Systems and methods for lawful interception of electronic information for internet of things

ABSTRACT

A method for providing lawful interception information for an Internet of Things network (IoT Network) is provided. The method is performed by a topology of probes and comprises: receiving, through an interface, a request for information about a lawful interception target, the request including a specification for the information to be tracked and reported; generating a hierarchy of information elements based on the specification; determining a set of data sources for providing the requested information according to the hierarchy of information elements; determining a hierarchy of probes based on the set of the data sources; configuring the topology of probes based on a set of configurations; activating LI operation in the topology of probes; performing LI operation by the topology of probes; verifying effectiveness of reporting conforming to reporting requirements and taking corrective action; and updating learning data in the historical database at the end of LI operation.

TECHNICAL FIELD

This disclosure relates generally to network technologies, and more particularly, to methods and systems for performing lawful interception (LI) for Internet of Things (IoT).

BACKGROUND

With the proliferation of IoT, an ever-increasing number of IoT devices are being connected to the network. The IoT devices may be diverse and heterogeneous. Further, an IoT device may be part of one or more IoT networks at any given instant, may be mobile or stationary, may be communicating for various purposes.

A number of challenges arise with respect to enabling effective lawful interception (LI) over the IoT networks. For example, LI can be performed for intercepting information transmitted by a Car-IoT network, in order to determine a location of the vehicle, activities performed by a suspect driver, presence of a list of IoT devices connected with the Car-IoT network, etc. Existing LI mechanism for telephone networks (Telco-LI) may provide some of these information. For example, Telco-LI can provide location information based on base station locations and hand-over (HO) activities. However, this is not precise and comes with time-lag. Also, the speed and direction information is likely to be inaccurate.

Moreover, while Telco-LI may provide information on the online activities (call, content, data) in case the activities happen through TelCo infrastructure, the nature of additional devices connected, nature of activities (transaction, etc.) of the suspect and events related to the usage of the Car-IoT including additional devices by the suspect cannot be tracked using TelCo-LI. TelCo-LI also fails to provide other information, such as driving behavior of the driver (speed pattern, route selection, change route, stoppages), activities (ex. fueling, maintenance, accessing traffic information, etc.) performed through the Car-IoT devices, etc.

There are also other attributes of Telco-LI that make it unsuitable for LI for IoT. For example, the nature of tracking for IoT can be very different depending on the nature of the IoT networks, and scope and type of investigation. Hence what is required to be tracked and the information required to be tracked can be quite different for different scenarios. Moreover, the number of devices involved and the amount of content and event information can be very large. Sending such data in original form on a real-time/semi-real-time basis to the LI is likely to impose network resource constraint and may hamper the activities those are being tracked. Also, it is likely to be a constraint on the LEA to process such large data to extract relevant information for investigation for effective LI. Since the nature of information required from different LI probes in IoT network scenario is different in priority and frequency of tracking, the LI would require relevant and related information to be sent based on priority and frequency instead of sending raw information from individual probes. On the other hand, Telco-LI typically has standard LI probes and interfaces in the network, and may not be able to provide the configuration flexibility demanded by different types of IoT networks and devices, and for different scopes and types of investigation.

SUMMARY

Embodiments of the present disclosure present technological improvements as solutions to one or more of the above-mentioned technical problems recognized by the inventors.

Embodiments of the present disclosure provide a system and a method for effective LI that has the ability to determine the tracking requirement, ensure that the LI receives all the required information in correct form and in a timely manner.

Consistent with embodiments of the present disclosure, a system may obtain tracking specification from a law enforcement agency (LEA) about a LI target. The tracking specification may include information-structure, events/activity, priority, frequency of sampling, etc. Based on the tracking specification, the system may generate LI information structural details based on relationship and dependencies.

The system can also perform a set of learnings to improve the likelihood that the LEA receives all the requested information. For example, the system may determine LI information source topology, which may include sources of information for the determined LI information structure to cater to the LI tracking requirements, as well as probe-topology and their roles and responsibilities based on the LI information structure. The system may also configure LI operation, which may include probe level configuration and probe delegation information (Probe-DI) base on probe-topology, as well as roles and responsibility assigned to the probes. The configuration of LI operation may also include determining LI activation condition for the probes based on the probe-topology, as well as a frequency of LI information processing for each probe in the probe-topology. The system may also monitor, for example, probe level operation and performance, as well as information sufficiency and quality, to ensure availability of LI information as per LI information structure. The system may also trigger and perform re-configuration actions on encountering exception and/or deficiency of information collected. The system may also prepare probe-level information to be reported based on required information/event structure, priority, frequency of reporting, frequency of sampling, etc., and schedule LI information delivery according to these information. Some or all of these operations can be performed to improve the likelihood that the LI operations are performed according to the specification, that the LEA can receive the information it requests for, in correct form and in proper manner.

Consistent with embodiments of the present disclosure, the system may also perform LI effectiveness assessment, to further improve the LI operations. For example, the system may perform assessment of LI effectiveness using current information collected during the LI session, as well as identification of LI configuration/operational parameters requiring adjustments. The system may determine and apply adjustments to the identified parameters, to improve the LI operations.

With the embodiments of the present disclosure, LI operations can become more effective.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles.

FIG. 1 is a block diagram of an exemplary system for lawful interception, according to embodiments of the present disclosure.

FIG. 2 is a functional block diagram of an exemplary subsystem for lawful interception, according to some embodiments of the present disclosure.

FIG. 3 is a diagram illustrating an exemplary information element hierarchy according to some embodiments of the present disclosure.

FIGS. 4A-4B are diagram illustrating exemplary data representing an exemplary probe hierarchy according to some embodiments of the present disclosure.

FIG. 5 is a diagram illustrating an exemplary data structure for storing operation data according to some embodiments of the present disclosure.

FIG. 6 is a functional block diagram of an exemplary subsystem for lawful interception, according to some embodiments of the present disclosure.

FIG. 7 is a diagram illustrating an exemplary data structure for storing operation data according to some embodiments of the present disclosure.

FIG. 8 is a flowchart illustrating an exemplary method for lawful interception according to some embodiments of the present disclosure.

FIG. 9 is a flowchart illustrating an exemplary method for lawful interception according to some embodiments of the present disclosure.

FIG. 10 is a flowchart illustrating an exemplary method for configuring a system for lawful interception according to some embodiments of the present disclosure.

FIGS. 11 and 12 are block diagrams of exemplary systems for implementing embodiments consistent with the present disclosure.

DETAILED DESCRIPTION

Exemplary embodiments are described with reference to the accompanying drawings. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. Wherever convenient, the same reference numbers are used throughout the drawings to refer to the same or like parts. While examples and features of disclosed principles are described herein, modifications, adaptations, and other implementations are possible without departing from the spirit and scope of the disclosed embodiments. It is intended that the following detailed description be considered as exemplary only, with the true scope and spirit being indicated by the following claims.

FIG. 1 illustrates an exemplary system 100 for performing lawful interception (LI) operations, consistent with embodiments of the present disclosure. As shown in FIG. 1, system 100 includes an IoT network topology, which comprises an IoT gateway 102, an interconnect gateway 104, an IoT management application 106, an IoT central database (IoT CDB) 108, an IoT super-probe (IoTSP) 110, and a lawful interception gateway (LIG) 114.

IoT gateway 102 and Interconnect gateway 104 enable an IoT network (e.g., a network of IoT devices in vehicle 112) to access the core networks/Internet, and to communicate with other devices and other IoT networks. In some embodiments, interconnect gateway 104 may establish a secure communication interface with the IoTSP 110. Interconnect gateway 104 may act as host to a lawful interception (LI) probe plugged into it. Further, interconnect gateway 104 may provide LI information to the LI probe plugged into it, and can act as a conduit for establishing a channel between the LI probe plugged into it and other probes. IoT management application 106 primarily manages the IoT network functions and policies. The IoT management application 106 also keeps track of the communication requests to/from the IoT network. In an embodiment, the IoT management application 106 provides the parameters to be monitored and relevant thresholds for triggering actions during the IoT communication. IoT CDB 108 can store information such as IoT network topology, identity of the network and devices, IoT network location, current IoTGW and ICG associated with the IoT network, etc. IoT CDB 108 can be centrally located, or can be composed of a distributed cluster. Each of interconnect gateway 104, IoT management application 106, and IoT CDB 108 can also host an LI probe. The LI probes can collect information from these components, and transmit the collected information to IoTSP 110, which can provide the information to LEA through a lawful interception gateway (LIG) 114. For the rest of disclosure, it is assumed that LEA and IoTSP 110 communicate only through LIG 114 (or other lawful interception gateway).

LIG 114 can be an entity in the LI administrative domain interacting with various network elements for LI in the IoT network. As shown in FIG. 1, LIG 114 may communicate with IoTSP 110 via multiple interfaces (I1, I2, and I3), with different interfaces carrying different types of data, as is to be discussed in more details below. IoTSP 110 may associate the LI information with certain priority as requested by LEA, and LIG 114 can also transmit the LI information to LEA according to the requested priority.

Internet-of-Thing Super-Probe (IoTSP)

Reference is now made to FIG. 2, which illustrates the exemplary components of Internet-of-things super-probe (IoTSP) 110 of FIG. 1 according to embodiments of the present disclosure. IoTSP 110 can manage the operations of the LI probes which may be plugged into an IoT gateway 102, interconnect gateway 104, IoT management application 106, or any other network element involved in the IoT communication (e.g., IoT CDB 108), and can transmit the collected information to LIG 114 based on a specification received from LEA.

As shown in FIG. 2, IoTSP 110 includes an LI specification handling (LISH) module 202, an LI planning and configuration (LIPC) module 204, an LI activation and control (LIACTRL) module 206, an LI data collection (LIDC) module 208, an LI information preparation (LIIPREP) module 210, and a super-probe communication module (SPCOM) 212.

For the purposes of this disclosure, “modules” may be implemented in software, hardware, firmware, a mix of any of those, or the like. For example, if the disclosed “modules” are implemented in software, they may be stored in a memory associated with system 200. Processors, I/O devices, and memory devices may be used to perform processes to implement and facilitate operations of the modules. Thus, the modules may include code instructions executable by one or more processors, alone or in various combinations with other modules disclosed in this or other embodiments. If the disclosed “modules” are implemented in hardware, they may comprise an embedded system or other dedicated hardware configured by machine code, assembly code, or the like to interact with other modules to perform functions consistent with disclosed embodiments.

LI Specification Handling (LISH) Module

In some embodiments, LISH module 202 can receive an LI specification (LISP) from the LIG. The LISP may include information to be tracked about the LI target. As an illustrative example, for tracking a LI target driving a vehicle, the LISP may specify that data related to location and movement of the car-IoT of the vehicle, driving behavior of the driver (e.g., speed pattern, route selection, change route, stoppages, etc.), and activities (e.g., fueling, maintenance, accessing traffic information, etc.) performed through the Car-IoT devices, are to be intercepted and recorded. LISP may also provide additional details about the information to be tracked, such as information-format/structure, events/activity, criticality/importance, priority, frequency of reporting, the processing logics for the information, etc.

LISH module 202 may process the LISP received from the LIG, and create a structured tree of LI Information Elements (LIIE). Each LIIE may include a data structure that stores information related to, for example, details of Communication content and/or event (type, format, etc.), priority (relative priority as per the LISP), criticality (Pre-defined levels of criticality), frequency of reporting, etc. LISH module 202 may also determine whether there exists any kind of data dependences between the LIIEs, expressed in the form of elementary-LIIE dependency relationships (ELIIEDR). Based on the data dependencies, LISH module 202 can construct an LIIE tree to represent the hierarchical and dependency relationships. As is to be discussed in more detail below, LISH module 202 can provide the LIIE tree to LIPC module 204 for further use. In some embodiments, the LISH module 202 may simply extract the LISP and send it to the LIPC module 204, based on which the LIPC module 204 may create the structured tree of LI Information Elements (LIIE) from the LISP.

The LISP may also include a set of rules for handling certain types of collected data, which can be processed by LISH module 202. For example, the collected data by the LI probes may include bulk-LI-information/bulk data (BU-DAT), which can include prepared information, raw communication content, sensor data and events, etc. Although BU-DAT may be required for legal evidence at a later stage, the volume of BU-DAT is typically very large, which makes it unsuitable to transmit those data in real-time (or semi real-time). Therefore, IoTSP 110 may include dedicated high speed interfaces for real-time (or semi real-time) transmission of some of the LI data, and dedicated low-speed interfaces for slow/deferred transmission of BU-DAT. The LISP may include rules for configuring the interfaces for, for example, the slow/deferred transmission of BU-DAT.

The interfaces can be implemented as one of: a circuit-switched wired interface such as E1 or T1, a packet-switched wired interface such as Ethernet, or a wireless interface such as Wi-Fi or 4G. E1 can include a system of digital transmission with a data rate of 2.048 megabits per second using time division multiplexing. Moreover, T1 can include a system of digital transmission with a data rate of 1.544 megabits per second using time division multiplexing.

Moreover, the BU-DAT data may also be too voluminous to be permanently stored in IoTSP. Therefore, the LISP may specify information for handling of BU-DAT (BDH). For example, LISP may specify that IoTSP is to store BU-DAT for a specified duration, and to inform LIG to acquire the BU-DAT if storage space is unavailable at IoTSP. LISP may define capacity based recycling of BU-DAT at IoTSP, such as time-stamp based overwriting, storage space allocation policy for different data types, etc. LISH module 202 can extract the BDH information from LISP, and provide that information to LIPC module 204 for further use.

In some embodiments, LISP may also contain a query from the LEA for available options for BDH as supported by IoTSP 110. In that case, LISH module 202 may obtain list of available modes for bulk data handling (AMBDH), and the default mode of BDH (DMBDH) from LIPC module 204. The DMBDH can be provisioned by the operator (e.g., time-stamp based overwriting). LISH module 202 can then transmit the AMBDH information via super-probe communication (SPCOM) module 212 to LIG 114, which in turn can transmit the AMBDH information to LEA. LEA may, in response, transmit a preferred bulk data handling option (LPBDH) to LIG 114, which then forward the LPBDH to LISH module 202. In case LPBDH was received from LEA, LISH module 202 can update the DMBDH as LPBDH for this particular LISP, and inform LIPC module 204 about the updating of DMBDH.

LI Planning and Configuration (LIPC) Module

In some embodiments, LIPC module 204 can store a set of configuration and performance data, and perform planning and configuration for initiating and managing LI operations as part of IoTSP 110. LIPC module 204 may maintain an IoTSP configuration storage (IoTSPCS) to store a set of probe configuration details (PRODET) about each LI probe being managed by IoTSP 110. The following exemplary table illustrates a set of information that can be included in PRODET:

TABLE 1 Nature or probe Capability Past Performance Data aggregator Storage limit Probe past performance Data processor Frequency of Past performances of the sampling (FoS) interfaces of the probes Data collector Processing logic Interfaces supported, and resources to be allocated for each interface for LI operation

Probe past performance (PRODET-PASTPERF) data, included as part of PRODET, may also include a set of information related to past performance of the probes, such as a success indicator that indicates a percentage of successful and/or timely deliveries of intercepted information to the next-higher level (upstream) probe in the probe topology. The set of information may also include information indicating a health condition of the probes. As is to be discussed in more details below, these information can be used for assessing the performance of LI probes and for determination of configuration updates to these probes.

The health condition information may include, for example, durations in which the probe was operational or out-of-service, stability of operation (e.g., how often the probe toggles between being operational and being out-of-service, security and resource constrains. In some embodiments, PRODET-PASTPERF can include trend information as well as the average (weighted, simple, etc.) of a set of operational parameters of the probe, such as success rate of event processing (H-PR-SUCC-EVT-PROC), success rate of content processing (H-PR-SUCC-CONT-PROC), success in aggregation (H-PR-SUCC-AGGREG), success rate of information delivery (H-PR-SUCC-INFO-DELIV), success rate of timely information delivery (H-PR-SUCC-TIMELY-DELIV), exception conditions encountered (which may include a type and a frequency for handling different exception types) (H-PR-EXCEP-COUNT), success rate of handling of exception conditions (H-PR-EXCEP-HANDLED), and effectiveness (H-PR-EFFECTIVENESS).

LIPC module 204 may also store, in IoTSPCS, past performance information of IoTSP 110 (IoTSP-PAST-PERF). The performance may be related to the LI information processing and delivery by IoTSP 110 to LIG 114. In some embodiments, IoTSP-PAST-PERF may also include trend information as well as the average (weighted, simple, etc.) of a set of operational parameters including success rate of delivery to LIG (H-IoTSP-SUCC-INFO-DELIV), success rate of timely delivery to LIG (H-IoTSP-SUCC-TIMELY-DELIV), exception conditions encountered (H-IoT-EXCEP-COUNT), success rate of handling of exception conditions (H-IoTSP-EXCEP-HANDLED), and effectiveness (H-IoTSP-EFFECTIVENESS).

LIPC module 204 may also store other information, including thresholds for diagnosis of the LI operations, as well as bulk data handling information, such as AMBDH and DMBDH, in the IoTSPCS.

LIPC module 204 may also perform a set of planning functions. For example, LIPC module 204 may create an LI information structure comprising a number of LIIE (LI information elements) based on data dependences between the LIIEs provided by LISH module 202, as well as pre-configured information and inputs received in the LISP. An example of such a LI information hierarchy is shown in FIG. 3. Referring to FIG. 3, LIIEs labelled L1, L2, and L3 can be primary LIIEs (PLIIE), and LIIEs labelled L11, L12, L31, L32, L311, and L312 can be underlying LIIEs (ULIIE). The hierarchy can be determined based on elementary-LIIE dependency relationships (ELIIEDR). ELIIEDR may include pre-configured information and inputs received in the LISP.

As part of the planning functions, LIPC module 204 may also determine information source identification and mapping, by which LIPC module 204 determines the information mapping and processing logic to prepare each LIIE by the concerned probe, as well as to LIIPREP module 210, in the IoTSP. Moreover, LIPC module 204 may also create an LI-probe-topology (LI-PROTOP) for a specific LI operation. The creation of LI-PROTOP can be based on, for example, probes selected for each LIIE, as well as the LIIE hierarchy such as the one shown in FIG. 3. As is to be discussed in more detail below, LI-PROTOP can be used to determine the LI information preparing node (IPN), probe configuration details (Probe-CD), probe delegation Information (Probe-DI), LI activation conditions (LIAC), etc. IPN aggregates the information from downstream nodes for preparing the PLIIE/DLIIE, and then prepares and sends the PLIIE/DLIIE to either an upstream probe, or to LEA. LIAC defines the conditions for activing an LI operation in a probe (or IoTSP). An example of LI-PROTOP is shown in FIG. 4A. As shown in FIG. 4A, Probes 1A, 2A and 5 can be fallback probes having an interface to the IoTSP. The interfaces can be implemented as one of: a circuit-switched wired interface such as E1 or T1, a packet-switched wired interface such as Ethernet, or a wireless interface such as Wi-Fi or 4G.

Probe 1 can be an upstream probe of probes 1.1 and 1.2, and probes 1.1 and 1.2 can be downstream probes of probe 1. There can be a 1:n relationship between an upstream probe and a downstream probe, i.e., a downstream probe can have only one immediately upstream probe under normal conditions.

Probe configuration details (Probe-CD) may include configuration details of each probe, and can include information including, for example, LIIEs to be provided by the probe. For each LIIE to be provided the probe, Probe-CD may further include a set of configuration information, such as frequency of sampling (FoS), frequency of reporting (FoR), processing logic for that LIIE (LIIE-PL), information preparing node (IPN), LI activation condition (LIAC), indication whether the probe is a primary probe or a fallback probe, etc. The set of configuration information may also include dependency information for LIIEs (e.g., based on LI-PROTOP), downstream probes information that provide the dependent LIIE data, etc. Further, the configuration information may also include the priority and criticality of each LIIE to be provided by the probe.

Probe-CD may also include a set of configurations based on past performance data (PRODET-PASTPERF) of the probe. For example, Probe-CD may include a scaling factor for the probe LI data processing timer (SCF_FOIP_TIMER), which can be determined based on relevant parameters in PRODET-PASTPERF. Such a scaling factor can be inversely proportional to, for example, the parameter denoting the success rate in timely delivery of LI information by the probe to the next-level upstream probe or to the IoTSP, in order to allocate more processing time and resources for a probe that has a lower success rate of timely delivery of LI information.

Probe-CD may also include a recommended list of interfaces for LIIE data transmission for the high priority and/or highly critical LIIEs, based on PRODET-PASTPERF. As discussed above, PRODET-PASTPERF may store data related to past performance of probe interfaces. Hence the recommended interfaces based on PRODET-PASTPERF aid the probe to have good performance during the LI operation.

Probe delegation information (Probe-DI) may store a hierarchy structure of Probe-CDs (and Probe-DIs) based on the probe hierarchy. FIG. 4B illustrates an exemplary Probe-DI structure for probe 3 of FIG. 4A. In the case of multiple upstream probes for a single downstream probe for the same LIIE, the primary upstream probe (out of the multiple upstream probes) may perform the configuration of the downstream probe. For example, as shown in FIG. 4A, if probe 3.1 is the primary upstream probe for LIIEs to be collected from downstream probes 3.1.1, 3.1.2, 3.1.3, and 3.1.4, then probe 3.1 can be assigned to configure these downstream probes.

Based on Probe-CD and Probe-DI information, all the probes in the LI-PROTOP hierarchy can be configured in a step by step manner, starting from the IoTSP and propagating to the end downstream probes.

As part of the planning functions, LIPC module 204 may also identify possible sources of information (e.g., possible probe(s)) for each information item listed in each LIIE based on, for example, criticality, priority, FoR and FoS listed in the PRODET (probe configuration details) for these probes). LIPC module 204 may also associate each LIIE with criticality, priority, FoR, and FoS information, and store these information in an information source mapping table (ISMT). The following is an example of an ISMT table that associates the LIIEs in FIG. 3 with the probes in FIG. 4B:

TABLE 2 Possible FoS FoR PLIIE/ Information (per (per ULIIE sources LIIE-PL Criticality Priority minute) minute) L1 Probes 1, 1A PL1 High P1 6 6 L11 Probes 1.1, 1.2, 1.3 PL11 High P1 36 6 L12 Probes 1.2, 1.3 PL12 High P1 18 9 L2 Probes 2, 2A NA High P3 4 4 L3 Probes 3, 4 PL3 Medium P2 30 3 L31 Probes 3.1, 3.2 PL31 High P2 12 3 L311 Probes 3.1.1, 3.1.3 PL311 High P2 3 3 L312 Probes 3.1.2, PL312 High P2 5 5 3.1.3, 3.1.4 L32 Probes 3.2, 3.3 PL32 Low P2 14 7

Based on ISMT, LIPC module 204 may also select the probes (primary and secondary/fallback probes) for each information item listed in LIIE, and store the information in an appropriate information source mapping table (AISMT). AISMT also include other information, such as information preparing node (IPN) for each probe, LI activation condition (LIAC), etc. An example of AISMT based on FIGS. 3 and 4A can be as follows:

TABLE 3 FoS FoR PLIIE/ Probes (per (per ULIIE Primary Fallback IPN LIIE-PL Criticality Priority min) min) LIAC L1 1 1A IoTSP PL1 High P1 6 6 C1 L11 1.1 1.2 1 PL11 High P1 36 6 C11 L12 1.2 1.3 1 PL12 High P1 18 9 C12 L2 2 2A IoTSP PL2 High P2 4 4 C2 L3 3 4 IoTSP PL3 Medium P3 30 3 C3 L31 3.1 3.2 3 PL31 High P2 12 3 C31 L311 3.1.1 3.1.3 3.1 PL311 High P1 3 3 C311 L312 3.1.2 3.1.4 3.1 PL312 High P3 5 5 C312 L32 3.3 3.3 PL32 Low P1 14 7 C32

After the planning functions are performed (e.g., formation of probe topology, assigning roles and responsibilities to probes, update of AISMT, etc.), LIPC module 204 may generate an IoTSP-LI-Context (I-LIC) for a particular LISP. I-LIC can be a data structure that keeps a record of the LI operation information, at IoTSP 110, for a particular LISP. LIPC module 204 can create multiple I-LICs for different LISPs. FIG. 5 illustrates an exemplary I-LIC 500. As shown in FIG. 5, I-LIC 500 includes LIIE and probe information 502, data collection and reporting scheme 504, connection handles 506, data collector instance 508, data processor instance 510, and data reporting queue 512.

LIIE and probe information 502 may include, for example, LIIE hierarchy and dependencies (e.g., as shown in FIG. 3), probe topology (e.g., as shown in FIG. 4A), Probe-CDs for each probe in the probe topology, ISMT and AISMT tables, etc. Data collection and reporting scheme 504 may include, for example, the set of data to be collected based on the LIIE structure, information related to FoR, FoS, priority and criticality of the set of LI information, frequency of LI information processing (FOIP) and LI information processing timer (LIIP_TIMER), as well as bulk data handling method (DMBDH) according to LISP. Connection handles 506 may specify a set of interfaces at IoTSP for performing the LI operation based on the received LISP. The set of interfaces may include interfaces for upstream (towards LIG 114) connections and interfaces for downstream (towards next level probes in the probe topology). Data collector instance 508 can be linkage (e.g., handles) to computing resources (for that specific LI operation or LISP) associated with the set of data specified in data collection and reporting scheme 504 and the set of interfaces specified in connection handles 506. Data processor instance 510 can be linkage (e.g., handles) to computing resources for processing of collected data by the probes for the specific LI operation, and may include the processing logics (PL) specified in the LISP. Data reporting queue 512 can be a linkage to a reporting queue that is specific to an LI-operation. The reporting queue can store LI information that has been processed by the processing unit referenced by data processor instance 510 and waiting for to be transmitted to LIG 114.

Different parts of I-LIC can be accessed by different modules in IoTSP 110. For example, LI data collection (LIDC) module 208 can access the information stored in data collection and reporting scheme 504 and data collector instances 508. LI information preparation (LIIPREP) module 210 can access data processor instances 540 and data reporting queue 512. Communication module 212 can also obtain the LI information stored in data reporting queue 512 for all active I-LICs, and may insert the LI information into a set of common queues, each of which corresponds to a particular communication interface to LIG 114. I-LIC undergoes modification whenever there is an update in at least one of ISMT, AISMT, probe topology or Connection Handles.

As part of the configuration functions, LIPC module 204 may also configure the probes and IoTSP 110 in various aspects including, for example, information to be collected, prepared (processed), reported, schedule for delivery, LI activation condition, etc. The configurations may include assigning probe-specific roles and responsibilities for data collection, event tracking, sequencing of information, sending the information with the specified priority, ensuring criticality needs are met, and delegating the configuration of probes based on the probe DI hierarchy, such as the one shown in FIG. 4B. LIPC module 204 may also set the bulk data handling (BDH) method in the LIDC of IoTSP based on BDH information received from LISH module 202. LIPC module 204 may also configure different interfaces of IoTSP 110 designated for transmission of prepared and raw data (LIIEs) and for transmission of BU-DAT.

LI Activation and Control (LIACTRL) Module

In some embodiments, LI activation and control (LIACTRL) module 206 can perform activation or deactivation of LI operations in the probes. LIACTRL module 206 can also perform monitoring and control of the probes. For example, LIACTRL module 206 can determine whether the probes are reporting the captured LI information at the frequency, priority, etc. specified in the Probe-CDs associated with the probes. In case of any exception, LIACTRL module 206 may also trigger fault tolerance handling at LIPC module 204 in case of any exception. The fault tolerance handling may include, for example, selection (or reselection) of a new probe, changing the communication channel, changing the security mechanism, etc.

LI Data Collection (LIDC) Module

In some embodiments, LI data collection (LIDC) module 208 can collect LI information from multiple probes, and can it uses the fault tolerant mechanism to ensure collection of LI information even under adverse conditions and/or exceptions. LIDC module 208 also receives and stores the bulk LI information (BU-DAT) for sending it to LIG 114 via a dedicated interface, based on bulk data handling (DMBDH) information extracted from LISP.

LIDC module 208 may also collect and store diagnostics information based on LI information that flows through IoTSP 110 (IoTSP-PR-DIAG-INFO). IoTSP-PR-DIAG-INFO may include information including, for example, success rate of delivery to LIG 114 (IoTSP-SUCC-INFO-DELIV), success rate of timely delivery to LIG 114 (IoTSP-SUCC-TIMELY-DELIV), the exception conditions encountered (e.g., type and frequency for different exception types, details about interface failure, etc.) (IoT-EXCEP-COUNT), and success rate of handling of different types of exception condition (IoTSP-EXCEP-HANDLED).

LIDC module 208 may also receive, from each probe, probe diagnostics information (PR-DIAG-INFO) that are generated locally at the probes. PR-DIAG-INFO may include information related to, for example, exceptions arising out of issues like security, resource constraint, down-time (e.g., duration for which a particular resource(s) was out of service), exception handling status (e.g., whether the exception has been handled successfully or not); success rate of receipt of information from downstream probe(s); success rate of timely receipt of information from downstream probe(s), etc. PR-DIAG-INFO may also include information such as, for example, rate of success in event processing (PR-SUCC-EVT-PROC), rate of success of content processing (PR-SUCC-CONT-PROC), rate of success of aggregation (PR-SUCC-AGGREG), rate of success of information delivery (PR-SUCC-INFO-DELIV), rate of success in timely information delivery (PR-SUCC-TIMELY-DELIV), exception conditions encountered (Type and frequency for different exception types) (PR-EXCEP-COUNT), rate of success of handling of different types of exception conditions (PR-EXCEP-HANDLED), etc.

LI Information Preparation (LIIPREP)

LI information preparation (LIIPREP) module 210 can process the collected LI information as per prior-mapping and processing-logic. LIIPREP module 210 can also determine the frequency of LI information processing (FOIP) by taking consideration the FoR of all primary LIIEs (PLIIEs), and process the collected LI information based on the determined FOIP. The FOIP can be determined based on, for example, the lowest common multiple (LCM) of FoRs of all PLIIEs. LIIPREP can also activate the data processor instance linked to the IoTSP-LI-Context (I-LIC) for the LI operation.

Super-Probe Communication Module

Super-probe Communication module (SPCOM) 212 may provide a number of interfaces for the communication between the IoTSP 110 and LIG 114. For example, as discussed above with respect to FIG. 1, IoTSP 110 may communicate with LIG 114 via an I1 interface, an I2 interface, and an I3 interface. Each interface may be dedicated for transmission of certain type of information. For example, I1 interface may be for transmission of LI specification (LISP), and LI activation/deactivation signals. I2 Interface can be for transmission of LI information (communication content and events) in real-time/pseudo-real-time. The transmitted LI information may include prepared/processed contents or raw information, and typically has greater relevance in real-time to the LEA. I3 interface can be for transmission of bulk data (BU-DAT). SPCOM module 212 may receive data from the interfaces, and provide the received data to other modules. SPCOM module 212 may also perform delivery of LI information scheduling according to the priority specified by the LEA, and select the interface (e.g., I2) for transmission of the LI information. SPCOM module 212 may also provide secured delivery (e.g., adding encryption) of LI information to LEA (via LIG 114). Further SPCOM module 212 may provide bi-directional communication between IoTSP 110 and the IoT infrastructure including the probes.

Lawful Interception (LI) Probe

Reference is now made to FIG. 6, which illustrates an exemplary LI probe 600 according to embodiments of the present disclosure. As discussed above, an LI probe can be plugged into or hosted on various components shown in FIG. 1, such as IoT gateway 102, interconnect gateway 104, IoT management application 106, etc. As shown in FIG. 6, LI probe 600 may include a probe configuration module (PRCFM) 602, a probe data collection (PRDC) module 604, a probe data processing (PRDP) module 606, a host plug-in (HPIN) module 608, and a probe communication module (PRCOM) 610.

Probe Configuration Module (PRCFM)

In some embodiments, probe configuration module (PRCFM) 602 can configure a probe for LI information collection (from the local host). The configuration may include, for example, information to collect, frequency of information collection, criticality, etc., as well as setting for reporting (e.g., via a predetermined interface). PRCFM 602 may also pass the configuration instructions and delegation information (Probe-CD and Probe-DI) to probes that are downstream and have to be configured to send the LI information to the probe, which can be an upstream probe. PRCFM 602 may also determine and perform other configurations, such as the times at which the collected information is to be processed and formatted into LI information, and the times at which the processed LI information is to be transmitted. These configurations can be determined based on, for example, the information to be collected from this probe, as well as from other downstream probes, as well as their priority as specified by the LEA (e.g., based on information extracted from LISP) which is transmitted to the probe as part of the Probe-CD contents.

In some embodiments, PRCFM 602 may also create a probe-LI-context (PR-LIC) for a specific LI operation that corresponds to an LISP. PR-LIC can be a data structure that keeps a record of the LI operation information, at a probe and for a particular LISP. PRCFM module 602 can create multiple PR-LICs for different LISPs. FIG. 7 illustrates an exemplary PR-LIC 700. As shown in FIG. 7, PR-LIC 700 includes Probe-CD 702, data collection and reporting scheme 704, connection handles 706, data collector instance 708, data processor instance 710, and data reporting queue 712.

Probe-CD 702 can be a Probe-CD received from upstream probes, or from IoTSP 110. Data collection and reporting scheme 704 can include, for example, the set of data to be collected as specified in Probe-CD (which is based on the LIIE structure), information related to FoR, FoS, priority and criticality of the set of LI information, frequency of LI information processing in the probe (PROBE_FOIP) and LI information processing timer (LI-PROBE-IP-TIMER), etc. Connection handles 706 may specify a set of interfaces at the probe for connection with upstream and/or downstream probes. Data collector instance 708 can be a linkage (e.g., handle) to processing unit (computing resources) associated with the set of data specified in data collection and reporting scheme 704 and the set of interfaces specified in connection handles 706 for the specific LI operation (corresponding to an LISP). Data processor instance 710 can be a linkage (e.g., handle) to processing unit for processing of collected data by the probe for the specific LI operation, and may include the processing logics (PL) specified in the Probe-CD. Data reporting queue 712 can be a linkage to a reporting queue that is specific to an LI-operation. The reporting queue can store LI information that has been processed by the processing units referenced by data processor instances 710 and waiting for to be transmitted to upstream probes.

Different parts of the PR-LIC can be accessed by different modules in the probe. For example, data collection and reporting scheme 704 and data collector instance 708 can be accessed by probe data collection (PRDC) module 604. Data processor instance 710 and data reporting queue 712 can be accessed by probe data processing (PRDP) module 606. Data reporting queue 712 can be accessed by probe communication (PRCOM) module 610, which can insert the information elements from the data reporting queues 712 of all active PR-LICs into a set of common queues, with each common queue corresponding to a communication interface to an upstream probe/IoTSP 110. The insertion of the information elements in the common queues can be based on, for example the priority and criticality of the information elements.

Probe Data Collection (PRDC) Module

In some embodiments, probe data collection (PRDC) module 604 can monitor fulfillment of LI activation condition (LIAC), and report the fulfillment to the next level upstream or to the IoTSP, to provide an indication that the condition(s) for starting collection of information for LI (for a specific LI operation corresponding to an LISP) and taking subsequent actions for LI (including processing of the collected data, transmission of the collected data to an upstream probe or IoTSP, etc.) has been met. PRDC module 604 can also collect the LI information as specified by the upstream probe or by IoTSP 110 from the host to which the probe is connected, and/or from other downstream probes. The collection of the LI information can be at the specified frequency and priority as indicated in the Probe-CD (derived from LISP). PRDC module 604 can also take predetermined actions for fault-tolerance particularly for LI information that is critical. For example, if an upstream probe determines that one of the downstream probes fails, it can switch to a back-up downstream probe. PRDC module 604 can collect different types of LI information, including bulk data (BU-DAT-PROBE), and can transmit the collected bulk data to the next level upstream probe and/or IoTSP 110.

Probe Data Processing (PRDP) Module

In some embodiments, probe data processing (PRDP) module 606 can process the LI information collected from the host, and from other downstream probes, as specified by IoTSP 110 or by the upstream probe. PRDP module 606 can also process the collected information at an LI information processing frequency (PROBE_FOIP), which can be determined based on, for example, the FoR of LIIE(s) to be reported by the probe. Moreover, PRDP module 606 can also determine schedule of delivery of LIIEs based on prior-pending-queue, and priority of the LIIE(s) to be reported by the probe. PRDP module 606 can also verify delivery of the LI information, and reports diagnostics to the upstream probe or IoTSP.

Host Plug-in (HPIN) Module

Host plug-in (HPIN) module 608 can provide a plug-in interface for the probe with the host to which the probe is attached. The plug-in could be in-memory mechanism such as API-call; an inter-process communication mechanism such as queues, sockets, etc. The probe can be co-located with the host or remotely connected via wired/wireless channel with the host.

Probe Communication (PRCOM) Module

In some embodiments, probe communication (PRCOM) module 610 can provide communication with upstream probes/IoTSP as well as downstream probes, by establishing a virtual channel after the initial communication with each probe/IoTSP 110. PRCOM module 610 can ensure that the appropriate communication channel of the host (to which the probe is attached) is chosen and also ensures that the LI information is communicated in a secure manner by making necessary adaptations to the communication format (e.g., use of different encryption keys, use of appropriate protocols e.g., IPsec, etc.). PRCOM module 610 can provides the received information to various modules in the probe. For example, PRCOM module 610 may transmit LI information and diagnostics information to PRDC module 604. PRCOM module 610 may also transmit received Probe-CD and Probe-DI information to PRCFM 602.

Moreover, PRCOM 602 may also transmit LIIEs and bulk data (BU-DAT-PROBE) to the next-level upstream probe and/or IoTSP 110. PRCOM 602 may also schedule the transmission of BU-DAT-PROBE and LIIEs to ensure that the LIIEs can be sent in a timely manner fulfilling the priority, criticality and FoR requirements.

Method of Performing LI at IoTSP

Reference is now made to FIG. 8, which illustrates an exemplary method 800 for lawful interception (LI) at an IoT super-probe (IoTSP). Method 800 can be performed by a system including, for example, IoTSP 110 of FIG. 1.

After an initial start, the system receives and processes an LEA request including LI specification (LISP), in step 802. In some embodiments, IoTSP 110 may receive the LISP from LI gateway (LIG) 114, the LISP can be received by SPCOM module 212 in the IoTSP via the LIG. SPCOM 122 can then provide the LISP to LISH module 202 in the IoTSP. LISH module 202 can then extract the LISP from the LEA request, and pass the extracted LISP to LIPC module 204 of the IoTSP.

In case the LISP contains a query from the LEA to know about available options for BU-DAT handling (BDH) as supported by the IoTSP, LISH module 202 can also obtain a list of available modes for bulk data handling (AMBDH) and the default mode of BDH (DMBDH) from LIPC module 208, which LIPC module 208 can fetch from IoTSPCS storage. LISH module 202 can then transmit the AMBDH information, via SPCOM module 212 of the IoTSP, to LIG 114 over the I1 interface. LIG 114, in turn, can transmit the received AMBDH information to the LEA. LEA may transmit its preferred bulk data handling option (LPBDH) to LIG 114, which can forward to LISH module 202 in the IoTSP via the SPCOM module 212 over the I1 interface. LISH module 202 may update the DMBDH for this LISP (DMBDH-LISP) as LPBDH for this LISP, and provides this update to LIPC module 208.

After receiving and extracting a LISP from the LI request from LEA, the system then determines LI tracking information, in step 804. In some embodiments, the system (e.g., LISH module 202 or LIPC module 204) determines what LI information elements (LIIEs) needs to be tracked along with criticality/importance, priority and frequency of reporting (FoR), etc. The determination of the LI information elements may include identifying primary LIIEs (PLIIE) based on information-type, criticality, priority and FoR. The system (e.g., LISP module 204) may also determine the frequency of LI information processing (FOIP) by the LIIPREP taking into consideration the FoR of all PLIIEs. For example, the FOIP can be the lowest common multiple (LCM) of FoRs of all PLIIEs. The FOIP can be stored in the IoTSP-LI-context (I-LIC).

The system (e.g., LIPC module 204) may also determine underlying LIIEs (ULIIEs) for each PLIIE based on information-type, criticality, priority and FoR, and form PLIIE and ULIIE hierarchy (similar to the one shown in FIG. 3) based on elementary-LIIE dependency relationships (ELIIEDR), taking into consideration factors like information-type, criticality, priority, FoR, processing-logic (PL).

The system (e.g., LIPC module 204) may also identify the possible sources of information and events for each information element (LIIE) based on, for example, FoS, FoR, and probe configuration details (PRODET). For each LIIE (PLIIE, ULIIE), the system may determine frequency of information sample (FoS) and processing logic (LIIE-PL) based on ELIIEDR, FoR and information-type. For example, if PLIIE information-type is time-average of underlying ULIIE, the PLIIE content may include aggregation of all values of ULIIE averaged over a time period associated with the FoS, with FoS determined based on the following exemplary expression: FoS=FoR*minimum number of samples needed  (Expression 1)

The system (e.g., LIPC module 204) also updates the information source mapping table (ISMT) (e.g., Table 1 above) with the LIIE-PL and possible sources of information. The system also creates the appropriate ISMT (AISMT) by determining appropriate data sources (primary/fallback sources) based on ISMT and ELIIEDR (criticality, priority), mobility and security information of the probes. An exemplary set of strategies for appropriate information source determination is provided below:

TABLE 4 Value Strategy for appropriate information Parameter Range source determination FoR High Information source should be closer to the IoT network depending on other conditions FoR Low Information source can be away from the IoT network depending on other conditions FoS High Information source should be closer to the IoT network depending on other conditions FoS Low Information source can be away from the IoT network depending on other conditions Criticality High Need to have more than one information source for reliability/fault-tolerance depending on other conditions Criticality Low One information source may be sufficient depending on other conditions Priority High Higher preference for information delivery scheduling depending on other conditions Priority Low Lower preference for information delivery scheduling depending on other conditions Mobility High Information source should be closer to the IoT network depending on other conditions Mobility Low Information source can be away from the IoT network depending on other conditions

The system (e.g., LIPC module 204) can also determine suitability rank for the identified sources from ISMT based on the above strategy and the probe-details (PRODET) (past credentials/history, etc.), and select one or more sources of information based on the above strategy and the suitability rank.

The system (e.g., LIPC module 204) can also prepare LI-PROTOP based on the appropriate probe(s) selected in the previous step and the LIIE hierarchy. For each LIIE (PLIIE & ULIIE) in ISMT, the system may identify DLIIE (dependent LIIE) where the LIIE has one or more ULIIE. For each PLIIE and DLIIE, the system may also determine if it is raw data that requires preparation. The system may also determine an information preparation node (IPN) which aggregates the information for preparing the PLIIE/DLIIE and prepares and sends the PLIIE/DLIIE. The IPN can be determined based on the LIIE-PL and the LI-PROTOP (e.g., as shown in FIG. 4A).

The system (e.g., LIPC module 204) can then proceed to configure LI tracking, in step 806. For LI tracking configuration, the system may fetch LI activation condition and perform configuration of IoTSP 110 and the probes. The system may extract high-level LI activation condition from the LISP. Based on the probes chosen for each PLIIE/ULIIE in the AISMT and the LI-PROTOP, the system can determine LIAC for each probe level. The system can also update AISMT with the LI information preparation node (IPN) and LIAC details, and generate an AISMT such as the one shown in Table 3.

The system (e.g., LIPC module 204) can also configure the LI operations. For example, LIPC module 204 may fetch LI activation condition for each probe present in the AISMT. Further, both IoTSP 110 and the probes are also configured for the LI operation. For IoTSP 110, LIPC module 204 can create an IoTSP context (I-LIC) that stores LIIE hierarchy and dependencies, ISMT, AISMT, probe topology, etc. LIPC module 204 can also configure the other modules in the IoTSP for LI data collection, preparation and transmission to LIG. For example, LIPC module 204 sets the LIAC conditions stored in LIACTRL module 206. LIPC module 204 also sets the information related to LI probe topology (LI-PROTOP), and for each PLIIE, the FoR, the priority, and criticality stored in LI data collection (LIDC) module 208 and LI information preparation (LIIP) module 210. LIPC module 204 also configures LIIP module 210 about the details of the information reporting structure and the FOIP.

The system (e.g., LIPC module 204) also configures LI-probes at the data sources. For example the system may determine probe configuration for determined appropriate data-sources. For each data-source or probe in AISMT, the LIPC determines the configuration to be done for each probe based on the LISP, probe configuration details (PRODET), and the probe mapping for each LIIE (PLIIE and DLIIE). The system also prepares complete configuration details for each probe (e.g., Probe-CD). For example, LIPC module 204 can prepare the complete Probe-CD for each probe based on the information present in AISMT, Probe past performance (PRODET-PASTPERF), LI-PROTOP and LISP. The bulk LI-information requirements from the probe (BU-DAT-PROBE) is also included in the Probe-CD. The system also determines delegation information (Probe-DI) for each probe. For example, LIPC module 204 determines Probe-DI for each probe based on IPN details from AISMT and the probe-config-data (Probe-CD). It can also fetch and prepare the configuration-data associated with the Probe-DI. After determination of the Probe-CD and Probe-DI information, LIPC module 204 can transmit the configuration data (Probe-CD and Probe-DI) to the probe(s) via LIACTRL module 206 and the host to which the probe is plugged into. LIPC module 204 can also store the complete Probe-CD for all probes in the I-LIC.

The system (e.g., LIPC module 204) can also configure the I2 and I3 interfaces for transmission of LI information. For example, for each PLIIE, LIPC module 204 may determine which interface(s) (primary and secondary) to be I2 interface(s), and which protocols are to be used for sending the PLIIE to LIG 110, based on the priority, FoR, available resources on the interface, security requirements, criticality, IoTSP past performance of the interfaces according to IoTSP past performance (IoTSP-PAST-PERF) information, etc. LIPC module 204 can also determine which interface(s) (primary and secondary) to be I3 interface(s) based on the expected amount of BU-DAT to be transferred and the available communication resources. The expected amount of BU-DAT can be computed based on the data types of the information to be collected, FoS, etc. LIPC module 204 can also configure SPCOM module 212 with information about the I2 and I3 interfaces. SPCOM module 212 can then also establish the communication channels with the LIG 110 for the LI session.

Further, the system (e.g., LIPC module 204) can also update the set of connection handles stored in connection handles 506 of the I-LIC with the interfaces information. LIPC module 204 can also provide the default bulk data handling information extracted from LISP (DMBDH-LISP) to LIDC module 208 for appropriate configuration of bulk-data handling (BDH).

Moreover, the system (e.g., LIDC module 208) may configure BDH, and update the I-LIC with DMBDH-LISP, based on the following exemplary algorithm:

if DMBDH-LISP = Time-stamp based overwriting then{ configure DMBDH-LISP method locally } else{ compute space requirements for the LI session based on the data types in the LISP and pre-provisioned storage limits for those data types (e.g., for location data, minimum 10 kb of data is required) if free space available > space required for the LI session (for all the data types in the LISP) then { allocate required space for DMBDH-LISP for the session; mark this allocated space as ‘in use’ to prevent overwriting when storage space runs out for Time-stamp based overwriting method. } else { obtain additional space from the space used for time-stamp based overwriting, for example, the space used by the oldest records; if unable to obtain additional space, then { transmit a notification to LEA (via SPCOM module 212 and LIG 114), and wait for further instructions; if LEA instructs to still use fixed space allocation, then{ obtain additional space from the space used for time-stamp based overwriting considering space used by newer records; } else{ employ DMBDH-LISP method as Time-stamp based overwriting for the present LI session; and inform LIPC module 204 and update DMBDH-LISP in I-LIC; } } mark this entire allocated space as ‘in use’ to prevent overwriting when storage space runs out for Time-stamp based overwriting method. }

The system (e.g., LIACTRL 206) can then proceed to activate LI operations, in step 808. For activation of the LI operations, LIACTRL module 206 may receive notification from relevant probe(s) which detects fulfilment of LIAC. LIACTRL module 206 can then transmit LI activation signal to all the configured probes. Upon receipt of the LI activation signal, each probe may forwards necessary activation signals to the downstream probes in the probe-topology, and starts its own LI operation. The starting of the LI operation at the probe will be described in more detail below.

LIACTRL module 206 can also notify LIDC module 208 and LIIPREP module 210 that LI has been activated at the probes. Upon receipt of LI activation signal from LIACTRL module 206, LIDC module 208 can activate the data collector instance in the I-LIC for that LI operation. Moreover, LIIPREP module 210 can also start a periodically recurring timer of duration LIIP_TIMER for that specific I-LIC to enable LI information processing at the appropriate instants of time to meet the FOIP requirement. For example, if FOIP is 6 per minute (i.e., once every 10 seconds), the timer could fire at the 8th, 18th, 28th, 38th, 48th and 58th second of each minute, assuming a processing delay of 2 seconds, and LIIPREP module 210 can activate the data processor instance in the I-LIC (e.g., data processor instance 510) so the data processor instance can process the data based on the LIIP_TIMER.

Some of the information for the FOIP and the processing delays can be preconfigured, or received from LIPC module 204. LIIP_TIMER values can also be adapted based on IoTSP past performance (IoTSP-PAST-PERF) parameters. For example, the values stored in LIIP_TIMER can be decreased by a factor that is inversely proportional to the % of success in timely delivery to LIG 114.

After activating the LI operation, the system (e.g., LIDC module 208 and SPCOM module 212) can proceed to collect LI information through the probes, in step 810. The collection of LI information may include, for example, SPCOM module 212 receiving LI information from host plug-in (HPIN) module 608 of the respective probe via the host to which the probe is attached to, and provides it to LIDC module 208. LIDC module 208 may receive the LI information from each probe at the specified FoR and in the order as defined by the priority. LIDC module 208 may provide the information collected for a specific I-LIC (which has a corresponding LISP) to the data collector instance 508 of the specific I-LIC, which can stores the information along with any notifications (e.g., missed delivery) received from the probes. LIDC module 208 may also receive the LI information pertaining to the same LIIE from multiple probes for LIIEs marked as critical.

Further, LIDC module 208 also collects bulk data (BU-DAT) from different probes, and transmits the collected data to SPCOM module 212. The handling of bulk data can be based on DMBDH-LISP information stored in the I-LIC. If DMBDH-LISP indicates a time-stamp based overwriting, LIDC module 208 may overwrite oldest records upon running out of storage space. Otherwise, LIDC module 208 may determine whether the currently used storage for a particular LI operation exceeds a predetermined percentage (e.g., 80%) of allocated storage space for the LI operation. If the currently used storage exceeds the predetermined percentage, LIDC module 208 may transmit a notification to LIG 114 to ensure timely fetching of BU-DAT before it is overwritten.

LIDC module 208 may also collect local probe diagnostics information (IoTSP-PR-DIAG-INFO) for each probe based on inputs received from the data collector instances at IoTSP 110. The probe diagnostics information may also include any inputs that it receives from other components in the IoTSP (e.g., exception encountered notification from SPCOM module 212). When any component in the IoTSP (e.g., LIDC module 208) generates a probe diagnostics info specific to an LI operation (corresponding to LISP, and to a specific I-LIC), that component may also fetch I-LIC details (e.g., I-LIC id and LISP id), and include these details along with the specific diagnostic information (e.g., security exception for that particular LI operation alone) in the IoTSP-PR-DIAG-INFO. LIDC module 208 may also receive from each probe, the probe diagnostics information (PR-DIAG-INFO) that is composed of diagnostics information collected locally in the probe, as well as diagnostics information collected and aggregated from one or more downstream probes. LIDC module 208 can then provide the IoTSP-PR-DIAG-INFO (collected at IoTSP) and PR-DIAG-INFO (collected at each probes) to LIPC module 204.

The system (e.g., LIIPREP module 210) can then proceed to prepare and deliver collected LI information, in step 812. The preparation and delivery of LI information can occur when the LIIP_TIMER expires for a specific I-LIC, which would cause LIIPREP module 210 to trigger the data processor instance of that I-LIC to perform the LI information preparation.

As a part of the LI information preparation, LIIPREP module 210 determines, based on the FoR for each PLIIE, the PLIIEs to be prepared at that particular instant of time for transmission to LIG 114. For those PLIIEs to be prepared for transmission, LIIPREP module 210 may assess availability of adequate information for preparing the PLIIE content. The assessment may include, for example, checking adequacy of information transmitted by LIDC module 208. If the information is deficient, the system may perform a set of re-configuration actions (Probe-topology, ISMT, AISMT), the details of which are to be described below.

On the other hand, if the information is adequate, LIIPREP module 210 may prepare the PLIIE based on the PL using the information that is available to create an output in the format/structure as specified in the LISP. For PLIIEs associated with high or medium criticality, LIIPREP module 210 may fetch the information received from the primary probe for all those information sub-elements which were received successfully and in a timely manner. For information sub-elements that were not received successfully (and/or in a timely manner) from the primary probe, LIIPREP module 210 may also fetch the information received from the fallback probe. LIIPREP module 210 can then prepare the PLIIE contents based on the fetched information.

If there is adequate information for a PLIIE to be delivered, LIIPREP module 210 may determine schedule of delivery of LI information. For example, LIIPREP module 210 may schedule to deliver what LI information can be delivered (e.g., based on the PLIIE preparation done in the previous step), taking into consideration the prior-pending queue (PPQ), and the priority of the PLIIE. For example, if the PPQ contains pending information for that PLIIE, and has to be delivered before the currently prepared information, LIIPREP module 210 may schedule the delivery of the newly prepared PLIIE after the delivery of the PLIIE information in the PPQ.

On the other hand, if there is insufficient information for a PLIIE to be delivered, LIIPREP module 210 may prepare a deficiency notification, and schedule it to be sent at the same priority as that of the PLIIE. The deficiency notification can also be in the form of PLIIE filled in with some reserved values, to notify LEA about the deficiency. Moreover, for highly critical PLIIEs, LIIPREP module 210 may create a place-holder for backup delivery schedule, and update the PPQ accordingly. For other PLIIEs, LIIPREP module 210 may determine to skip delivery, or to schedule the delivery at a later time when, for example, the missing information arrives.

After generating the PLIIEs, LIIPREP module 210 may transmit the PLIIEs to LIG 114 via SPCOM module 212 using the interface and protocols as determined and configured earlier. To prepare for the transmission, the data processor instance 510 of the specific I-LIC may insert the data to be reported into the data reporting queue 512 in that I-LIC. SPCOM module 212 can then fetch the LI information from the data reporting queue 512 and insert them into a common queue for the interface via which the LI information is to be reported to LIG 114. The insertion of the data into the common queue can be based on the priority and criticality of the information to be reported.

SPCOM module 212 can also transmit the BU-DAT (received from LIDC module 208) to LIG 114 over the I3 interface using the communication channel and protocols configured by LIPC module 204. SPCOM module 212 also schedules BU-DAT transmission in such a way so as to ensure that the PLIIEs are sent in a timely manner adhering to the priority, criticality and FoR requirements as specified by the LEA in the LISP.

After transmission of PLIIE, SPCOM module 212 also verifies if it was delivered successfully to the LIG. For an unsuccessful (and/or untimely) delivery, SPCOM module 212 may handle differently depending on the PLIIE priority and then criticality. For example, for non-critical PLIIE, SPCOM module 212 may skip the delivery. For PLIIE with high priority, SPCOM module 212 may trigger a re-transmission using backup channel. If the re-transmission also fails, SPCOM module 212 can then take action based on the criticality. In case of repeated issues with delivery of a PLIIE with high priority, the system may also execute re-configuration actions, as discussed below. For PLIIE with high criticality, SPCOM module 212 may put the transmission task back in pending queue for re-transmission.

Moreover, the data processor instance 510 in the I-LIC and SPCOM module 212 can also provide relevant diagnostic information about the IoTSP performance, e.g., rate of successful delivery, rate of successful timely delivery, etc. for that specific LI operation, to LIPC module 204.

Steps 810 and 812 are executed until the end of the LI session. At the end of the LI session, the system may update learnings about the LI operation to determine the effectiveness of the LI operation, and to identify LI configuration and operational parameters for adjustments, in step 814 LIPC module 204 may determine the effectiveness of each probe, as well as IoTSP 110, for a particular LI operation based on various parameters.

For probe effectiveness determination, LIPC module 204 may compute the adjusted values of the probe performance parameters for each probe employed for the LI session starting from the probe that is farthest downstream. These probe performance parameters may include adjusted probe aggregate success rate (ADJ-PR-SUCC-AGGREG), adjusted probe information delivery success rate (ADJ-PR-SUCC-INFO-DELIV), adjusted probe information timely delivery success rate (ADJ-PR-SUCC-TIMELY-DELIV), etc. These parameters can be determined based on the following exemplary expressions: ADJ-PR-SUCC-AGGREG=PR-SUCC-AGGREG+alpha*m  (Expression 2)

Here, alpha can be a pre-provisioned value (e.g., 5%), and m can be a number of downstream probes of which the corresponding probe parameter (PR-SUCC-INFO-DELIV) is below a threshold value PR-SUCC-INFO-DELIV-THRESHOLD. ADJ-PR-SUCC-INFO-DELIV=PR-SUCC-INFO-DELIV+beta*r  (Expression 3)

Here, beta can be a pre-provisioned value (e.g., 15%), and r can be a number of downstream probes of which the corresponding probe parameter (PR-SUCC-INFO-DELIV) is below a threshold value PR-SUCC-INFO-DELIV-THRESHOLD. ADJ-PR-SUCC-TIMELY-DELIV=PR-SUCC-TIMELY-DELIV+gamma*k   (Expression 4)

Here, gamma can be a pre-provisioned value (e.g., 10%), and k can be a number of downstream probes whose the corresponding probe parameter (PR-SUCC-TIMELY-DELIV) is below a threshold value PR-SUCC-INFO-TIMELY-DELIV-THRESHOLD.

The system can determine the effectiveness of the probe for an LI operation based on the aforementioned adjusted values, as well as a number indicating a number of exceptions handled by the probes (PR-EXCEP-HANDLED). As an illustrative example, the system can compute an initial effectiveness parameter (I_EFF) based on the following exemplary expression: Initial effectiveness % (I_EFF)=Average of(PR-SUCC-EVT-PROC,PR-SUCC-CONT-PROC,ADJ-PR-SUCC-AGGREG,ADJ-PR-SUCC-INFO-DELIV,ADJ-PR-SUCC-TIMELY-DELIV,PR-EXCEP-HANDLED)   (Expression 5)

As another illustrative example, the system can also compute I_EFF parameter based on a composite weighted average of the above-listed factors and a moving window (of fixed number of samples) of the corresponding factors in probe past performance (PR-PAST-PERF) data, which can include H-PR-SUCC-EVT-PROC, H-PR-SUCC-CONT-PROC, H-PR-SUCC-AGGREG, H-PR-SUCC-INFO-DELIV, H-PR-SUCC-TIMELY-DELIV, H-PR-EXCEP-HANDLED.

The system can also assign a scaling factor to the computed I_EFF parameter if the PR-EXCEP-COUNT exceeds a threshold PR-EXCEP-COUNT-THRESHOLD, according to the following exemplary expression: Effectiveness %=I_EFF*(PR-EXCEP-COUNT-THRESHOLD/PR-EXCEP-COUNT)   (Expression 6)

For IoTSP effectiveness determination, LIPC module 204 can compute the adjusted values of a set of IoTSP performance parameters. These probe performance parameters may include adjusted probe information delivery success rate (ADJ-IoTSP-SUCC-INFO-DELIV), adjusted probe information timely delivery success rate (ADJ-IoTSP-SUCC-TIMELY-DELIV), etc. These parameters can be determined based on the following exemplary expression: ADJ-IoTSP-SUCC-INFO-DELIV=IoTSP-SUCC-INFO-DELIV+omega*p   (Expression 7)

Here, omega can be pre-provisioned value (e.g., 15%), p can be a number of downstream probes of which PR-SUCC-INFO-DELIV is below the PR-SUCC-INFO-DELIV-THRESHOLD. ADJ-IoTSP-SUCC-TIMELY-DELIV=IoTSP-SUCC-TIMELY-DELIV+theta*w   (Expression 8)

Here, theta can be a pre-provisioned value (e.g., 10%), and w can be a number of downstream probes of which PR-SUCC-TIMELY-DELIV is below the PR-SUCC-INFO-TIMELY-DELIV-THRESHOLD.

In one example, the system can determine the effectiveness of IoTSP 110 for an LI operation based on the aforementioned parameters, as well as a number of exceptions handled by IoTSP, following exemplary expression: Effectiveness %=Average of(ADJ-IoTSP-SUCC-INFO-DELIV,ADJ-IoTSP-SUCC-TIMELY-DELIV,IoTSP-EXCEP-HANDLED)   (Expression 9)

In another example, the effectiveness of IoTSP 110 for an LI operation can be determined as a composite weighted average of the above factors and a moving window of the corresponding factors in past performance of IoTSP (IoTSP-PAST-PERF) including, for example, IoTSP-SUCC-INFO-DELIV, IoTSP-SUCC-TIMELY-DELIV, and IoTSP-EXCEP-HANDLED.

For the probes and IoTSP, if LIPC module 204 determines that the effectiveness is below a predetermined threshold, LIPC module 204 may identify LI configuration and operation parameters requiring adjustments, and perform the adjustments. For example, if PR-SUCC-EVT-PROC (success rate of event processing), PR-SUCC-CONT-PROC (success rate of content processing), or ADJ-PR-SUCC-AGGREG values are below their respective thresholds, LIPC module 204 may determine that there are some issues with the probe operation. Moreover, if ADJ-PR-SUCC-INFO-DELIV and/or ADJ-PR-SUCC-TIMELY-DELIV values are below their respective thresholds, LIPC module 204 may determine that there are some issues with the communication interface used for the LI session, and hence effectiveness of the interface may require an update.

LIPC module 204 may then also determine which IoTSP parameters may require modification. For example, if IoTSP-EXCEP-HANDLED (a number of exceptions handled by IoTSP) is less than the corresponding threshold, LIPC module 204 may determine to modify parameters such as security settings, interfaces used by the IoTSP towards the LIG that can be used, resource allocations, etc. If ADJ-IoTSP-SUCC-INFO-DELIV and/or ADJ-IoTSP-SUCC-TIMELY-DELIV values are below their respective thresholds, LIPC module 204 may determine that there is an issue with the communication interface used for the LI session, and may update the interface related parameters such as, for example, interface effectiveness, resources to be allocated for the interface(s), etc.

LIPC module 204 may consolidate the list of potential LI configuration parameters that may require an update. LIPC module 204 may also update the relevant parameters in PRODET-PASTPERF and IoTSP-PAST-PERF based on the values of the corresponding parameters during the current LI operation (as stored in PR-DIAG-INFO and IoTSP-PR-DIAG-INFO respectively), to update the history data of performance to include the latest data. Such an update may include, including the current value in a trend of values, removing the oldest entry (in case of using a fixed size observation window), storing additional indications such as the average of the priority and criticality of all the LIIEs delivered, etc.

After assembling a list of parameters to be updated, LIPC module 204 may adjust some or all of the parameters. In some embodiments, LIPC module 204 may check a history trend of some of those parameters, and determine the adjustment accordingly. For example, LIPC module 204 may determine whether the trends of H-PR-SUCC-TIMELY-DELIV, H-PR-SUCC-INFO-DELIV, H-PR-SUCC-EVT-PROC, H-PR-SUCC-CONT-PROC and H-PR-SUCC-AGGREG indicate that these parameters had fallen below their respective thresholds for, say, ‘n’ instances out of the last ‘m’ LI operations, or have fallen below threshold for ‘k’ consecutive instances. If there is no significant correlation/overlap of the instances (e.g., number of common instances being less than a predetermined threshold ‘r’) when H-PR-SUCC-TIMELY-DELIV/H-PR-SUCC-INFO-DELIV had been below the threshold and when H-PR-SUCC-EVT-PROC, H-PR-SUCC-CONT-PROC or H-PR-SUCC-AGGREG had been below their respective thresholds, LIPC module 204 may determine there is likely to be an issue with the interface(s) used, and that the configurations for the interface are to be updated.

On the other hand, if no historical trend data is available (e.g., when the IoTSP powers up), LIPC module 204 may perform primary cause analysis and correlation, to determine which of these parameters have contributed the most in the performance. For example, if interface(s) parameters were identified as possibly requiring an update, LIPC module 204 may determine whether PR-SUCC-EVT-PROC (event processing success rate at the probe), PR-SUCC-CONT-PROC (content processing success rate at the probe) and ADJ-PR-SUCC-AGGREG are below their corresponding thresholds, which can indicate whether the processing components at the probes are operating properly. If none of these parameters are below their threshold, LIPC module 204 may determine there is likely to be an issue with the interface(s) used, and determine to update the configuration of the interface(s).

On the other hand, LIPC module 204 may determine the impact of those parameters on lowering the values of ADJ-PR-SUCC-TIMELY-DELIV, ADJ-PR-SUCC-INFO-DELIV, etc. For example, if PR-SUCC-EVT-PROC and ADJ-PR-SUCC-AGGREG are below their respective thresholds (while PR-SUCC-CONT-PROC is above its threshold), the system may determine a new ADJ-PR-SUCC-TIMELY-DELIV parameter, and a new ADJ-PR-SUCC-INFO-DELIV parameter, according to the following exemplary expression: NEW-ADJ-PR-SUCC-TIMELY-DELIV=ADJ-PR-SUCC-TIMELY-DELIV/[Average{(PR-SUCC-EVT-PROC-THRESHOLD−PR-SUCC-EVT-PROC),(PR-SUCC-AGGREG-THRESHOLD−ADJ-PR-SUCC-AGGREG)}]  (Expression 10) NEW-ADJ-PR-SUCC-INFO-DELIV=ADJ-PR-SUCC-INFO-DELIV/[Average{(PR-SUCC-EVT-PROC-THRESHOLD−PR-SUCC-EVT-PROC),(PR-SUCC-AGGREG-THRESHOLD−ADJ-PR-SUCC-AGGREG)}]  (Expression 11)

If LIPC module 204 determines that the values of NEW-ADJ-PR-SUCC-TIMELY-DELIV or NEW-ADJ-PR-SUCC-INFO-DELIV are still below their respective thresholds, LIPC module 204 may determine that there is likely to be an issue with the interface(s) used, and determine to update the interface configurations.

After determining the configurations to be updated, LIPC module 204 can determine the adjustments to be done, and perform the adjustment. The determination of the adjustments can be based on past corrective actions. For example, for the H-PR-SUCC-TIMELY-DELIV trend, if increasing the resources allocated for that interface(s) for an LI operation was a prior remedial action, the system may update the configuration in IoTSPCS to allocate more resources for that interface(s) for future LI operations.

On the other hand, if the past corrective actions information are not available, the system may also determine a new set of adjustments. For example, if LIPC module 204 determines that interface related parameters are to be updated, LIPC module 204 may examine the trend of exceptions related to stability of the particular interface(s) and/or congestion. The examination may be based on historical trend (if available), or based on the number of exceptions reported during the current LI operation. If LIPC module 204 determines that there is a steady occurrence of such exceptions (e.g., interface stability/congestion occurred for more than ‘p’ times), the system may determine to adapt the effectiveness of the interface accordingly by, for example, decreasing by a value that is proportionate to (e.g., being a weighted average of) the H-PR-SUCC-TIMELY-DELIV trend. If H-PR-SUCC-TIMELY-DELIV trend does not contain any values, the system may also decrease effectiveness by a factor proportionate to NEW-ADJ-PR-SUCC-TIMELY-DELIV or ADJ-PR-SUCC-TIMELY-DELIV, if any of these parameters are available.

If there is no steady occurrence of such exceptions related to stability of the interface(s), the system may examine the resource allocation trend for those interface(s), if available. If there is no significant difference in resource allocation trend or if no trend is available, the system may update the amount of resources to be allocated for those interface(s) per LIIE in the IoTSPCS for future LI operations. For example, the system may update allocation of bandwidth per LIIE.

Method of Performing LI at LI Probe

Reference is now made to FIG. 9, which illustrates an exemplary method 900 for lawful interception (LI) at an LI probe.

After an initial start, the probe can perform configuration for an LI operation, in step 902. The configuration can be performed after the probe receives, via probe communication (PRCOM) module 610, Probe-CD and Probe-DI from upstream probes and/or IoTSP 110. PR configuration module (PRCFM) 602 in the probe can then identify the relevant configuration details for each module in the probe and configures each module of the probe as per the identified configuration. A listing of configuration parameters for each module is shown in the table below:

TABLE 5 Module Configuration parameters PRDC LIAC, FoS, priority, criticality PRDP LI-PROTOP and for each LIIE, the FoS, FoR, priority, criticality, information reporting structure PRCOM LI-PROBE-ITF-PROTOS

PRCFM module 602 can store the Probe-CD and Probe-DI, create a probe-LI-context (PR-LIC) for the specific LI operation, and update the PR-LIC instance with available/determined information Probe-CD, Data collection scheme, etc. PRCFM module 602 can also identify and push relevant configuration data further to downstream probes based on Probe-CD and Probe-DI.

PRCFM module 602 can also determine LI interface configurations. For example, for each LIIE, PRCFM module 602 may determine which interface and which protocols (LI-PROBE-ITF-PROTOS) are to be used for sending the LIIE to the upstream probes and/or to the IoTSP as appropriate, based on the priority, FoR, available resources on the interface, security requirements, criticality, recommendation on the interface to be used as received in the Probe-CD, etc. As an illustrative example, a medium-secured and low latency interface can be used for a LIIE with high priority to be sent from a probe which is in a medium-secure environment (which can be determined based on location, etc.). PRCFM module 602 can also determine the interface to be used for sending bulk data based on available interfaces, expected volume of bulk data to be sent, etc. PRCFM module 602 can then configure PRCOM module 610 with the interface and protocol information. After PRCOM module 610 establishes communication channels via the host with the upstream probes and/or IoTSP 110 for the LI operation, PRCFM module 602 can updates connection handles 706 in the PR-LIC with the interface(s) and protocol(s) to be used for that LI operation. The PRCFM module 602 also determines the LI activation condition(s) to be monitored by the probe based on the LIAC received as part of the Probe-CD from the upstream probe. The PRCFM module 602 then passes the information about the LI activation condition(s) to be monitored to the Probe data collection (PRDC) module 604, based on which the Probe data collection (PRDC) module 604 starts monitoring for fulfillment of LI activation condition(s).

After the configuration, the LI probe can then be activated, in step 904. Probe data collection (PRDC) module 604 may determine the fulfillment of LI activation condition(s). The determination can be based on, for example, detection of the fulfillment of one or more LIAC (LI activation conditions) at the probe by the PRDC module 604 in the probe. In this case, the PRDC module 604 in the probe informs the PRDC module 604 of the next level upstream probe in the probe topology if present, or the LIACTRL module 206 in the IoTSP 110 otherwise. The determination can also be based on receiving information about LIAC fulfillment from one or more next-level downstream probes in the probe topology. In this case also, the PRDC module 604 in the probe informs the PRDC module 604 of the next level upstream probe in the probe topology if present, or the LIACTRL module 206 in the IoTSP 110 otherwise. Further, the determination can also be based on receiving an LI activation signal from an upstream probe, or from LIACTRL module 206 in IoTSP 110, which PRDC module 604 can forward to the downstream probes based on the Probe-DI information.

Upon receiving an LI activation signal from an upstream probe, or from LIACTRL module 206 in IoTSP 110, PRDC module 604 can initiate LI information collection in the probe, and notify that PRDP module 606 in the probe that LI has been activated. PRDP module 606 may also determine the frequency of LI information processing frequency (PROBE_FOIP) based on, for example, the FoR of all LIIEs to be reported by the probe. For example, the PROBE_FOIP can be the lowest common multiple (LCM) of FoRs of all LIIEs to be prepared and sent by the probe. Based on PROBE_FOIP, PRDP module 606 can compute the duration of the LI information processing timer in the probe (LI-PROBE-IP-TIMER-VAL). PRDP module 606 can then adapt the LI-PROBE-IP-TIMER using the SCF_FOIP_TIMER received earlier in the Probe-CD to obtain the ADAPT-LI-PROBE-IP-TIMER-VAL, according to the following exemplary expression: ADAPT-LI-PROBE-IP-TIMER-VAL=LI-PROBE-IP-TIMER*SCF_FOIP_TIMER   (Expression 12)

PRDP module 606 can then start a periodically recurring timer LI-PROBE-IP-TIMER of duration ADAPT-LI-PROBE-IP-TIMER-VAL to enable LI information processing at the appropriate instants of time to meet the PROBE_FOIP requirement. PRDP module 606 can also store the LI-PROBE-IP-TIMER timer details in the PR-LIC.

After the LI probe has been activated, the LI probe can proceed to collect LI information, in step 906. PRDC module 604 may sample or collect LI information for the concerned LIIE at the corresponding FoS from the host to which the probe is plugged into via host plug-in (HPIN) module 608. The collected LI information can include communication content as well as events. PRDC module 604 may also receive LI information from a downstream probe in the probe topology. In the event that the LIIE is marked as critical, PRDC module 604 may also receive LI information pertaining to the same LIIE from multiple probes. PRDC module 604 may provide the information collected for a specific PR-LIC to the data collector instance 708 of the specific PR-LIC, which can also store the collected information along with any notifications (e.g., missed delivery) received from any downstream probe(s). PRDC module 604 can also transmit the bulk data (BU-DAT-PROBE) information to PRCOM module 610.

In some embodiments, PRDC module 604 may also collect probe diagnostics information (PR-DIAG-INFO) locally for each probe based on the observations made during the data collection (e.g., inputs received from data collector instance 708 of a specific PR-LIC), and any inputs that it receives from other components in the probe (e.g., exception encountered notifications from PRCOM module 610), and provides the probe diagnostics information to PRDP module 606. The PR-DIAG-INFO may contain generic probe-level diagnostic info as well as PR-LIC specific diagnostic info (e.g., security exception for that particular LI operation alone). In the latter case, relevant Probe-CD details (e.g., LI operation identifier) can be fetched from the PR-LIC and included in the PR-DIAG-INFO contents together with the diagnostic info.

After the LI information has been collected, the probe can then proceed to process the LI information for transmission to LIG 114, in step 908, when LI-PROBE-IP-TIMER fires. The processing of LI information in the probe may be performed by the Data processor instance 710 in the PR-LIC when triggered by the PRDP module 606. As part of the processing, the Data processor instance 710 may determine which LIIEs have to be (prepared and) transmitted, based on FoR. For the determined LIIEs, the Data processor instance 710 may determine whether PRDC module 604 may have provided adequate LI information for reporting. If the data is deficient, Data processor instance 710 may prepare a deficiency report to be sent to the next-level upstream probe, or to IoTSP 110. If the data is sufficient, Data processor instance 710 may prepare the LIIE based on the PL using the information that is available to create an output in the format/structure as specified in the Probe-CD.

In the case of critical LIIEs (e.g., LIIE having high or medium criticality), and that some information sub-elements of the LIIE are not received successfully (and/or in a timely manner, depending on priority) from a primary probe, the Data processor instance 710 may determine whether there is a fallback probe for the LIIE. The fallback probe may be the probe itself (i.e., the probe that hosts Data Processor instance 710), or a downstream probe. In both cases, the Data processor instance 710 may fetch the LIIE information received from the fallback probe, and prepare the LIIE contents based on the fetched information.

The Data processor instance 710 in the probe may also determine schedule of delivery of the LIIE(s), based on the prior-pending queue (PPQ) and the priority of the LIIE. For example, if the PPQ contains pending information for that LIIE, and has to be delivered before the currently prepared information, then schedule the delivery of the newly prepared LIIE after the delivery of the LIIE information in the PPQ. If there is insufficient information for an LIIE to be delivered, Data processor instance 710 may prepare a deficiency notification. The deficiency notification can also be scheduled to be transmitted at the same priority as that of the LIIE by, for example, filling in the LIIE with some reserved values specifying the deficiency. For highly critical LIIEs, the probe may also create a place-holder for backup delivery schedule, and update the PPQ accordingly. For other LIIEs, the delivery may be skipped or delivery scheduled later if information arrives later.

For each LIIE, the probe may transmit the LIIE report to the next-level upstream probe or IoTSP 110 via PRCOM module 610 using the interface and protocols as determined and configured (LI-PROBE-ITF-PROTOS). To perform the transmission, data processor instance 710 of the specific PR-LIC may insert the data to be reported into the data reporting queue 712 in that PR-LIC. PRCOM module 610 also fetches the information in this queue and then inserts them into a common queue for the interface using which the LI information is to be reported to the upstream probe. PRCOM module 610 may also insert the LI information fetched from the data reporting queue 712 of the PR-LIC into the common queue based on the priority and criticality of the information to be reported.

PRCOM module 610 can also transmit bulk data (BU-DAT-PROBE) received from PRDC module 604 to the next-level upstream probe (or IoTSP 110) using the interface and protocols as determined and configured earlier. In case the same interface is used for sending the LIIEs as well as BU-DAT-PROBE, PRCOM module 610 can schedule BU-DAT-PROBE with a lower priority or may defer sending BU-DAT-PROBE to ensure that the LIIEs are sent in a timely manner fulfilling the priority, criticality and FoR requirements.

After transmission of the prepared LI information, PRCOM module 610 determines whether the transmission is successful and timely. If the transmission is not successful, PRCOM module 610 may trigger a re-transmission using backup channel if the LI information is high priority. If the re-transmission also fails, PRCOM module 610 may take action based on the criticality, such as putting it in pending queue. If the LI-information is not critical, PRCOM module 610 may skip delivery of the information.

The Data processor instance 710 in the PR-LIC and the SPCOM also provide relevant diagnostic info about the probe performance, e.g., % of successful delivery, % of successful timely delivery, etc. for that specific LI operation to the PRDP module 606 in the probe.

The PRDP module 606 also obtains diagnostic info provided by the PRDC module 604 as explained in description of Step 906—based on PRDC module 604's observations, as well as diagnostic info collected from other components in the probe and next-level downstream probes. The PRDP module 606 consolidates the diagnostic info reported by the Data processor instance 710 of that specific PR-LIC, PRCOM module 610 and PRDC module 604. The PRDP module 606 then sends this consolidated diagnostic info (PR-DIAG-INFO) to the next-level upstream probe or IoTSP 110 as appropriate.

Method of Reconfiguration of Probe-Topology (LI-PROTOP) and Probes

Reference is now made to FIG. 10, which illustrates an exemplary method 1000 for reconfiguration of probe-topology (LI-PROTOP) and probes. In some embodiments, method 1000 can be performed by LIPC module 204 of IoSTP 110.

After an initial start, LIPC module 206 determines whether there is need for reconfiguration, in step 1002. The determination can be based on the priority and criticality of the impacted LIIE(s). For example, if the priority or criticality is high, and the consecutive instances of failure of timely delivery exceeds a predetermined threshold, LIPC module 206 can determine there is need for reconfiguration.

After determining that there is a need for reconfiguration, LIPC module 206 may determine the elements to be re-configured, in step 1004. The elements for reconfiguration may include, for example, LI-PROTOP (changing the topology of probes), the communication channel, etc. The determination can be based on the priority, criticality, etc., according to the follow exemplary algorithm:

If the LIIE is high priority and is successfully delivered but with a delay then{ if one or more probes responsible for that LIIE has toggled exceeds a pre- provisioned threshold then{ reconfiguration element = LI-PROTOP; } else{ reconfiguration element = communication channel; } else{ if the LIIE is highly critical and was not delivered properly then{ if one or more probes responsible for that LIIE had become unavailable then{ reconfiguration element = LI-PROTOP; } else { if alternate communication channels exist then { reconfiguration element = communication channel;  }  else { reconfiguration element = LI-PROTOP  } } else{ no reconfiguration is required } }

After determining the elements to be reconfigured, LIPC module 206 may perform the reconfiguration, in step 1006. In a case where the reconfiguration element is a communication channel (e.g., interface), LIPC module 206 may deselect the current communication channel, and choose an alternative communication channel based on, for example, the priority, FoR, available resources on the interface, security requirements, criticality, IoTSP past performance (IoTSP-PAST-PERF), etc.

In a case where the reconfiguration element is LI-PROTOP, LIPC module 206 may remove the currently used probes which have issues with info collection/preparation for the LIIE from the possible probes list in ISMT for that LIIE. LIPC module 206 also determines new data sources (primary/fallback sources) based on ISMT and elementary-LIIE dependency relationship (ELIIEDR), which may include, for example, criticality, priority, FoR, FoS, etc. The determination can also be based on mobility and security information of the associated probes based on the strategy for example as shown in Table 4. LIPC module 206 may also determine suitability rank for the identified sources from ISMT based on the above strategy and the probe-details (PRODET) (past credentials/history, etc.). Based on the suitability rank, LIPC module 206 may select new sources for the LIIEs, and update both LI-PROTOP and AISMT.

To update AISMT, LIPC module 206 may identify DLIIE (dependent LIIE) where the LIIE has one or more ULIIE. For each DLIIE, LIPC module 206 may determine information preparing node (IPN) which aggregates the information for preparing the DLIIE, then prepares and sends the PLIIE/DLIIE. The IPN can be determined based on the LIIE-PL and the updated LI-PROTOP. Based on the probe(s) chosen, LIPC module 206 can also determine the LIAC for each probe level, update AISMT with the new IPN and LIAC for the LIIE (and dependent LIIEs), and update Probe-CD and Probe-DI for the newly selected probe(s) for the LIIE, and for the probes that have been de-selected, due to the change in LI-PROTOP and consequently the AISMT. LIPC module 206 also updates the I-LIC, and transmits the updated Probe-CD and Probe-DI information to all the impacted probes.

After performing the reconfiguration, LIPC module 206 proceeds to assess the effectiveness of the reconfiguration, in step 1008. The determination of whether the reconfiguration is effective can be based on evaluating the change in diagnostic parameters such as rate of successful delivery, rate of successful timely delivery, etc., over a time window (ADAPT-T-WIND). If the reconfiguration did not result in an improvement in the observed diagnostic parameters over the time window ADAPT-T-WIND, then the LIPC module 206 proceeds to perform another reconfiguration by starting again from step 1002 after updating the ADAPT-T-WIND value as detailed below. If the reconfiguration resulted in an improvement in the observed diagnostic parameters over the time window ADAPT-T-WIND, the LIPC module 206 stops assessing the effectiveness of the reconfiguration and updates the ADAPT-T-WIND value as explained below. The time window ADAPT-T-WIND can be of a pre-configured length, and can double every successive time when the improvement assessment results in a re-configuration action. Such an arrangement can result in more stability in the assessment. The ADAPT-T-WIND value can be restored to the pre-configured value if no re-configuration was triggered during the adapted time window.

System Architecture

FIG. 11 includes block diagrams of an exemplary system 1100 for implementing embodiments consistent with the present disclosure. Variations of system 1101 may be used for implementing, for example, IoTSP 110 of FIG. 1. System 1101 may comprise a central processing unit (“CPU” or “processor”) 1102. Processor 1102 may comprise at least one data processor for executing program components for executing user- or system-generated requests. A user may include a person, a person using a device such as those included in this disclosure, or such a device itself. The processor may include specialized processing units such as integrated system (bus) controllers, memory management control units, floating point units, graphics processing units, digital signal processing units, etc. The processor may include a microprocessor, such as AMD Athlon, Duron or Opteron, ARM's application, embedded or secure processors, IBM PowerPC, Intel's Core, Itanium, Xeon, Celeron or other line of processors, etc. The processor 1102 may be implemented using mainframe, distributed processor, multi-core, parallel, grid, or other architectures. Some embodiments may utilize embedded technologies like application-specific integrated circuits (ASICs), digital signal processors (DSPs), Field Programmable Gate Arrays (FPGAs), etc.

Processor 1102 may be disposed in communication with one or more input/output (I/O) devices via I/O interface 1103. The I/O interface 1103 may employ communication protocols/methods such as, without limitation, audio, analog, digital, monoaural, RCA, stereo, IEEE-1394, serial bus, universal serial bus (USB), infrared, PS/2, BNC, coaxial, component, composite, digital visual interface (DVI), high-definition multimedia interface (HDMI), RF antennas, S-Video, VGA, IEEE 802.11 a/b/g/n/x, Bluetooth, cellular (e.g., code-division multiple access (CDMA), high-speed packet access (HSPA+), global system for mobile communications (GSM), long-term evolution (LTE), WiMax, or the like), etc.

Using the I/O interface 1103, the system 1101 may communicate with one or more I/O devices. For example, the input device 1104 may be an antenna, keyboard, mouse, joystick, (infrared) remote control, camera, card reader, fax machine, dongle, biometric reader, microphone, touch screen, touchpad, trackball, sensor (e.g., accelerometer, light sensor, GPS, gyroscope, proximity sensor, or the like), stylus, scanner, storage device, transceiver, video device/source, visors, etc. Output device 1105 may be a printer, fax machine, video display (e.g., cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode (LED), plasma, or the like), audio speaker, etc.

In some embodiments, the processor 1102 may be disposed in communication with a communication network 1108 via a network interface 1107. The network interface 1107 may communicate with the communication network 1108. The network interface may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc. The communication network 1108 may include, without limitation, a direct interconnection, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), cellular network, Wi-Fi, the Internet, etc. Using the network interface 1107 and the communication network 1108, the system 1101 may communicate with devices 1109, 1110, as well as LIG 114 of FIG. 1 and probes 1111. Devices 1109 and 1110 may include, without limitation, personal computer(s), server(s), fax machines, printers, scanners, various mobile devices such as cellular telephones, smartphones (e.g., Apple iPhone, Blackberry, Android-based phones, etc.), tablet computers, eBook readers (Amazon Kindle, Nook, etc.), laptop computers, notebooks, gaming consoles (Microsoft Xbox, Nintendo DS, Sony PlayStation, etc.), or the like. In some embodiments, the system 1101 may itself embody one or more of these devices.

In some embodiments, the processor 1102 may be disposed in communication with one or more memory devices (e.g., RAM 1113, ROM 1114, etc.) via a storage interface 1112. The storage interface may connect to memory devices including, without limitation, memory drives, removable disc drives, etc., employing connection protocols such as serial advanced technology attachment (SATA), integrated drive electronics (IDE), IEEE-1394, universal serial bus (USB), fiber channel, small computer systems interface (SCSI), etc. The memory drives may further include a drum, magnetic disc drive, magneto-optical drive, optical drive, redundant array of independent discs (RAID), solid-state memory devices, solid-state drives, etc. Variations of memory devices may be used for implementing, for example, the databases disclosed herein.

The memory devices may store a collection of program or database components, including, without limitation, an operating system 1116, user interface application 1117, application data 1121 (e.g., any data variables or data records discussed in this disclosure), etc. The operating system 1116 may facilitate resource management and operation of the system 1101. Examples of operating systems include, without limitation, Apple Macintosh OS X, Unix, Unix-like system distributions (e.g., Berkeley Software Distribution (BSD), FreeBSD, NetBSD, OpenBSD, etc.), Linux distributions (e.g., Red Hat, Ubuntu, Kubuntu, etc.), IBM OS/2, Microsoft Windows (XP, Vista/7/8, etc.), Apple iOS, Google Android, Blackberry OS, or the like. User interface 1117 may facilitate display, execution, interaction, manipulation, or operation of program components through textual or graphical facilities. For example, user interfaces may provide computer interaction interface elements on a display system operatively connected to the system 1101, such as cursors, icons, check boxes, menus, scrollers, windows, widgets, etc. Graphical user interfaces (GUIs) may be employed, including, without limitation, Apple Macintosh operating systems' Aqua, IBM OS/2, Microsoft Windows (e.g., Aero, Metro, etc.), Unix X-Windows, web interface libraries (e.g., ActiveX, Java, Javascript, AJAX, HTML, Adobe Flash, etc.), or the like.

FIG. 12 includes block diagrams of an exemplary system 1200 for implementing embodiments consistent with the present disclosure. Variations of system 1201 may be used for implementing, for example, probe(s) 1111 of FIG. 11. System 1201 may comprise a central processing unit (“CPU” or “processor”) 1202. Processor 1202 may comprise at least one data processor for executing program components for executing user- or system-generated requests. A user may include a person, a person using a device such as those included in this disclosure, or such a device itself. The processor may include specialized processing units such as integrated system (bus) controllers, memory management control units, floating point units, graphics processing units, digital signal processing units, etc. The processor may include a microprocessor, such as AMD Athlon, Duron or Opteron, ARM's application, embedded or secure processors, IBM PowerPC, Intel's Core, Itanium, Xeon, Celeron or other line of processors, etc. The processor 1202 may be implemented using mainframe, distributed processor, multi-core, parallel, grid, or other architectures. Some embodiments may utilize embedded technologies like application-specific integrated circuits (ASICs), digital signal processors (DSPs), Field Programmable Gate Arrays (FPGAs), etc.

Processor 1202 may be disposed in communication with one or more input/output (I/O) devices via I/O interface 1203. The I/O interface 1203 may employ communication protocols/methods such as, without limitation, audio, analog, digital, monoaural, RCA, stereo, IEEE-1394, serial bus, universal serial bus (USB), infrared, PS/2, BNC, coaxial, component, composite, digital visual interface (DVI), high-definition multimedia interface (HDMI), RF antennas, S-Video, VGA, IEEE 802.11 a/b/g/n/x, Bluetooth, cellular (e.g., code-division multiple access (CDMA), high-speed packet access (HSPA+), global system for mobile communications (GSM), long-term evolution (LTE), WiMax, or the like), etc.

In some embodiments, the processor 1202 may be disposed in communication with a communication network 1208 via a network interface 1207. The network interface 1207 may communicate with the communication network 1208. The network interface may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc. The communication network 1208 may include, without limitation, a direct interconnection, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), cellular network, Wi-Fi, the Internet, etc. Using the network interface 1207 and the communication network 1208, the system 1201 may communicate with devices 1209, 1210, one or more upstream probes 1211, one or more downstream probes 1212, as well as IoTSP 110 of FIG. 1. Devices 1209 and 1210 may include, without limitation, personal computer(s), server(s), fax machines, printers, scanners, various mobile devices such as cellular telephones, smartphones (e.g., Apple iPhone, Blackberry, Android-based phones, etc.), tablet computers, eBook readers (Amazon Kindle, Nook, etc.), laptop computers, notebooks, gaming consoles (Microsoft Xbox, Nintendo DS, Sony PlayStation, etc.), or the like. In some embodiments, the system 1201 may itself embody one or more of these devices.

In some embodiments, the processor 1202 may be disposed in communication with one or more memory devices (e.g., RAM 1213, ROM 1214, etc.) via a storage interface 1212. The storage interface may connect to memory devices including, without limitation, memory drives, removable disc drives, etc., employing connection protocols such as serial advanced technology attachment (SATA), integrated drive electronics (IDE), IEEE-1394, universal serial bus (USB), fiber channel, small computer systems interface (SCSI), etc. The memory drives may further include a drum, magnetic disc drive, magneto-optical drive, optical drive, redundant array of independent discs (RAID), solid-state memory devices, solid-state drives, etc. Variations of memory devices may be used for implementing, for example, the databases disclosed herein.

The memory devices may store a collection of program or database components, including, without limitation, an operating system 1216, user interface application 1217, application data 1221 (e.g., any data variables or data records discussed in this disclosure), etc. The operating system 1216 may facilitate resource management and operation of the system 1201. Examples of operating systems include, without limitation, Apple Macintosh OS X, Unix, Unix-like system distributions (e.g., Berkeley Software Distribution (BSD), FreeBSD, NetBSD, OpenBSD, etc.), Linux distributions (e.g., Red Hat, Ubuntu, Kubuntu, etc.), IBM OS/2, Microsoft Windows (XP, Vista/7/8, etc.), Apple iOS, Google Android, Blackberry OS, or the like.

In some embodiments, system 1201 may store application data 1221, such as the data, variables, records, etc. as described in this disclosure. Such databases may be implemented as fault-tolerant, relational, scalable, secure databases such as Oracle or Sybase. Alternatively, such databases may be implemented using standardized data structures, such as an array, hash, linked list, struct, structured text file (e.g., XML), table, or as object-oriented databases (e.g., using ObjectStore, Poet, Zope, etc.). Such databases may be consolidated or distributed, sometimes among the various computer systems discussed above in this disclosure. It is to be understood that the structure and operation of any computer or database component may be combined, consolidated, or distributed in any working combination.

The specification has described systems and methods for lawful interception of electronic information. The illustrated steps are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments. Also, the words “comprising,” “having,” “containing,” and “including,” and other similar forms are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise.

Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.

It is intended that the disclosure and examples be considered as exemplary only, with a true scope and spirit of disclosed embodiments being indicated by the following claims. 

What is claimed:
 1. A method for providing lawful interception of information for an Internet of Things network (IoT Network), the method being performed by a topology of probes and comprising: receiving, through an interface, a request for information about a lawful interception target, the request including a specification for the information to be tracked and reported, the specification comprising information to be reported and reporting requirements; creating a hierarchy of lawful interception (LI) information elements by: generating the LI information elements based on the specification, each of the LI information elements including information related to data dependency between the LI information elements; and constructing a structured tree of LI information elements based on the data dependency between the LI information elements, wherein the structured tree of LI information elements represents hierarchical and dependency relationships between the LI information elements; determining a set of data sources for providing the requested information according to the hierarchy of the LI information elements; determining a hierarchy of probes based on the set of data sources; configuring the topology of probes based on a set of configurations; activating LI operation in the topology of probes; performing the LI operation by the topology of probes; verifying effectiveness of reporting conforming to the reporting requirements and taking corrective action, wherein verifying the effectiveness of the reporting conforming to the reporting requirements and taking the corrective action comprises: verifying the effectiveness by analyzing a cumulative inadequacy of available data and a cumulative reporting status confirmation from a law enforcement agency at a super-probe; determining a need for configuring the topology of probes based on the cumulative inadequacy of available data and the cumulative reporting status confirmation from the law enforcement agency via a lawful interception gateway; and altering the topology of probes and configuring the altered topology of probes based on the determined need for configuring the topology of probes as the corrective action; and updating learning data in a historical database at the end of the LI operation.
 2. The method of claim 1, wherein determining the set of data sources for providing the requested information according to the hierarchy of the LI information elements comprises: determining a set of candidate data sources based on at least one of: a frequency of reporting, a frequency of sampling, nature and type of available probes, or capability and past performance of the available probes; determining, from the set of candidate data sources, the set of data sources for providing the requested information based on at least one of: the reporting requirements, or network mobility and security; and determining, for an information element in the hierarchy of the LI information elements, and for an associated data source in the set of data sources, an alternate data source according to the reporting requirements.
 3. The method of claim 1, wherein determining the hierarchy of probes comprises: determining, for at least one LI information element of the hierarchy of the LI information elements and one or more associated data sources from the set of data sources, interconnections between the one or more associated data sources, the determination being based on the dependency between the LI information elements in the hierarchy of the LI information elements; and assigning a primary probe and an alternate probe for the at least one LI information element.
 4. The method of claim 1, wherein configuring the topology of probes comprises: determining the set of configurations comprising probe configurations at the super-probe within the topology of probes; determining conditions for activating the LI operation at the super-probe; selectively cascading the set of configurations comprising the probe configurations and the conditions for activating the LI operation through the topology of probes; receiving the set of configurations by a probe from an associated upstream probe in the topology of probes; and performing probe configuration comprising determination of probe level LI activation condition based on the received set of configurations.
 5. The method of claim 4, wherein selectively cascading the set of configuration comprises: extracting a portion of the received set of configurations, wherein the extracted portion is related to one or more LI operations at downstream probes; and cascading the extracted portion to the downstream probes.
 6. The method of claim 1, wherein activating the LI operation comprises: receiving, by the super-probe from one or more downstream probes of the super-probe in the topology of probes, a notification of fulfillment of conditions for activating the LI operation; transmitting, by the super-probe to the one or more downstream probes of the super-probe in the topology of probes, activation signals to activate the LI operation in the topology of probes, upon receiving the notification of fulfillment of the conditions for activating the LI operation; and responsive to receiving, at a first probe of the one or more downstream probes of the super-probe, the activation signals to activate the LI operation: initiating the LI operation at the first probe, and cascading the activation signals to a second probe that is a downstream probe of the first probe in the topology of probes to initiate the LI operation at the second probe.
 7. The method of claim 1, wherein the set of configurations comprises at least one of: data to collect, a frequency of data sampling, a LI activation condition, a frequency of transmission, a processing logic, a criticality, a priority, or a policy of storing and overwriting the collected data at a probe in the topology of probes.
 8. The method of claim 1, wherein performing the LI operation comprises: performing probe operations by at least one probe in the topology of probes; collecting data at the super-probe from the topology of probes as per the set of configurations; preparing data to be reported at the super-probe as per rules of reporting; transporting through at least one interface, selectively, at least a part of the prepared data by the super-probe to the lawful interception gateway according to the reporting requirements; and receiving a reporting status confirmation of the transported data from the lawful interception gateway at the super-probe.
 9. The method of claim 8, wherein performing the probe operations comprises: collecting data at one or more probes in the topology of probes based on the set of configurations; preparing data at the one or more probes in the topology of probes based on the set of configurations; and controlling a transmission of at least a part of the prepared data within the topology of probes according to a hierarchy of the probes within the topology of probes based on the set of configurations.
 10. The method of claim 8, wherein the preparation of data at the super-probe comprises: determining an inadequacy of available data by analyzing the prepared data at the super-probe as per rules of reporting; and compensating for the inadequacy of the available data by adding at least one marker to influence the transporting through an interface, at least a part of the prepared data to the law enforcement agency via the lawful interception gateway according to the reporting requirements.
 11. The method of claim 8, wherein the data collected comprises lawful interception data, supporting lawful interception data and diagnostics data.
 12. The method of claim 8, wherein the data prepared comprises lawful interception data, probe operation diagnostics data and probe-performance data.
 13. The method of claim 8, wherein transporting through the at least one interface comprises: determining at least one of: a schedule, a primary channel, and a secondary channel for transmission of the prepared data to be reported; transmitting the at least a part of the prepared data to be reported through the determined primary channel as per determined schedule; determining a status of the transmission of the report through a hardware interface using the primary channel, the status being determined based on at least one of: a priority and a criticality associated with the transmission of the collected data; and responsive to determining that the status indicates that the transmission is not successful, performing at least one of: triggering a transmission of the report using the secondary channel, updating the schedule for transmission of the report in second set of configurations, and skipping transmission of the report.
 14. The method of claim 1, wherein updating the learning data comprises: determining LI performance parameters and LI effectiveness parameters from cumulative verified effectiveness, cumulative probe operation diagnostics data, cumulative probe-performance data, and historical data; determining a historical trend of the probe performance parameters and probe effectiveness parameters; identifying a portion of the set of configurations requiring an alteration based on the LI performance parameters, the LI effectiveness parameters, and the historical data; altering the identified portion of the set of configurations requiring adjustments based on the LI performance parameters, the LI effectiveness parameters, the determined historical trend of the probe performance parameters and the probe effectiveness parameters, and the historical data; and updating learning in the historical data based on at least one of the LI performance parameters and the LI effectiveness parameters, the altered portions of the set of configurations, the altered portions of the probe topology, and the determined historical trend of the probe performance parameters and the probe effectiveness parameters.
 15. The method of claim 1, wherein the reporting requirements comprises a frequency of reporting, a priority of reporting, a criticality of reporting of each information to be reported to the law enforcement agency via the lawful interception gateway. 