivery, etc., which have been published by the Technical Committee on Law Interception (TC LI) of the European Telecommunications Standards Institute (ETSI).
- TC LI Technical Committee on Law Interception
- ETSI European Telecommunications Standards Institute
- Figure 2 shows schematically the situation after the connection setup during the communication process, so for example a telephone call, a chat, etc.
- the complete data flow takes place via the monitoring server MID-Server so that the data can be monitored via the monitoring interface.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to a procedure for judicial monitoring in peer-to-peer networks, in which participants to be monitored are marked, and in which furthermore upon setting up a peer-to-peer communication with a marked participant the connection is diverted via a monitoring server and access to the communication data takes place with an appropriate monitoring server service. This realizes the requirement for judicial monitoring in a simple way.
Description
Beschreibungdescription
Richterliches Mithören bei Peer-to-peer NetzenJudicial monitoring in peer-to-peer networks
Technisches GebietTechnical area
Die Erfindung betrifft ein Verfahren zum richterlichen Mithören bei Peer-to-peer Netzen.The invention relates to a method for judicial monitoring in peer-to-peer networks.
Stand der TechnikState of the art
Peer-to-peer Netze sind Netzwerke ohne zentrale Zugriffskontrolle, bei denen alle Teilnehmer (Peers) gleichberechtigt agieren. Eine Verbindung besteht dabei im Gegensatz zuPeer-to-peer networks are networks without central access control, in which all participants (peers) act on an equal footing. A connection exists in contrast to
Client-Server Systemen direkt zwischen zwei Teilnehmern ohne Zwischenschaltung eines Netzwerkservers. Der Verzicht auf zentrale Server fuhrt zu einer Reduktion des Datenverkehrs im Netz, ermöglicht auf einfache Weise die dezentrale Speiche- rung großer Datenmengen und erhöht die Ausfallsicherheit des Netzes. Nachteilig an Peer-to-peer Netzen wird neben den hohen Anforderungen an die Leistung der Endgerate oftmals auch die fehlende Möglichkeit gesehen, eine darauf basierende Kommunikation zu überwachen.Client-server systems directly between two nodes without interposing a network server. The omission of central servers leads to a reduction of data traffic in the network, enables the decentralized storage of large amounts of data in a simple way and increases the resilience of the network. A disadvantage of peer-to-peer networks, in addition to the high demands on the performance of the terminals is often seen the lack of opportunity to monitor based on communication.
Diese Überwachung d.h. das Abhören von Telefongesprächen oder aber auch das Mitlesen von E-Mails, Kurzmittelungen (so genannte SMS), Faxe, etc. mitgelesen werden auf der Basis gesetzlicher Bestimmungen und/oder Verordnungen ist eine Forde- rung vieler Statten an die Betreiber von Kommunikationsnetzen. Damit sollen üblicherweise auf Basis einer richterlichen Entscheidung Straftaten verhindert werden.This monitoring, i. the interception of telephone conversations or the reading of e-mails, short messages (so-called SMS), faxes, etc. are read on the basis of legal provisions and / or regulations is a requirement of many facilities to the operators of communication networks. This should usually be prevented on the basis of a judicial decision offenses.
Mit einem englischen Fachausdruck, der so genannten Lawful Interception (LI) wird dabei ein Sicherheitsprozess bezeichnet. Durch diesen wird von einem Betreiber eines Telekommunikationsnetzes oder einem Anbieter von Telekommunikationsdiensten (z.B. Internet-Provider, IP-Telefonie-Anbieter,
etc.) einer zur Überwachung berechtigten staatlichen Stelle oder Behörde (z.B. Polizei, Zollfahndung, etc.), welche allgemein auch als Law Enforcement Agency (LEA) bezeichnet wird, Zugriff auf Telekommunikationsvorgange und -inhalte (z.B. Te- lefongesprache, E-Mail- oder Faxverkehr, verbindungsrelevante Daten wie z.B. gewählte Rufnummer, Rufnummer eines eingehenden Anrufs, etc.) eines bestimmten Teilnehmers ermöglicht.With an English term, the so-called Lawful Interception (LI) is called thereby a security process. By this is by an operator of a telecommunications network or a provider of telecommunications services (eg Internet providers, IP telephony providers, etc.) of a government agency or public authority (eg police, customs investigation, etc.), which is also generally known as a Law Enforcement Agency (LEA), have access to telecommunications processes and content (eg telephone calls, e-mail). or fax, connection-relevant data such as dialed number, phone number of an incoming call, etc.) allows a particular subscriber.
Dabei wird zu diesem Zweck im Telekommunikationsnetz eine so genannte Lawful Interception-Schnittstelle für eine Datenübertragung zwischen dem Telekommunikationsnetzbetreiber oder Telekommunikationsdiensteanbieter und der überwachenden Stelle oder Behörde eingerichtet. Über diese Lawful Interception- Schnittstelle werden dann in einem Uberwachungsfall bei- spielsweise Daten - wie z.B. Anrufinhalte, Faxdaten, verbindungsrelevante Daten, Inhalte von E-Mails oder Kurzmeldungen - meist in Echtzeit aus dem Telekommunikationsnetz zu einer Uberwachungseinrichtung der gesetzliche ermächtigten Stelle oder Behörde übertragen.In this case, a so-called Lawful Interception interface for data transmission between the telecommunications network operator or telecommunications service provider and the monitoring body or authority is set up for this purpose in the telecommunications network. In a surveillance case, for example, data such as e.g. Call content, fax data, connection-relevant data, contents of e-mails or short messages - usually transmitted in real time from the telecommunications network to a monitoring device of the statutory authority or authority.
Zur einfacheren Realisierung von Lawful Interception und um auch eine grenzüberschreitende - z.B. europaweite - Überwachung von Telekommunikationsvorgangen und -inhalten zu ermöglichen, sind für Lawful Interception und die entsprechenden Schnittstellen Standards und technische Spezifikationen entwickelt worden - wie z.B. ES 201 671 Telecommunications Secu- rity; Lawful Interception (LI); Handover Interface for Lawful Interception of Telecommunications Traffic; TS 101 232 Telecommunications Security; Lawful Interception (LI); Handover Specification for IP delivery, etc., welche vom TechnicalFor the easier realization of lawful interception and also for cross-border - e.g. pan-European - to enable monitoring of telecommunications operations and content, standards and technical specifications have been developed for lawful interception and the corresponding interfaces - e.g. ES 201 671 Telecommunications Security; Lawful interception (LI); Handover Interface for Lawful Interception of Telecommunications Traffic; TS 101 232 Telecommunications Security; Lawful interception (LI); Handover Specification for IP delivery, etc., issued by the Technical
Committee on Lawful Interception (TC LI) des European TeIe- commmunications Standards Institute (ETSI) publiziert worden sind. Diese von der ETSI veröffentlichten Standards und technischen Spezifikationen für Lawful Interception werden haupt- sachlich in Europa, in großen Teilen von Asien und teilweise auch in Australien verwendet. Von diesen Standards werden nicht nur sehr detailliert die Architektur eines Systems so-
wie die Schnittstellen für Lawful Interception beschrieben, sondern auch telekommunikationsnetz-spezifische Protokollanforderungen und Prozeduren, welche notwendig sind, um Daten der Telekommunikationsvorgange eines überwachten Teilnehmers vom Telekommunikationsnetzbetreiber bzw. Anbieter von Telekommunikationsdiensten an die gesetzlich zur Überwachung ermächtigte Stelle oder Behörde zu übertragen.Committee on Lawful Interception (TC LI) of the European Telecommunications Standards Institute (ETSI). These standards and technical specifications for Lawful Interception published by ETSI are mainly used in Europe, in large parts of Asia and partly also in Australia. Not only are the architectures of a system very as the interfaces for Lawful Interception described, but also telecommunications network-specific protocol requirements and procedures, which are necessary to transfer data of the telecommunication processes of a monitored participant from the telecommunications network operator or provider of telecommunications services to the legally authorized authority or authority.
In den USA wurden die Grundlagen für Lawful Interception im so genannten Communications Assistance for Law Enforcement Act (CALEA) definiert und durch Veröffentlichungen von verschiedenen Komitees der Alliance for Telecommunications In- dustry Solutions (ATIS) - wie PTSC LAES (Packet Technologies and Systems Committee Lawfully Authorized Electronic Surveil- lance) oder WTSC LI (Wireless Technologies and Systems Committee Lawful Intercept) - für verschiedenen Telekommunikationsnetztypen wie z.B. Mobilfunknetze, IP-basierte Netze, etc. ergänzt .In the US, the foundations for lawful interception have been defined in the Communications Assistance for Law Enforcement Act (CALEA) and published by various committees of the Alliance for Telecommunications Industry Solutions (ATIS), such as PTSC LAES (Packet Technologies and Systems Committee Lawfully Authorized Electronic Surveillance) or WTSC LI (Wireless Technologies and Systems Lawful Intercept Committee) - for various types of telecommunications networks, such as Mobile networks, IP-based networks, etc. added.
Darstellung der ErfindungPresentation of the invention
Der Erfindung liegt die Aufgabe zugrunde, ein Verfahren anzugeben, mit dem richterliches Mithören bei Peer-to-peer Net- zen verwirklicht werden kann.The invention has for its object to provide a method by which judicial listening in peer-to-peer networks zen can be realized.
Erfindungsgemaß geschieht dies mit einem Verfahren der eingangs genannten Art, bei dem zu überwachende Teilnehmer markiert werden, bei dem weiterhin bei Aufbau einer Peer-to-peer Kommunikation mit einem markierten Teilnehmer die Verbindung über einen Uberwachungsserver umgeleitet wird und bei dem mit einem geeigneten Dienst des Uberwachungsservers der Zugriff auf die Kommunikationsdaten erfolgt.According to the invention, this is done with a method of the type mentioned above, are marked at the participants to be monitored, in which further in the establishment of a peer-to-peer communication with a marked subscriber, the connection is redirected via a monitoring server and in which with a suitable service of Monitoring server access to the communication data takes place.
Die Art und Weise der Markierung des Teilnehmers hangt dabei von der Architektur des Netzes ab. Bei einer zentralisierten Architektur des Peer-to-peer Netzes, bei der ein oder mehrere
Server für die Suche nach Daten verantwortlich sind, erfolgt- die Markierung des Teilnehmers in vorteilhafter Weise in den Suchservern .The way of marking the subscriber depends on the architecture of the network. In a centralized architecture of the peer-to-peer network, where one or more Server are responsible for the search for data, the marking of the subscriber takes place in an advantageous manner in the search servers.
In dezentralen Peer-to-peer Netzen, bei denen auf jegliche zentralisierten Einrichtungen verzichtet wird und keinerlei Hierarchie im Netz vorliegt, erfolgt in zweckmäßiger Weise die Markierung in der Applikationssoftware jedes Teilnehmers selbst .In decentralized peer-to-peer networks, which dispenses with any centralized facilities and there is no hierarchy in the network, the marking in the application software of each participant itself takes place in an expedient manner.
Bei den sogenannten Super Peer-to-peer Netzen bieten sich die Super-Peers zur Verwaltung der Markierung für das Abhören an .In super peer-to-peer networks, super-peers are a good way to manage the listening tap.
Kurzbeschreibung der ZeichnungBrief description of the drawing
Die Erfindung wird anhand von zwei Figuren naher erläutert, welche beispielhaft den Ablauf eines erfindungsgemaßen Nach- richtenaustauschs zum richterlichen Mithören in einem schematisch dargestellten Peer-to-peer Netz zeigen.The invention will be explained in more detail with reference to two figures which show, by way of example, the sequence of a message exchange according to the invention for judicial monitoring in a peer-to-peer network shown schematically.
Ausführung der ErfindungEmbodiment of the invention
Das in den Figuren schematisch dargestellte Peer-to-peer Netz umfasst einen ersten Teilnehmer A und einen zweiten Teilnehmer B, sowie einen Uberwachungsserver MID-Server. In dem vorliegenden Beispiel soll auf der Grundlage einer richterlichen Anordnung die Kommunikation des zweiten Teilnehmers B überwacht werden.The peer-to-peer network shown schematically in the figures comprises a first subscriber A and a second subscriber B, and a monitoring server MID server. In the present example, the communication of the second party B is to be monitored on the basis of a judicial order.
Dazu wird mit geeigneten Mitteln der zweite Teilnehmer markiert, d.h. seine Daten in der verteilten Peer-to-peer Daten- basis werden entsprechend ergänzt.For this purpose, the second participant is marked by appropriate means, i. its data in the distributed peer-to-peer database will be supplemented accordingly.
Es ist dabei für das Wesen der Erfindung unerheblich, welche konkrete Netzwerkstruktur zum Einsatz kommt.
So kann bei einer zentralisierten (hybriden) Architektur des Peer-to-peer Netzes, bei der ein oder mehrere Server für die Suche nach Daten verantwortlich sind, die Markierung des Teilnehmers in den Suchservern erfolgen.It is irrelevant to the nature of the invention which concrete network structure is used. Thus, in the case of a centralized (hybrid) architecture of the peer-to-peer network, in which one or more servers are responsible for the search for data, the subscriber can be marked in the search servers.
Bei der zweiten Kategorie von Peer-to-peer Netzen, den dezentralen (puren) Peer-to-peer Netzen, bei denen auf jegliche zentralisierten Einrichtungen verzichtet wird und keinerlei Hierarchie im Netz vorliegt, erfolgt die Markierung in der Applikationssoftware jedes Teilnehmers selbst.In the second category of peer-to-peer networks, the decentralized (pure) peer-to-peer networks, which dispense with any centralized facilities and have no hierarchy in the network, the marking is made in the application software of each participant itself.
Die dritte Kategorie von Peer-to-peer Netzwerkarchitekturen, die so genannten Super Peer-to-peer Netze stellt eine Misch- form der beiden anderen Netzformen dar. In dieser Archtitek- tur bilden so genannte Super-Peers mit verbundenen „Clients" Cluster, wobei der Super-Peer Metainformationen über die angeschlossenen Clients verwaltet. Bei dieser Architektur bietet sich der Super-Peer als Trager der Markierung für das Ab- hören an.The third category of peer-to-peer network architectures, the so-called super peer-to-peer networks, represents a hybrid of the two other network forms. In this architecture, so-called super-peers with connected "clients" form clusters, where the super peer manages meta information about the connected clients, in this architecture the super peer lends itself as the bearer of the listening mark.
Beim beispielhaften Aufbau einer Datenverbindung zu einem solcherart markierten zweiten Teilnehmer B wird also die entsprechend der Netzwerkarchitektur gespeicherte Markierung im Rahmen des Verbindungsaufbaues zwischen dem rufenden erstenIn the exemplary construction of a data connection to a second subscriber B marked in this way, therefore, the marking stored in accordance with the network architecture is established between the calling first user as part of the connection setup
Teilnehmer A und dem gerufenen zu überwachenden zweiten Teilnehmer B erkannt und daraufhin die Datenverbindung nicht - wie bei Peer-to-peer Netzen allgemein üblich, direkt zwischen den beiden Teilnehmern A, B aufgebaut, sondern über einen U- berwachungsserver MID-Server umgeleitet.Subscriber A and the called to be monitored second subscriber B detected and then the data connection is not - as common in peer-to-peer networks generally common, directly between the two participants A, B, but redirected via a U- monitoring server MID server.
Der Uberwachungsserver MID-Server beinhaltet nun die Mittel zur Bereitstellung einer Uberwachungsschnittstelle beispielsweise gemäß ES 201 671 Telecommunications Security; Lawful Interception (LI); Handover Interface for Lawful Interception of Telecommunications Traffic; TS 101 232 Telecommunications Security; Lawful Interception (LI); Handover Specification
for IP delivery, etc., welche vom Technical Committee on Law- ful Interception (TC LI) des European Telecommmunications Standards Institute (ETSI) publiziert worden sind.The monitoring server MID server now includes the means for providing a monitoring interface, for example according to ES 201 671 Telecommunications Security; Lawful interception (LI); Handover Interface for Lawful Interception of Telecommunications Traffic; TS 101 232 Telecommunications Security; Lawful interception (LI); Handover Specification for IP delivery, etc., which have been published by the Technical Committee on Law Interception (TC LI) of the European Telecommunications Standards Institute (ETSI).
Figur 2 zeigt schematisch die Situation nach dem Verbindungsaufbau wahrend des Kommunikationsvorganges, also beispielsweise eines Telefongespräches, eines Chats etc.Figure 2 shows schematically the situation after the connection setup during the communication process, so for example a telephone call, a chat, etc.
Der vollständige Datenfluss erfolgt dabei über den Uberwa- chungsserver MID-Server, sodass über die Uberwachungsschnitt- stelle die Daten entsprechend überwacht werden können.
The complete data flow takes place via the monitoring server MID-Server so that the data can be monitored via the monitoring interface.
Claims
1. Verfahren zum richterlichen Mithören bei Peer-to-peer Netzen dadurch gekennzeichnet, dass zu überwachende1. A method for judicial listening in peer-to-peer networks, characterized in that to be monitored
Teilnehmer markiert werden, dass weiterhin bei Aufbau einer Peer-to-peer Kommunikation mit einem markierten Teilnehmer die Verbindung über einen Uberwachungsserver umgeleitet wird und dass mit einem geeigneten Dienst des Uberwachungsservers der Zugriff auf die Kommunikationsdaten erfolgt.Subscribers are marked, that continues to be redirected when establishing a peer-to-peer communication with a marked subscriber, the connection via a monitoring server and that takes place with a suitable service of the monitoring server access to the communication data.
2. Verfahren nach Anspruch 1, dadurch gekennzeichnet, dass bei einer zentralisierten Architektur des Peer-to-peer Netzes, bei der ein oder mehrere Server für die Suche nach Daten verantwortlich sind, die Markierung des Teilnehmers in den Suchservern erfolgen.2. The method according to claim 1, characterized in that in a centralized architecture of the peer-to-peer network, in which one or more servers are responsible for the search for data, the marking of the subscriber in the search servers.
3. Verfahren nach Anspruch 1, dadurch gekennzeichnet, dass bei dezentralen Peer-to-peer Netzen, bei denen auf jegliche zentralisierten Einrichtungen verzichtet wird und keinerlei Hierarchie im Netz vorliegt, die Markierung in der Applikationssoftware jedes Teilnehmers selbst erfolgt .3. The method according to claim 1, characterized in that in decentralized peer-to-peer networks, which dispense with any centralized facilities and no hierarchy in the network, the marking in the application software of each participant takes place itself.
4. Verfahren nach Anspruch 1, dadurch gekennzeichnet, dass bei Super Peer-to-peer Netzen die Super-Peers die Markierung für das Abhören verwalten. 4. The method according to claim 1, characterized in that the super-peers manage the marking for listening in super peer-to-peer networks.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07728242A EP2014069A1 (en) | 2006-04-21 | 2007-04-18 | Judicial monitoring on peer-to-peer networks |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06112877A EP1848188A1 (en) | 2006-04-21 | 2006-04-21 | Method for monitoring a conversation on a peer to peer network |
PCT/EP2007/053780 WO2007122160A1 (en) | 2006-04-21 | 2007-04-18 | Judicial monitoring on peer-to-peer networks |
EP07728242A EP2014069A1 (en) | 2006-04-21 | 2007-04-18 | Judicial monitoring on peer-to-peer networks |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2014069A1 true EP2014069A1 (en) | 2009-01-14 |
Family
ID=37072441
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06112877A Withdrawn EP1848188A1 (en) | 2006-04-21 | 2006-04-21 | Method for monitoring a conversation on a peer to peer network |
EP07728242A Withdrawn EP2014069A1 (en) | 2006-04-21 | 2007-04-18 | Judicial monitoring on peer-to-peer networks |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06112877A Withdrawn EP1848188A1 (en) | 2006-04-21 | 2006-04-21 | Method for monitoring a conversation on a peer to peer network |
Country Status (5)
Country | Link |
---|---|
US (1) | US20090276521A1 (en) |
EP (2) | EP1848188A1 (en) |
KR (1) | KR20080113285A (en) |
CN (1) | CN101480030A (en) |
WO (1) | WO2007122160A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8627060B2 (en) * | 2008-04-30 | 2014-01-07 | Viasat, Inc. | Trusted network interface |
EP2227048A1 (en) * | 2009-03-05 | 2010-09-08 | France Telecom | Method for managing user profiles in a peer-to-peer network |
US9432407B1 (en) | 2010-12-27 | 2016-08-30 | Amazon Technologies, Inc. | Providing and accessing data in a standard-compliant manner |
EP3270561A1 (en) * | 2016-07-14 | 2018-01-17 | Telefonica Digital España, S.L.U. | Method and system for providing lawful interception in a peer to peer communication |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020069098A1 (en) * | 2000-08-31 | 2002-06-06 | Infoseer, Inc. | System and method for protecting proprietary material on computer networks |
EP1490767B1 (en) * | 2001-04-05 | 2014-06-11 | Audible Magic Corporation | Copyright detection and protection system and method |
ES2229073T3 (en) * | 2002-08-08 | 2005-04-16 | Alcatel | LEGAL INTERCEPTATION OF VOIP CALLS ON IP-BASED NETWORKS. |
US7490323B2 (en) * | 2004-02-13 | 2009-02-10 | International Business Machines Corporation | Method and system for monitoring distributed applications on-demand |
US7716324B2 (en) * | 2004-05-12 | 2010-05-11 | Baytsp.Com, Inc. | Identification and tracking of digital content distributors on wide area networks |
-
2006
- 2006-04-21 EP EP06112877A patent/EP1848188A1/en not_active Withdrawn
-
2007
- 2007-04-18 WO PCT/EP2007/053780 patent/WO2007122160A1/en active Application Filing
- 2007-04-18 CN CNA2007800142570A patent/CN101480030A/en active Pending
- 2007-04-18 KR KR1020087028136A patent/KR20080113285A/en not_active Application Discontinuation
- 2007-04-18 US US12/297,932 patent/US20090276521A1/en not_active Abandoned
- 2007-04-18 EP EP07728242A patent/EP2014069A1/en not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
See references of WO2007122160A1 * |
Also Published As
Publication number | Publication date |
---|---|
CN101480030A (en) | 2009-07-08 |
WO2007122160A1 (en) | 2007-11-01 |
EP1848188A1 (en) | 2007-10-24 |
KR20080113285A (en) | 2008-12-29 |
US20090276521A1 (en) | 2009-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2005699B1 (en) | Method for lawful interception in the case of call forwarding in a packet-oriented telecommunications network | |
WO2003049367A2 (en) | Method for making available features for alternative connections of primary connections | |
WO2006111357A1 (en) | Method, network unit and system for providing subscriber information of a group call to an interception unit | |
WO2007122160A1 (en) | Judicial monitoring on peer-to-peer networks | |
DE10056823A1 (en) | Method for carrying out a service for the automatic transmission of packet data as well as communication network, information computer and program module therefor | |
EP1929758B1 (en) | Method for activation of at least one further eavesdropping measure in at least one communication network | |
EP1430693B1 (en) | Method and device for implementation of a firewall application for communication data | |
WO2006097429A1 (en) | Protocol extension of an iri information message for a legitimate bugging | |
EP1929748B1 (en) | Absence assistance system for multimedia-enabled communication systems | |
EP1378108A2 (en) | Method for carrying out monitoring measures and information searches in telecommunication and data networks with, for instance, internet protocol (ip) | |
DE102007044307A1 (en) | Method for Porting and Arranging Numbers in IMS Domains | |
EP2025141B1 (en) | Method for forwarding a message, computer unit, and communication system | |
EP2392127B1 (en) | Method for establishing and managing a connection of a mobile communication terminal to a private branch exchange | |
DE202010013573U1 (en) | Conversational switching system | |
WO2005117396A1 (en) | Method and device for exchanging subscriber information in a communications system | |
EP1422910A2 (en) | Mode of operation for a communication system | |
DE102009047784B4 (en) | Judicial monitoring in multimedia services | |
DE10241197A1 (en) | Signalization information forwarding method for data communications network with selective protocol conversion dependent on protocol required by target device | |
EP1345457A1 (en) | Interlinking of PBXs | |
DE102008059522A1 (en) | Method for automatic diverting of voice over internet protocol communication, involves directing communication from transmitter to voice over internet protocol receiver | |
WO2004068875A1 (en) | Method and arrangement for establishing a communication link by means of a transmission network | |
DE10120041A1 (en) | Monitoring states of telecommunications terminals and systems involves passing signaling data between network nodes using FACILITY message based on QSIG standard | |
EP1178655A2 (en) | Activation and desactivation of services | |
DE102008052948A1 (en) | Method for communication by means of a switching device and switching device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20081121 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
17Q | First examination report despatched |
Effective date: 20090210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20090623 |