摘要:
An interception target terminal includes an interception module, and the interception module activates an interception function on the basis of interception related information received from a communication business system. In addition, when a communication mode is changed in the state where an interception function is in an activated state, if a network to be accessed depending on a change of the communication mode is a network that is permitted to be intercepted, corresponding access details information is transmitted to a communication service system or a law enforcement agency system. Further, when the terminal performs communication by an encryption method in the state where the interception function is in the activated state, an encryption key used for encryption or communication data before the encryption is transmitted to the communication service system or the law enforcement agency system.
摘要:
Disclosed is an interception method that interworks with a communication network and an Internet network. A law enforcement agency system verifies whether an interception target presently uses an Internet service by using a terminal other than a terminal registered as the interception target on the basis of Internet service access information of the interception target. When the interception target uses the Internet service by using the other terminal, the law enforcement agency system updates interception target information on the basis of IP address information of the corresponding terminal, which is included in the Internet service access information and transmits the updated interception target information to a communication service provider.
摘要:
A lawful interception apparatus activates, invocates, and terminates a lawful interception using a SIP (session initiation protocol) message that is transmitted and received between a terminal to be intercepted and an IP multimedia subsystem.
摘要:
A system for electronic monitoring includes a control server and a plurality of monitoring servers. The control server transmits electronic monitoring instructions including identification information on terminals to a plurality of monitoring servers, respectively, based on information of objects to be monitored stored in a database, receives an object confirmation request message including information on suspect object packets from a first monitoring server among the plurality of monitoring servers, and determines whether the monitoring object terminals correspond to suspect object terminals that transmit or receive the suspect object packets according to the object confirmation request message based on the information on the monitoring objects. When the suspect object terminals are the monitoring object terminals, the control server updates the database based on the information on the suspect object packets.