Method of monitoring a subscriber of an intelligent network

Telephonic communications – Diagnostic testing – malfunction indication – or electrical... – Monitoring

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C379S007000

Reexamination Certificate

active

06560316

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention lies in the telecommunications field and, more specifically, to surveillance processes in telecommunications.
In particular, the present invention relates to a method for monitoring a communications link, in particular a telephone call, between two communications subscribers. At least one of the call participants is a subscriber to be monitored. The identifier (for example the IN number or the “Personal User Identity”) of the subscriber(s) to be monitored is flagged. The flag contains an indication of which third communications subscriber or subscribers is/are to be authorized to monitor a communications link to the subscriber(s) to be monitored. If a subscriber under surveillance is called or calls a second communications subscriber, a conference loop between the subscriber which is to be monitored, the calling or called second communications subscriber and the communications subscriber authorized to monitor is set up. National and international laws require that operators of a public, and in future it is expected also of a private, network should permit so-called authorized agencies (police, secret service, etc.) to monitor the telecommunications traffic of persons under suspicion, in compliance with certain legal regulations for the protection of communications subscribers (for example court orders). While this is relatively easy to do in the local exchange of the subscriber to be monitored in the case of conventional fixed-line telephone networks by flagging the corresponding subscriber data record and setting up a type of conference loop to the authorized agency, in intelligent networks (IN) there is a basic problem. This results from the division of the functions of signaling and of voice traffic between different network components. In the case of IN calls, it is generally not defined in advance which exchanges (VSt) calls of a subscriber which is to be monitored will pass through. In addition, all the data that are required for the monitoring operation (including IN numbers and fixed-network call numbers of the communications parties) are not available at the same location.
My earlier PCT publication WO 97/41678 specifies a method for monitoring a communications link which is suitable for communications services with IN services. However, for each monitoring action on the INAP interface it may be necessary to transmit large quantities of data between the Service Control Point (SCP) and the exchange.
SUMMARY OF THE INVENTION
It is accordingly an object of the invention to provide a method of monitoring a communications subscriber in an intelligent network, which overcomes the above-mentioned disadvantages of the heretofore-known methods of this general type and which provides for an improved method for monitoring a communications link.
With the foregoing and other objects in view there is provided, in accordance with the invention, a method of monitoring a subscriber of an intelligent network, which comprises:
flagging an identifier of a subscriber to be monitored in a database, the flagging including an indication of a third communications subscriber authorized to monitor a communications link to the subscriber to be monitored;
upon an establishment of a communications link between the subscriber to be monitored and a second communications subscriber (subscriber A is being called or calls subscriber B), setting up a conference loop between the subscriber to be monitored, the second communications subscriber, and the third communications subscriber authorized to monitor the communications link between the subscriber to be monitored and the second subscriber;
transmitting, for subscribers of an intelligent network, characteristic subscriber data to an authorized, third communications subscriber; and
informing the exchange that has initiated the link to the database about the monitoring measure by transmitting an unambiguous identifier pointing to supplementary information necessary for the monitoring.
In other words, the procedure adopted here is as follows: the identifier (for example the IN number or the “Personal User Identity”) of the subscriber which is to be monitored is flagged in the Service Control Point (SCP). This flagging contains, inter alia, an indication of which authorized agencies are provided with a monitoring facility. In an extension of the IN-specific protocol (INAP) between the SCP and the Service Switching Point (SSP) (usually in the transit exchange TE of the calling subscriber), the SSP is informed that a telephone call should be monitored. However, in this context, not all the supplementary information which is necessary for the monitoring operation such as (a) the start and end of the monitoring measure, (b) the designation of the addresses of the monitoring authorized agencies, and (c) order number, are transferred but rather just one unambiguous identifier. If this identifier is already known to the exchange in which the SSP is located (for example from an earlier monitoring operation), all the further necessary supplementary information is stored and a conference loop is set up to the authorized agency. The link data (fixed-network call numbers, IN numbers, time, duration of the call) and the contents of the call or of the data link are transferred online to the authorized agency. Otherwise, the exchange must interrogate the necessary supplementary information from the SCP or from another suitable database before the conference loop can be set up.
With this procedure according to the invention, the data transfer between the SSP and the SCP can be reduced to a minimum.
In accordance with an added mode of the invention, the conference loop is set up with the exchange that initiated the link to the database.
In accordance with an additional feature of the invention, the supplementary information necessary for the monitoring is stored at a central location, such as in the SCP. An extended INAP interface is used for the interrogation. However, it can also be stored in any other database at a central location so that the exchanges can access the information via a management interface.
A further advantageous refinement of the invention provides for the supplementary information to remain stored in the exchange even after the termination of the monitoring action. In this way, it is ready for later re-use and does not have to be explicitly requested again.
In accordance with another feature of the invention, the unambiguous identifier is not known at the exchange, and the necessary supplementary information is requested with the exchange after receiving the identifier.
In accordance with a further feature of the invention, the supplementary information is stored in the exchange.
In accordance with again an added feature of the invention, the supplementary information is deleted after an end of a monitoring time period or upon receiving a deletion order. So that the storage capacity of the exchange is not overloaded, in particular by supplementary information for monitoring actions which have already terminated, it is advantageous if, for example, the exchange can be instructed by the SCP, by means of a delete instruction, to delete the stored supplementary information.
In accordance with an extended embodiment of the invention, the addresses of those exchanges that have stored supplementary information are stored at a central location. In this embodiment, the SCP or another suitable database in turn stores the time at which and the exchange to which supplementary information has been sent. In this context, cyclical deletion may also be carried out, that is to say those exchanges which have been sent the supplementary information a maximum (or the longest) time prior to that point can be requested to perform deletion. The deletion prevents monitoring information which in unimportant, because it is no longer current, from taking up memory location for the exchange.
In accordance with a concomitant feature of the invention, deletion orders are transmitted to those exchanges which have

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of monitoring a subscriber of an intelligent network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of monitoring a subscriber of an intelligent network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of monitoring a subscriber of an intelligent network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3038171

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.