WO2007082477A1 - A method for realizing the legal listening in the next generation network and a system thereof - Google Patents

A method for realizing the legal listening in the next generation network and a system thereof Download PDF

Info

Publication number
WO2007082477A1
WO2007082477A1 PCT/CN2007/000192 CN2007000192W WO2007082477A1 WO 2007082477 A1 WO2007082477 A1 WO 2007082477A1 CN 2007000192 W CN2007000192 W CN 2007000192W WO 2007082477 A1 WO2007082477 A1 WO 2007082477A1
Authority
WO
WIPO (PCT)
Prior art keywords
interception
function entity
entity
identifier
border gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2007/000192
Other languages
English (en)
French (fr)
Inventor
Bo Zheng
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to EP07702124.4A priority Critical patent/EP1976186B1/en
Publication of WO2007082477A1 publication Critical patent/WO2007082477A1/zh
Priority to US12/175,893 priority patent/US20080275988A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1023Media gateways
    • H04L65/1026Media gateways at the edge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1083In-session procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Definitions

  • the present invention relates to interception techniques, and more particularly to a method and system for implementing lawful interception for users accessing a fixed network in a Next Generation Network (NGN).
  • NTN Next Generation Network
  • Lawful interception refers to the enforcement of the public communication network communication service by the law enforcement agency (LEA) approved by the corresponding authorized authority and in accordance with relevant national laws and public communication network industry norms.
  • the basic implementation process of lawful interception is: Management function of legal law enforcement agency
  • the entity sends the interception data to the interception control network element in the communication network through the data interface XI-1; the interception control network element listens to the monitored object after receiving the interception data, and when listening to the activity of the monitored object,
  • the interception related information of the monitored object is sent to the 2-channel delivery function (DF2) entity through the X2 interface, and the media stream of the monitored object is sent to the monitoring center, that is, the 3-channel delivery function (DF3) entity through the X3 interface.
  • DF2 2-channel delivery function
  • DF3 3-channel delivery function
  • the NGN network is a converged network based on packet technology. It inherits all the services of the original fixed network and inherits the service capabilities of the mobile network.
  • the core network of the NGN network to be studied is the IP multimedia subsystem.
  • IMS IMS network
  • IMS network can provide services for users accessing from fixed network and users accessing from mobile network.
  • the interception control network element 3G GSN in the IMS network including the GPRS gateway support node (GGSN) and the serving GPRS support node (SNSN).
  • the monitoring is performed, and when the media stream of the listening object is received, the media stream is sent to the DF3 entity on the law enforcement side.
  • the 3G GSN in the IMS network includes the GGSN and the SNSN, and the user accesses the NGN through the mobile network.
  • the network entity involved in the time that is, when the user accesses the NGN from the mobile network, the transmission of the user media stream passes through the 3G GSN, so that the 3G GSN can copy the received user media stream, and The copied media stream is sent to the monitoring center to enable monitoring of the user's.
  • the 3G GSN in the IMS network is not the network entity involved when the user accesses the NGN through the fixed network. That is, when the user accesses the NGN from the fixed network, the transmission of the user media stream does not pass through the 3G GSN.
  • the 3G GSN cannot send the media stream of the user accessing the NGN from the fixed network to the monitoring center.
  • the main object of the present invention is to provide a method for implementing lawful interception in a next generation network
  • another object of the present invention is to provide a system for implementing lawful interception in a next generation network, so as to access the next generation from the fixed network. Users of the network implement lawful interception.
  • the interception information providing entity sends the interception object information to the border gateway function entity;
  • the border gateway function entity receives the monitored object information, and sends the media stream corresponding to the interception object to the 3-channel delivery function entity.
  • a system for providing lawful interception in a next generation network comprising: a 3-channel delivery function entity, configured to receive a media stream corresponding to the interception object, and analyze the received media stream, and perform real-time monitoring, the system further Including: monitoring information providing entity and border gateway function Body, where
  • the interception information providing entity is configured to send the interception object information to the border gateway function entity, and the border gateway function entity is configured to send the media stream corresponding to the monitoring object to the 3-channel delivery function entity according to the received interception object information.
  • the present invention can trigger the BGF entity to copy the media stream of the interception object accessed from the fixed network by listening to the data or the media stream description information corresponding to the interception object, and send the copied media stream to the DF3.
  • the entity realizes the lawful interception of the user accessing the fixed network in the NGN, greatly expands the application scope of the lawful interception service, and improves the service service of the NGN network.
  • Figure 1 is a schematic view showing the basic structure of the system of the present invention.
  • Fig. 2A1 is a schematic diagram showing the basic structure of the system of the present invention only when the ADMF entity is used as the interception information providing entity.
  • 2A2 is a schematic diagram showing an optimized structure of the system of the present invention only when the ADMF entity is used as the interception information providing entity.
  • 2B is a schematic diagram showing the basic structure of the system of the present invention when the ADMF entity and the P-CSCF entity are collectively used as the interception information providing entity.
  • 2C is a schematic diagram showing the basic structure of the system of the present invention when the interception control network element entity in the NGN network serves as the interception information providing entity.
  • FIG. 3 is a flow chart of Embodiment 1 of the present invention.
  • Figure 4 is a flow chart of Embodiment 2 of the present invention.
  • Figure 5 is a flow chart of Embodiment 3 of the present invention.
  • FIG. 6 is a flow chart of Embodiment 4 of the present invention. Mode for carrying out the invention
  • the RACS subsystem defines a service-based policy.
  • SPDF Decision function
  • BGF BGF entities
  • AF management function
  • P-CSCF proxy call session control function
  • the BGF entity is connected to the SPDF entity
  • the BGF entity is a packet-to-packet gateway.
  • the BGF entity can be utilized to implement lawful interception of the user accessing the NGN from the fixed network.
  • the present invention proposes a method for implementing lawful interception in NGN.
  • the core idea is: connect the BGF entity to the DF3 entity; the interception information providing entity sends the interception object information to the BGF entity; and the BGF entity receives the data according to the reception.
  • the listener information to the listener sends the media stream corresponding to the listener object to the DF3 entity.
  • the interception information providing entity may be an ADMF entity on the enforcement agency side.
  • the process of the ADMF entity sending the interception object information to the BGF entity may be: using the BGF entity as the interception control network element, that is, The ADMF entity is connected to the BGF entity through the existing X1_l interface, so that when the interception of a listener object is required, the ADMF entity on the law enforcement agency directly sends the interception data carrying the interception object identifier as the interception object information.
  • the ADMF entity on the law enforcement agency first sends the interception data to the existing interception control network element, and the interception control network element sends the identifier of the BGF entity to the ADMF entity.
  • the ADMF entity further uses the interception data of the interception object identifier or the media stream description information corresponding to the interception object as the listener object according to the identifier of the received BGF entity. Information is sent to the BGF entity.
  • the present invention may also set a monitoring data processing function entity in the NGN network in advance; thus, the ADMF entity passes the monitoring.
  • the forwarding of the data processing function entity implements the above process of transmitting the interception data to the BGF entity.
  • the interception information providing entity may also be an existing monitoring control in the NGN network, and the network element is generated. At this time, the existing monitoring control network element may send the monitoring object information to the BGF entity.
  • the interception control network element in the NGN network receives the interception data of the interception object identifier sent by the ADMF entity, and then carries the interception data of the interception object identifier or the media stream description information corresponding to the interception object as the interception object information. Send to BGF entity.
  • Figure 1 is a schematic view showing the basic structure of the system of the present invention.
  • the present invention also provides a system for implementing lawful interception in an NGN network, the system comprising: a interception information providing entity, an entity, and a DF3 entity, where
  • a monitoring information providing entity configured to send the monitoring object information to the BGF entity
  • a BGF entity configured to send, according to the received interception object information, a media stream corresponding to the interception object to the DF3 entity;
  • the DF3 vendor is configured to receive a media stream corresponding to the interception object, and analyze the received media stream to implement monitoring.
  • 2A1 is a schematic diagram showing the basic structure of the system of the present invention when an ADMF entity is used as a monitoring information providing entity and a BGF entity is used as a monitoring control network element.
  • the interception information providing entity may be an ADMF entity
  • the ADMF entity may be directly connected to the BGF entity that is the interception control network element through the X1_1 interface.
  • FIG. 2A2 is a schematic diagram showing an optimized structure of the system of the present invention when an ADMF entity is used as a monitoring information providing entity and a BGF entity is used as a monitoring control network element. See Figure 2A2, when listening to information
  • the providing entity is an ADMF entity and the BGF entity is the intercepting control network element, in order to prevent the ADMF entity on the law enforcement side from interacting with a large number of BGF entities, thereby reducing the traffic load of the ADMF entity, preferably, in the system of the present invention
  • the monitoring data processing function entity may be further included, and the ADMF entity is configured to send the monitoring data to the monitoring data processing function entity, where the monitoring data processing function entity is configured to send the received monitoring data to the BGF.
  • FIG. 2B is a schematic diagram showing the basic structure of the system of the present invention when the ADMF entity is used as the interception information providing entity and the BGF entity is not used as the monitoring control network element.
  • the monitoring control network element in the system of the present invention can be executed by the existing monitoring control network element.
  • the existing monitoring control network element may be a lawful interception application server (LI-AS), or a P-CSCF entity, or an S-CSCF entity, and the interception control network element is used to carry the interception according to the ADMF entity.
  • LI-AS lawful interception application server
  • P-CSCF entity P-CSCF entity
  • S-CSCF entity S-CSCF entity
  • the interception data of the object identifier is used to obtain the identifier of the corresponding BGF entity, and the media stream description information corresponding to the identifier of the acquired BGF entity is sent to the ADMF entity; the ADMF entity corresponding to the identifier of the received BGF entity The media stream description information of the interception object is sent to the BGF entity as the interception object information.
  • FIG. 2C is a schematic diagram showing the basic structure of the system of the present invention when the interception control network element entity in the NGN network serves as the interception information providing entity.
  • the interception control network element may carry the interception data sent by the ADMF entity in a message and send it to the BGF entity, or The media stream description information corresponding to the interception object in the session is carried in the message and sent to the BGF entity according to the interception data of the identifier of the interception object sent by the ADMF entity.
  • Example 1 Figure 3 is a flow chart of Embodiment 1 of the present invention.
  • the ADMF entity on the law enforcement agency side is used as the interception information providing entity in the present invention
  • the BGF entity is used as the interception control network element as an example.
  • the implementation of implementing lawful interception for a user accessing from a fixed network includes the following steps:
  • Step 301 Connect the BGF entity in the NGN network to the DF3 entity on the law enforcement side through the X3 interface.
  • Step 302 Connect the ADMF entity on the law enforcement agency side to the BGF entity through the existing XI-1 interface.
  • Step 303 When it is necessary to perform monitoring on a listening object, the ADMF entity on the law enforcement side sends the monitoring data carrying the monitoring object identifier directly to the BGF entity through the XI-1 interface.
  • the interception object identifier may be a session initial protocol uniform resource identifier (SIP URI) and a telephone uniform resource locator (TEL URL) of the interception object.
  • SIP URI session initial protocol uniform resource identifier
  • TEL URL telephone uniform resource locator
  • the ADMF entity sends the interception data carrying the identifier of the interception object to the BGF entity, so that the BGF entity obtains the interception data as the interception control network element.
  • the BGF entity can be used as the interception control network element to obtain the interception data by using the forwarding of an entity. Referring to FIG.
  • a monitoring data processing function entity is set in the NGN network in advance, and The set listening data processing function entity is respectively connected to the ADMF entity and the BGF entity on the law enforcement agency side, wherein the set listening data processing function entity is connected to the ADMF entity through the XI-1 interface; thus, step 302 to step 303
  • the process becomes: when the interception of a listener object is required, the ADMF entity on the law enforcement agency side directly sends the interception data carrying the interception object identifier to the interception data processing function entity through the Xl_l interface; The function entity sends the received interception data carrying the identifier of the interception object to the BGF entity.
  • the interception data processing function entity that is set may perform the interaction process with the BGF entity through the Diameter protocol.
  • Step 304 The BGF entity saves the received interception data carrying the identifier of the interception object.
  • Step 305 After receiving the session establishment request (INVITE), the P-CSCF entity sends the identifier of the current user to the SPDF entity.
  • the P-CSCF entity may send the identity of the current user to the SPDF entity through an Authentication Authorization Request (AA-Request) message.
  • AA-Request Authentication Authorization Request
  • the current user identifier here and below may be the SIP URI and TEL URL of the current user.
  • Step 306 The SPDF entity sends the identifier of the current user to the BGF entity.
  • the present invention can pre-extend the H.248 protocol message by adding a user identity packet to the H.248 protocol message, for example, the added
  • the user identity package can be defined as follows:
  • MCP Media Gateway Control
  • Subscriberd abcdefg@ims.example.com, indicating that the relevant user identity is only abcdefg@ims.exam.ple.como
  • the SPDF entity can carry the identifier of the current user in the H.248 protocol message, such as the added message in the Add message, and then send it to the BGF entity.
  • the P-CSCF entity does not directly send the current user identifier to the BGF entity, but the SPDF entity passes the extended H.248 protocol message carrying the user identification packet.
  • the secondary user identity is sent to the BGF entity.
  • the P-CSCF entity may also send the current user identifier to the BGF entity through the extended H.248 protocol message carrying the user identification packet, and the specific implementation is implemented.
  • the P-CSCF entity carries the current user identifier in the extended user identification packet in the H.248 protocol message and directly sends the BGF entity to the BGF entity.
  • the P-CSCF entity carries the current user identifier in the H.248 protocol message.
  • the extended user identification packet is first sent to the SPDF entity, and the SPDF entity transparently transmits the received H.248 protocol message carrying the current user identifier in the extended user identification packet to the BGF entity.
  • Step 307 The BGF entity determines whether the current user is the monitoring object according to the identifier of the current user and the monitoring data of the user identifier that is saved by itself. If yes, step 308 is performed; otherwise, the existing connection is established and the medium is transmitted. The process of the flow, ending the current process.
  • the BGF entity analyzes the Add message, and obtains the identifier of the current user from the user identifier packet of the Add message.
  • Step 308 The BGF entity allocates a legally monitored replication resource.
  • Step 309 After the primary and the called connection establishment of the session is completed, after the primary and the called user implements the communication, the BGF entity uses the allocated legal interception replication resource to correspond to the received The user's media stream is copied.
  • Step 310 The BGF entity sends the copied media stream to the DF3 entity through the X3 interface.
  • Step 311 The DF3 entity analyzes the received media stream to implement monitoring for the interception object accessing the NGN from the fixed network.
  • FIG. 4 is a flow chart of Embodiment 2 of the present invention.
  • the ADMF entity is used as the interception information providing entity in the present invention, but the BGF entity is not used as the interception control network element.
  • the present invention is directed to fixed
  • the process for the network access user to implement lawful interception includes the following steps:
  • Step 401 Connect the BGF entity in the NGN network to the DF3 entity on the law enforcement side through the X3 interface.
  • Step 402 When it is necessary to perform monitoring on a listening object, the ADMF entity on the law enforcement side sends the monitoring data carrying the monitoring object identifier to the existing monitoring control network element through the XI-1 interface.
  • the P-CSCF entity, the S-CSCF entity, and the LI-AS can receive the interception data carrying the identifier of the interception object as the interception control network element.
  • the following implementation process of the embodiment is described by taking the P-CSCF entity as the monitoring control network element in FIG. 2B as an example.
  • Step 403 The P-CSCF entity saves the interception data carrying the identifier of the interception object.
  • Step 404 In the process of establishing the session, the P-CSCF entity determines whether the current user is the monitoring object according to the saved monitoring data carrying the identifier of the monitoring object and the identifier of the current user. If yes, step 405 is performed. Otherwise, the existing process of establishing a connection and transmitting the media stream is performed, and the current process is ended.
  • Step 405 The P-CSCF entity will correspond to the media stream of the interception object in this session.
  • the identity of the passed BGF entity is sent to the ADMF entity.
  • the listener object here is the current user.
  • the P-CSCF entity may send the identifier of the BGF entity corresponding to the media stream corresponding to the intercepting object to the ADMF entity through the DF2 entity on the law enforcement agency side.
  • Step 406 The ADMF entity sends the interception data carrying the identifier of the interception object to the corresponding BGF entity according to the identifier of the received BGF entity.
  • Step 407 The BGF entity copies the media stream corresponding to the interception object received by itself according to the received interception data carrying the identifier of the interception object.
  • Step 408 The BGF entity sends the copied media stream to the DF3 entity according to the received interception data carrying the identifier of the interception object.
  • the P-CSCF entity may further send the media stream description information corresponding to the interception object in the current session to the ADMF entity, so that the process of step 406 to step 408 is: the ADMF entity receives the And the identifier of the BGF entity is sent to the corresponding BGF entity, where the BGF entity receives the media corresponding to the interception object according to the received media stream description information corresponding to the interception object.
  • the stream is copied, and the copied media stream is sent to the DF3 entity according to the received media stream description information corresponding to the interception object.
  • the media stream description information corresponding to the interception object includes: a source IP address, a destination IP address, a source port number, a destination port number, and the like corresponding to the media stream of the interception object.
  • Step 409 The DF3 entity analyzes the received media stream to implement monitoring for the interception object accessing the NGN from the fixed network.
  • the interception control network element in the NGN network is used as the interception information providing entity in the present invention, and the interception control network element triggers the BGF entity to copy the media stream of the interception object by carrying the interception data in the message.
  • Figure 5 is a flow chart of Embodiment 3 of the present invention.
  • a lawful interception application server (LI-AS) in an NGN network is used as a monitoring control network element, and a BGF entity is used to copy a media stream of a monitoring object by carrying a monitoring data in a message.
  • the process of implementing lawful interception for a user accessing from a fixed network includes the following steps:
  • Step 501 Connect the BGF entity in the NGN network to the DF3 entity on the law enforcement side through the X3 interface.
  • Step 502 Pre-extend the SIP protocol message, the H.248 protocol message, and the Diameter protocol message to enable the monitoring data to be carried.
  • an application type based on the XML format may be added to the SIP protocol message.
  • the added XML format-based application type may be defined as follows:
  • the current interception object identity is abcd@example.com
  • the current listening to the user needs to output the interception related information and the interception content.
  • the address of the output monitoring related information is given as df2@lea.com
  • the output monitor The address of the listening content is dC@lea.com.
  • a monitoring data packet may be added to the H.248 protocol message.
  • the added monitoring data packet may be defined as follows:
  • Listening packet definition (Lawf l Interception Data Package)
  • IRI (0x0001) outputs only IRI.
  • the MGC can carry a listener packet in any command to indicate that the user is listening and currently listening data for that user.
  • an attribute value pair (AVP) may be added to the Diameter protocol message.
  • AVP attribute value pair
  • the added attribute value pair may be defined as follows:
  • AVP Code Integer value, such as 530, AVP is recommended to carry "V" bit, it is recommended to carry '' ⁇ ' bit, indicating that the AVP is vendor-specific and must be recognized by the receiver. End security encryption.
  • the AVP format is defined as follows:
  • the Monitored-Subscriber-Identifier describes the identifier of the currently monitored object, and the Monitor-Type describes whether the current listening to the monitored object needs to output the communication content and the related information.
  • Delivery-Function2-Address gives the listener-related information output address
  • Delivery-Function3-Address gives the listener content output address.
  • Step 503 When it is necessary to perform monitoring on a listening object, the ADMF entity on the law enforcement agency side sends the monitoring data carrying the monitoring object identifier to the monitoring control network element through the XI-1 interface.
  • the P-CSCF entity, the S-CSCF entity, and the LI-AS can receive the interception data carrying the identifier of the interception object as the interception control network element.
  • Step 504 The LI-AS saves the received interception data carrying the identifier of the interception object.
  • Step 505 During the session establishment process, when the LI-AS receives the session establishment request, the LI-AS determines whether the user is the monitoring object according to the monitoring data of the monitoring object identifier and the current user identifier saved by the LI-AS. If yes, step 506 is performed. Otherwise, the existing process of establishing a session connection to implement communication is performed, and the current process is ended.
  • Step 506 The LI-AS adds itself to the signaling route of the session, and sends the session establishment request to the called user.
  • Step 507 When the LI-AS receives the response message returned by the called user, the LI-AS is The SIP protocol message carries the monitoring data of the interception object identifier that is saved by itself.
  • the LI-AS can carry the monitoring data saved by itself by using the message body of the ML format-based application type added in the response message of the SIP protocol.
  • Step 508 The LI-AS sends a response message of the SIP protocol carrying the interception data to the P-CSCF entity.
  • Step 509 The P-CSCF entity sends a message carrying the Diameter protocol of the interception data to the SPDF entity.
  • the P-CSCF entity first acquires the interception data from the message body of the XML format-based application type added in the received SIP protocol response message, and then can carry the attribute value pair added in the Diameter protocol response message.
  • the acquired monitor data is sent to the SPDF entity.
  • Step 510 The SPDF entity obtains the interception data from the received Diameter protocol response message, and the acquired interception data is carried in the extended monitoring data packet in the H.248 protocol packet, and then sent to the BGF entity.
  • Step 511 The BGF entity parses the extended interception data packet in the H.248 protocol packet to obtain the interception data.
  • Step 512 The BGF entity copies the media stream corresponding to the interception object according to the acquired interception data, and sends the copied media stream to the DF3 entity through the X3 interface.
  • Step 513 The DF3 entity analyzes the received media stream to implement interception of the interception object for accessing G from the fixed network.
  • the message of the Diameter protocol carrying the interception data is firstly executed by the P-CSCF entity, and the message is sent to the BGF entity through the SPDF entity, and the specific implementation is as shown in FIG. The principle is the same, but it is not necessary to expand at this time. Show SIP messages.
  • the interception control network element in the NGN network is used as the interception information providing entity in the present invention, and the interception control network element triggers the BGF entity replication by carrying the media stream inter-top topology description in the message. Listens to the object's media stream.
  • FIG. 6 is a flow chart of Embodiment 4 of the present invention.
  • the P-CSCF entity in the NGN network is used as the interception control network element, and the media stream of the interception object is triggered by the BGF entity by carrying the media stream topology description in the message.
  • the process of implementing lawful interception for the user accessing the fixed network includes the following steps: Step 601: Connect the BGF entity in the NGN network to the DF3 entity on the law enforcement organization side through the X3 interface.
  • Step 602 Pre-extend the SIP protocol message, the H.248 protocol message, and the Diameter protocol message to enable it to carry media stream description information corresponding to the interception object.
  • an application type based on the XML format may be added to the SIP protocol message, and the media stream description information corresponding to the interception object is carried by the message body of the application type.
  • the added XML-based type can be defined as follows:
  • the current call needs to copy the upstream (upstream) media stream from [5555::1:2:3:4]:1357 to [5555::a:b:c:d]:7531 .
  • the topology relationship between the endpoints in a context can be described by using the standard H.248 topology description. For details, refer to Appendix D of 3GPP 33107, which is not mentioned here.
  • the H.248 protocol message can be extended to carry the media stream description information corresponding to the interception object
  • the existing extended H.248 monitoring packet can be utilized, and the core idea is:
  • Master termination which is used to save the slave terminal's terminal identifier (which is referred to as the master endpoint, whose media copy indication attribute is common) to the slave terminal.
  • the master termination is valid for the slave endpoint, and the type is length. An 8-byte string.
  • the attribute is Slave, and specify its master endpoint and replication mode, the slave endpoint copies the corresponding packet from the specified master endpoint.
  • an attribute value pair (AVP) may be added to the Diameter protocol message, for example, the added attribute.
  • Value pairs can be defined as follows:
  • AVP Code Integer value, such as 531, AVP is recommended to carry "V” bit. It is recommended to carry "M” bit, indicating that the AVP is vendor-specific and must be recognized by the receiver. End-to-end secure encryption is possible.
  • the AVP format is defined as follows:
  • the Media-Stream-Description describes the media stream information that needs to be copied.
  • the media stream source IP address, destination IP address, source port number, destination port number, and protocol type that need to be copied can be specified in the Media-Stream-Description. Wait.
  • Copy-Direction describes the direction of the media stream that needs to be copied. For example, you can use Copy-Direction to describe that only the media stream from the source IP address to the destination IP address is currently copied.
  • Step 603 When performing monitoring on a listening object, the ADMF entity on the law enforcement agency sends the interception data carrying the interception object identifier to the interception control network element P-CSCF entity through the Xl_l interface.
  • Step 604 The P-CSCF entity saves the received interception data carrying the identifier of the interception object.
  • Step 605 During the session establishment process, the P-CSCF entity determines whether the current user is the monitoring object according to the saved monitoring data carrying the monitoring object identifier and the identifier of the current user. If yes, step 606 is performed; otherwise, Execute the existing process of establishing a connection and transmitting a media stream, ending the current process.
  • Step 606 The P-CSCF entity carries the media stream description message corresponding to the interception object in the session in the response message of the Diameter protocol and sends the message to the SPDF entity.
  • the P-CSCF entity may carry the media stream description information corresponding to the interception object by using the attribute value pair added in the Diameter protocol response message.
  • Step 607 The SPDF entity carries the media stream description information corresponding to the interception object in the session in the response message of the H.248 protocol and sends the message to the BGF entity.
  • the SPDF entity can use the interception packet added in the H.248 protocol response message to carry the media stream description information corresponding to the interception object.
  • Step 608 The BGF entity obtains media stream description information corresponding to the interception object in the current session from the received response message.
  • Step 609 The BGF entity copies the media stream corresponding to the interception object according to the obtained media stream description information corresponding to the interception object, and sends the copied media stream to the DF3 entity through the X3 interface.
  • Step 610 The DF3 entity analyzes the received media stream to implement monitoring for the interception object accessing the NGN from the fixed network.
  • the message carrying the media stream description information corresponding to the interception object is first constructed by the P-CSCF entity, and the message is sent to the BGF entity through the SPDF entity.
  • the LI-AS or S-CSCF entity may also use the extended SIP protocol message to first construct a message carrying the media stream description information corresponding to the interception object.
  • the message is sent to the BGF entity through the P-CSCF entity and the SPDF entity, and the specific implementation process is the same as the process shown in FIG. 6 above.
  • the query command and the lawful interception deactivation command sent by the ADMF entity are sent to the BGF entity by the method in the foregoing embodiments, thereby triggering the BGF entity to perform the corresponding query listener object related attribute and cancel the monitoring operation. .
  • the current user may be a calling user and/or a called user in the current session.
  • the BGF entity may be an access border gateway function (A-BGF) entity that provides a connection between the user terminal and the access network, or a core border gateway function that provides a connection between the access network and the core network. (C-BGF) entity.
  • A-BGF access border gateway function
  • C-BGF core border gateway function

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

一种在下一代网络中实现合法监听的方法和系统
技术领域
本发明涉及监听技术, 特别是涉及一种在下一代网络(NGN ) 中针 对从固定网络接入的用户实现合法监听的方法和系统。 发明背景
合法监听是指执法机构 ( LEA )经相应的授权机关批准, 根据国家 相关法律和公众通信网行业规范对公众通信网通信业务进行监听的执 法行为。 合法监听的基本实现过程为: 执法机构侧合法监听的管理功能
( ADMF ) 实体通过数据接口 XI— 1将监听数据发送至通信网络中的监 听控制网元; 监听控制网元接收到监听数据后对被监听对象进行监听, 当监听到被监听对象的活动时, 通过 X2接口将被监听对象的监听相关 信息发送至 2通道递交功能(DF2 ) 实体, 并通过 X3接口将被监听对 象的媒体流发送至监听中心即 3通道递交功能(DF3 ) 实体。
NGN网络是基于分组技术的融合型网络,它继承了原有固定网络的 所有业务, 同时也继承了移动网络的业务能力。 在目前各标准组织研究 的 NGN 网络中, 重点研究的 NGN 网络的核心网是 IP 多媒体子系统
( IMS ) 网络, IMS 网络可以同时为从固定网珞接入的用户以及从移动 网络接入的用户提供服务。
目前 3GPP给出的标准中,在 NGN中实现合法监听业务时,是由 IMS 网络中的监听控制网元 3G GSN, 包括 GPRS网关支持节点( GGSN )和 服务 GPRS支持节点 (SNSN ), 对监听对象进行监听, 并在接收到监听 对象的媒体流时,将该媒体流发送至执法机构侧的 DF3实体。但是, IMS 网络中的 3G GSN包括 GGSN和 SNSN,是用户通过移动网络接入 NGN 时所涉及的网络实体, 也就是说, 当用户从移动网络接入 NGN时, 该 用户媒体流的传输会经过 3G GSN,这样, 3G GSN便可对所接收到的用 户媒体流进行复制, 并将所复制的媒体流发送至监听中心, 从而实现对 用户'的监听。 然而, IMS网絡中的 3G GSN却不是用户通过固定网络接 入 NGN时所涉及的网络实体, 也就是说, 当用户从固定网络接入 NGN 时,该用户媒体流的传输不会经过 3G GSN, 3G GSN无法将从固定网络 接入 NGN的用户的媒体流发送至监听中心。 而针对用户从固定网络接 入的情况, 目前也没有其它的合法监听媒体流的采集方案。
由此可见,在目前的 NGN网絡中,无法实现对从固定网络接入 NGN 的用户的监听, 极大地限制了合法监听业务的应用范围, 降低了 NGN 网络的业务服务质量。 发明内容 ■
本发明的主要目的在于提供一种在下一代网络中实现合法监听的方 法, 本发明的另一目的在于提供一种在下一代网络中实现合法监听的系 统, 以便针对从固网接入下一代网络的用户实现合法监听。
为了达到上述目的, 本发明的技术方案是这样实现的: .
一种在下一代网络中实现合法监听的方法, 将下一代网络中的边界 网关功能实体与执法机构侧的 3通道递交功能实体相连,该方法还包括:
A、 监听信息提供实体将监听对象信息发送至边界网关功能实体;
B、 边界网关功能实体 居接收到的监听对象信息, 将对应于监听 对象的媒体流发送至 3通道递交功能实体。
一种在下一代网络中提供合法监听的系统, 包括: 3 通道递交功能 实体, 用于接收对应于监听对象的媒体流, 并对所接收到的媒体流进行 分析, 实琬监听, 该系统还包括: 监听信息提供实体和边界网关功能实 体, 其中,
监听信息提供实体,用于将监听对象信息发送至边界网关功能实体; 边界网关功能实体, 用于根据接收到的监听对象信息, 将对应于监 听对象的媒体流发送至 3通道递交功能实体。
-由此可见, 本发明能够通过监听数据或对应于监听对象的媒体流描 述信息来触发 BGF 实体对从固定网络接入的监听对象的媒体流进行复 制, 并将所复制的媒体流发送至 DF3实体, 从而实现了在 NGN中对从 固定网络接入的用户进行合法监听的目的, 极大地扩展了合法监听业务 的应用范围, 提高了 NGN网络的业务服务^:量。 附图简要说明
图 1是本发明系统的基本结构示意图。
图 2A1是仅当 ADMF实体作为监听信息提供实体时本发明系统的 基本结构示意图。
图 2A2是仅当 ADMF实体作为监听信息提供实体时本发明系统的 优化结构示意图。
图 2B是当 ADMF实体和 P-CSCF实体共同作为监听信息提供实体 时本发明系统的基本结构示意图。
图 2C是当 NGN网络中的监听控制网元实体作为监听信息提供实体 时本发明系统的基本结构示意图。
图 3是本发明实施例 1的流程图。
图 4是本发明实施例 2的流程图。
图 5是本发明实施例 3的流程图。
图 6是本发明实施例 4的流程图。 实施本发明的方式
目前,欧洲电信标准协会 ( ETSI )下属 TISPAN ( Telecommunications and Internet Converged Services and Protocols for Advanced Networking ) 组织在 NGN网络中定义了资源和准入控制子系统 (RACS ), RACS子 系统定义了基于服务的策略决策功能(SPDF ) 实体、 BGF 实体和其他 的网元。 其中, SPDF实体与 IMS网络中的管理功能(AF )实体即代理 呼叫会话控制功能(P-CSCF ) 实体相连, BGF实体与 SPDF实 ^相连, 并且, BGF实体是一个 packet-to-packet网关,位于从固定网络接入的用 户的媒体流传输路径中。 可见, 当用户从固定网络接入 G 时 , BGF 实体是可以获得用户的媒体流的, 因此,可以利用 BGF实体来实现对从 固定网络接入 NGN的用户的合法监听。 针对这一特点, 本发明提出了 一种在 NGN 中实现合法监听的方法, 其核心思想是: 将 BGF 实体与 DF3 实体相连; 监听信息提供实体将监听对象信息发送至 BGF实体; BGF实体根据接收到的监听对象信息,将对应于监听对象的媒体流发送 至 DF3实体。
在本发明中, 所述的监听信息提供实体可以为执法机构侧的 ADMF 实体, 此时, ADMF实体将监听对象信息发送至 BGF实体的过程可以 是: 将 BGF实体作为监听控制网元, 也就是说通过已有的 Xl_l接口将 ADMF实体与 BGF实体相连, 这样, 当需要对一个监听对象执行监听 时,执法机构侧的 ADMF实体直接将携带监听对象标识的监听数据作为 所述的监听对象信息发送至 BGF实体;或者, 当需要对一个监听对象执 行监听时,执法机构侧的 ADMF实体首先将监听数据发送至现有的监听 控制网元, 该监听控制网元将 BGF 实体的标识发送至 ADMF 实体, ADMF实体再根据接收到的 BGF实体的标识将携带监听对象标识的监 听数据或者是对应于监听对象的媒体流描述信息作为所述的监听对象 信息发送至 BGF实体。
另夕卜, -当所述的监听信息提供实体为 ADMF实体且 BGF实体作为 监听控制网元时, 本发明还可以预先在 NGN网络中设置一个监听数据 处理功能实体;这样, ADMF实体通过该监听数据处理功能实体的转发, 实现上述的将监听数据发送至 BGF实体的过程。
在本发明中, 所述的监听信息提供实体还可以为 NGN 网络中现有 的监听控,制网元, 此时, 该现有的监听控制网元将监听对象信息发送至 BGF实体的过程可以是: NGN网络中现有的监听控制网元接收到 ADMF 实体发来的携带监听对象标识的监听数据后, 将携带监听对象标识的监 听数据或对应于监听对象的媒体流描述信息作为监听对象信息发送至 BGF实体。
图 1是本发明系统的基本结构示意图。 参见图 1 , 本发明还提出了 一种在 NGN网络中实现合法监听的系统, 该系统包括: 监听信息提供 实体、 实体和 DF3实体, 其中,
监听信息提供实体, 用于将监听对象信息发送至 BGF实体;
BGF实体, 用于根据接收到的监听对象信息, 将对应于监听对象的 媒体流发送至 DF3实体;
DF3卖体, 用于接收对应于监听对象的媒体流, 并对所接收到的媒 体流进行分析, 实现监听。
图 2A1是当 ADMF实体作为监听信息提供实体且 BGF实体作为监 听控制网元时本发明系统的基本结构示意图。 参见图 2A1 , 在本发明系 统中, 所述的监听信息提供实体可以是 ADMF实体, 该 ADMF实体可 以与作为监听控制网元的 BGF实体通过 Xl_l接口直接相连。
图 2A2是当 ADMF实体作为监听信息提供实体且 BGF实体作为监 听控制网元时本发明系统的优化结构示意图。 参见图 2A2, 当监听信息 提供实体为 ADMF实体且 BGF实体作为监听控制网元时, 为了避免执 法机构侧的 ADMF 实体与大量的 BGF 实体进行消息交互, 从而减少 ADMF实体的业务负荷量, 较佳地, 在本发明系统中, 还可以进一步包 括监听数据处理功能实体, ADMF实体用于将监听数据发送至监听数据 处理功能实体, 该监听数据处理功能实体用于将接收到的监听数据发送 至 BGF。
图 2B是当 ADMF实体作为监听信息提供实体且 BGF实体不作为监 听控制网元时本发明系统的基本结构示意图。参见图 2B,在本发明系统 中, 当所述的监听信息提供实体是 ADMF实体, 但 BGF实体不作为监 听控制网元, 可以由现有的监听控制网元执行本发明系统中监听控制网 元的功能,该现有的监听控制网元可以是合法监听应用服务器(LI-AS ), 或 P-CSCF实体, 或 S-CSCF实体, 该监听控制网元用于根据 ADMF实 体发来的携带监听对象标识的监听数据获取对应的 BGF实体的标识,并 将所获取的 BGF 实体的标识的对应于监听对象的媒体流描述信息发送 至 ADMF实体; ADMF实体根据接收到的 BGF实体的标识, 将对应于 监听对象的媒体流描述信息作为监听对象信息发送至 BGF实体。
图 2C是当 NGN网络中的监听控制网元实体作为监听信息提供实体 时本发明系统的基本结构示意图。 参见图 2C, 在本发明系统中, 当所述 的监听信息提供实体是监听控制网元时, 该监听控制网元可以将 ADMF 实体发来的监听数据携带在消息中发送至 BGF实体,也可以根据 ADMF 实体发来的携带监听对象标识的监听数据 , 将会话中对应于监听对象的 媒体流描述信息携带在消息中发送至 BGF实体。
为使本发明的目的、 技术方案和优点更加清楚, 下面结合附图及具 体实施例对本发明作进一步地详细描述。
实施例 1: 图 3是本发明实施例 1的流程图。 参见图 2A1和图 3, 在实施例 1 中, 以执法机构侧的 ADMF 实体作为本发明中所述的监听信息提供实 体, 且 BGF实体作为监听控制网元为例, 在 NGN网络中, 本实施例针 对从固定网络接入的用户实现合法监听的过程包括以下步骤:
步驟 301:预先通过 X3接口将 NGN网络中的 BGF实体与执法机构 侧的 DF3实体相连。
步骤 302: 预先通过现有的 XI— 1接口将执法机构侧的 ADMF实体 与 BGF实体相连。
步骤 303:当需要对一个监听对象执行监听时,执法机构侧的 ADMF 实体通过 XI— 1接口将携带监听对象标识的监听数据直接发送至 BGF实 体。
这里以及以下所述的监听数据中还可以包括监听所需的其他相关信 息, 比如, ADMF实体的标识、接收所监听媒体流的 DF3实体的标识以 及监听内容信息等。 其中, 所述的监听对象标识可以是监听对象的会话 初始协议统一资源标识符( SIP URI )和电话统一资源定位符( TEL URL )。
通过上述步骤 302至步骤 303的过程, ADMF实体将携带监听对象 标识的监听数据发送至了 BGF实体, 从而使得 BGF实体作为监听控制 网元获取了监听数据。 '在本实施例中, 还可以通过一个实体的转发使 BGF实体作为监听控制网元获取监听数据, 参见图 2A2, 此时, 本实施 例预先在 NGN网络中设置一个监听数据处理功能实体, 并将所设置的 监听数据处理功能实体分别与执法机构侧的 ADMF实体和 BGF实体相 连, 其中, 所设置的监听数据处理功能实体通过 XI一 1·接口与 ADMF实 体相连; 这样, 步骤 302至步驟 303的过程变为: 当需要对一个监听对 象执行监听时, 执法机构侧的 ADMF实体通过 Xl_l接口将携带监听对 象标识的监听数据直接发送至监听数据处理功能实体; 该监听数据处理 功能实体将接收到的携带监听对象标识的监听数据发送至 BGF实体。其 中, .所设置的监听数据处理功能实体可以通过 Diameter协议与 BGF实 体进行所述的交互过程。
步骤 304: BGF实体保存所接收到的携带监听对象标识的监听数据。 步驟 305: P-CSCF 实体接收到会话建立请求(INVITE )后, 将本 次用户的标识发送至 SPDF实体。
这里, P-CSCF实体可以通过认证授权请求( AA-Request )消息将本 次用户的标识发送至 SPDF实体。 并且, 此处以及以下所述的本次用户 标识可以是本次用户的 SIP URI和 TEL URL。
步驟 306: SPDF实体将本次用户的标识发送至 BGF实体。
这里, 由于 SPDF实体与 BGF实体之间通过 H.248协议进行交互, 因此, 本发明可以预先扩展 H.248协议消息, 即在 H.248协议消息中增 加一个用户标识包,比如,所增加的用户标识包可以定义为如下的形式:
PackagelD: normal int (如 OxCD)
Properties:
Subscriber Identifier:
PropertylD: Subscriberld (0x0001)
Description:定义用户标识 "Subscriber Identifier" , 用来描述相关的用 户身份标识。
Type: string
Defined in: Local Control descriptor
Characteristics: Read/Write
Events: none
Statistics: none
Signals: none
Procedures:媒体网关控制( MGC )可以在任何命令中指定相关用户 身份标识。
如: Subscriberld = abcdefg@ims.example.com, 指示相关用户身份标 只为 abcdefg@ims.exam.ple.como
这样, 在本步骤中, SPDF实体可以将本次用户的标识携带在 H.248 协议消息中, 比如 Add 消息中, 所增加的用户标识包内, 然后发送至 BGF实体。
需要说明的是,在上述步驟 305至步骤 306中, P-CSCF实体没有直 接将本次用户标识发送至 BGF实体,而是由 SPDF实体通过扩展的携带 用户标识包的 H.248协议消息将本次用户标识发送至 BGF实体。在实际 的业务实现中,在上述步骤 305至步骤 306的过程中,也可以由 P-CSCF 实体通过扩展的携带用户标识包的 H.248协议消息将本次用户标识发送 至 BGF实体,具体实现包括: P-CSCF实体将本次用户标识携带在 H.248 协议消息中扩展的用户标识包内,直接发送至 BGF实体;或者, P-CSCF 实体将本次用户标识携带在 H.248协议消息中扩展的用户标识包内, 首 先发送至 SPDF实体, 该 SPDF实体将所接收到的在扩展的用户标识包 中携带本次用户标识的 H.248协议消息透传至 BGF实体。
步骤 307: BGF实体根据本次用户的标识以及自身保存的携带用户 标识的监听数据, 判断本次用户是否为监听对象, 如果是, 则执行步骤 308, 否则, 执行现有的建立连接并传输媒体流的过程, 结束当前流程。
这里,如果 BGF实体接收到的是携带用户标识包的 H.248协议消息 比如 Add消息 , 则 BGF实体对该 Add消息进行分析, 从该 Add消息的 用户标识包中获取本次用户的标识。
步骤 308: BGF实体分配合法监听的复制资源。
步骤 309: 在本次会话的主被叫连接建立完成, 主被叫用户实现通 信后, BGF 实体利用所分配的合法监听复制资源对所接收到的对应于 本次用户的媒体流进行复制。
步骤 310: BGF实体通过 X3接口将所复制的媒体流发送至 DF3实 体。
步骤 311 : DF3 实体对所接收到的媒体流进行分析, 实现针对从固 定网.络接入 NGN的监听对象的监听。
实施例 2:
图 4是本发明实施例 2的流程图。参见图 2B和图 4,在实施例 2中 , 以 ADMF实体作为本发明中所述的监听信息提供实体, 但 BGF实体不 作为监听控制网元为例, 在 NGN网絡中, 本发明针对从固定网络接入 的用户实现合法监听的过程包括以下步驟:
步骤 401:预先通过 X3接口将 NGN网络中的 BGF实体与执法机构 侧的 DF3实体相连。
步骤 402:当需要对一个监听对象执行监听时,执法机构侧的 ADMF 实体通过 XI— 1接口将携带监听对象标识的监听数据发送至现有的监听 控制网元。
这里, P-CSCF实体、 S-CSCF实体和 LI-AS作为监听控制网元均可 接收到携带监听对象标识的监听数据。 为便于描述, 以下以 P-CSCF实 体作为本实施例中也即图 2B 中的监听控制网元为例来说明本实施例的 后续实现过程。
步骤 403: P-CSCF实体保存携带监听对象标识的监听数据。
步骤 404: 在本次会话建立过程中, P-CSCF实体根据所保存的携带 监听对象标识的监听数据和本次用户的标识, 判断本次用户是否为监听 对象, 如果是, 则执行步骤 405, 否则, 执行现有的建立连接并传输媒 体流的过程, 结束当前流程。
步骤 405: P-CSCF实体将本次会话中, 对应于监听对象的媒体流所 经过的 BGF实体的标识发送至 ADMF实体。
这里监听对象即为所述的本次用户。 、并且, 在本步骤中, P-CSCF 实体可以通过执法机构侧的 DF2 实体将对应于监听对象的媒体流所经 过的 BGF实体的标识发送至 ADMF实体。
步骤 406: ADMF实体根据接收到的 BGF实体的标识, 将携带监听 对象标识的监听数据发送至对应的 BGF实体。
'步骤 407:该 BGF实体根据接收到的携带监听对象标识的监听数据, 对自身接收到的对应于监听对象的媒体流进行复制。
步驟 408:该 BGF实体根据接收到的携带监听对象标识的监听数据, 将所复制的媒体流发送至 DF3实体。
在上述步骤 405中, P-CSCF实体还可以进一步将本次会话中,对应 于监听对象的媒体流描述信息发送至 ADMF实体,这样, 步骤 406至步 骤 408的过程则为: ADMF实体根据接收到的 BGF实体的标识, 将对 应于监听对象的媒体流描述信息发送至对应的 BGF实体; 该 BGF实体 根据接收到的对应于监听对象的媒体流描述信息, 对接收到的对应于监 听对象的媒体流进行复制, 并根据接收到的对应于监听对象的媒体流描 述信息, 将所复制的媒体流发送至 DF3实体。 其中, 所述的对应于监听 对象的媒体流描述信息包括:对应于监听对象媒体流的源 IP地址、 目的 IP地址、 源端口号、 目的端口号等。
步骤 409: DF3 实体对所接收到的媒体流进行分析, 实现针对从固 定网络接入 NGN的监听对象的监听。
实施例 3:
在本实施例 3 中, 由 NGN网络中的监听控制网元作为本发明中所 述的监听信息提供实体, 且该监听控制网元通过在消息中携带监听数据 触发 BGF实体复制监听对象的媒体流。 图 5是本发明实施例 3的流程图。 参见图 2C和图 5 , 为便于描述, 以 NGN网络中的合法监听应用服务器(LI-AS )作为监听控制网元, 并 通过在消息中携带监听数据触发 BGF实体复制监听对象的媒体流为例, 本实施例针对从固定网络接入的用户实现合法监听的过程包括以下步 驟:
步骤 501 :预先通过 X3接口将 NGN网络中的 BGF实体与执法机构 侧的 DF3实体相连。
步骤 502: 预先扩展 SIP协议消息、 H.248协议消息和 Diameter协 议消息, 使其能够携带监听数据。
在本步驟中, 在扩展所述的 SIP协议消息时, 可以在 SIP协议消息 中增加一个基于 XML格式的应用类型, 比如,所增加的基于 XML格式 的应用类型可以定义为如下的形式:
Content-type: application/interception-data+xml
<?xml version=,, 1.0"?>
<interception-data xmlns="um:ietf:params:xml:ns:interception-data" version="0" state="full"
entity="sip:alice@example.com">
<monitor identity="abcd@example.com">
<type>both</type>
<df2addr>sip :df2@lea.com</df2addr>
<df3 addr>sip: df3 @lea. com</df3 addr>
</monitor>
</interception-data>
在上述基于 XML格式的消息体中, 给出当前监听对象身份标识为 abcd@example.com, 并给出当前对用户监听需要输出监听相关信息和监 听内容。 同时给出了输出监听相关信息的地址为 df2@lea.com, 输出监 听内容的地址为 dC@lea.com。
在本步骤中, 在扩展 H.248协议消息时, 可以在 H.248协议消息中 增加一个监听数据包, 比如, 所增加的监听数据包可以定义为如下的形 式:
监听数据包定义: (Lawf l Interception Data Package)
PackagelD: normal int (如 OxCE)
Properties:
Monitored Subscriber Identifier:
PropertylD: Subscriberld (0x0001)
Description:定义被监听对象用户身份标识 " Monitored Subscriber Identifier", 用来描述被监听对象相关的用户身份标识。
Type: string
Defined in: Local Control descriptor
Characteristics: Read/Write
Monitor Type:
PropertylD: MonitorType (0x0002)
Description:定义被监听对象当前监听类型" Monitor Type", 用来描述 被监听对象当前的监听类型。 对没有显式该属性的认为是当前监听既不 需要输出监听相关信息, 也不需要输出通信内容。
Type: Enumeration
Possible Values:
"None" (0x0000) 无任何输出。
"IRI" (0x0001)仅输出 IRI。
"CC" (0x0002)仅输出 CC。
"Both" (0x0003)输出 IRI和 CC。
Default: " None " (0x0000)无任何输出。 Defined in: Local Control descriptor
Characteristics: Read/Write
DF2 Address:
PropertylD: DF2Address (0x0003)
•Description:定义被监听对象 IRI输出的 DF2地址' 'DF2 Address", 用 来描述被监听对象监听相关信息输出的 DF2地址。
Type: string
Defined in: Local Control descriptor
Characteristics: Read/Write
DF3 Address:
PropertylD: DF3Address (0x0004)
Description:定义被监听对象 CC输出的 DF3地址" DF3 Address", 用 来描述«听对象通信内容输出的 DF3地址。
Type: string
Defined in: Local Control descriptor
Characteristics: Read/Write
Events: none
Statistics: none
Signals: none
Procedures: MGC 可以在任何命令中携带监听数据包指示该用户被 监听和当前该用户的监听数据。
在本步骤中, 在扩展所述的 Diameter协议消息时, 可以在 Diameter 协议消息中增加一个属性值对(AVP ), 比如, 所增加的属性值对可以定 义为如下的形式:
Attribute Name: Monitor-Data
AVP Code: 整型值,如 530, AVP中建议携带" V"比特,建议携带' 'Μ" 比特, 表示该 AVP是厂商专用的, 是接收者必须识别的。 可以进行端到 端安全加密。
•Value Type: Grouped
该 AVP格式定义如下:
AVP Format:
Globally-Unique-IP-Address:: = < AVP Header: xxx 13019 >
[Monitored-Subscriber-Identifier]
[Monitor-Type] 一
[Delivery-Function2 -Address]
[Delivery-Function3 -Address]
其中, Monitored-Subscriber-Identifier描述当前被监听对象身份标 识, Monitor-Type描述当前对被监听对象的监听是否需要输出通信内容 和监听相关信息。 Delivery-Function2-Address给出监听相关信息输出地 址, Delivery-Function3 -Address给出监听内容输出地址。
步驟 503:当需要对一个监听对象执行监听时,执法机构侧的 ADMF 实体通过 XI— 1接口将携带监听对象标识的监听数据发送至监听控制网 元。
这里, P-CSCF实体、 S-CSCF实体和 LI-AS作为监听控制网元均可 接收到携带监听对象标识的监听数据。
步骤 504: LI-AS保存所接收到的携带监听对象标识的监听数据。 步骤 505: 在会话建立过程中, 当 LI-AS接收到会话建立请求时, LI-AS 根据自身保存的携带监听对象标识的监听数据和本次用户的标 识, 判断本次用户是否为监听对象, 如果是, 则执行步驟 506, 否则, 执行现有的建立会话连接实现通信的过程, 结束当前流程。
步骤 506: LI-AS将自身加入到本次会话的信令路由中 ,并将该会话 建立请求发送至被叫用户。
步骤 507: 当 LI-AS接收到被叫用户返回的响应消息时, LI-AS在 SIP协议的消息中携带自身所保存的携带监听对象标识的监听数据。 这里, LI-AS可以利用在 SIP协议的响应消息中所增加的基于 ML 格式的应用类型的消息体来携带自身所保存的监听数据。
步骤 508: LI-AS 将携带监听数据的 SIP 协议的响应消息发送至 P-CSCF实体。
需要说明的是, 上述步骤 504至步骤 508的过程中所涉及的 LI-AS 可以替换为 S-CSCF实体。
步骤 509: P-CSCF实体将携带监听数据的 Diameter协议的消息发送 至 SPDF实体。
这里, P-CSCF实体首先从接收到的 SIP协议响应消息中所增加的基 于 XML格式的应用类型的消息体中获取监听数据, 然后可以利用在 Diameter协议响应消息中增加的属性值对来携带所获取的监听数据, 并 发送至 SPDF实体。
步骤 510: SPDF实体从所接收到的 Diameter协议响应消息中获取 监听数据, 并将所获取的监听数据携带在 H.248协议包中扩展的监听数 据包中, 然后发送至 BGF实体。
步骤 511: BGF实体解析 H.248协议包中扩展的监听数据包, 获取 监听数据。
步骤 512: BGF实体根据所获取的监听数据, 复制对应于监听对象 的媒体流, 并通过 X3接口将所复制的媒体流发送至 DF3实体。
步骤 513: DF3 实体对所接收到的媒体流进行分析, 实现针对从固 定网络接入 G 的监听对象的监听。
在本实施例 3中, 也可以由 P-CSCF实体首先执行构造携带监听数 据的 Diameter协议的消息, 并将该消息通过 SPDF实体发送至 BGF实 体, 其具体实现与上迷图 5所示过程的原理相同, 只是此时可以无需扩 展 SIP消息。
实施例 4:
在本实施例 4中, 由 NGN网络中的监听控制网元作为本发明中所 述的监听信息提供实体, 且该监听控制网元通过在消息中携带媒体流间 拓朴描述来触发 BGF实体复制监听对象的媒体流。
图 6是本发明实施例 4的流程图。 参见图 2C和图 6, 为便于描述, 以 NGN网络中的 P-CSCF实体作为监听控制网元, 并通过在消息中携 带媒体流间拓朴描述来触发 BGF实体复制监听对象的媒体流为例,本实 施例针对从固定网络接入的用户实现合法监听的过程包括以下步骤: 步骤 601:预先通过 X3接口将 NGN网络中的 BGF实体与执法机构 侧的 DF3实体相连。
步骤 602: 预先扩展 SIP协议消息、 H.248协议消息和 Diameter协 议消息, 使其能够携带对应于监听对象的媒体流描述信息。
在本步骤中, 在扩展所述的 SIP协议消息时, 可以在 SIP协议消息 中增加一个基于 XML格式的应用类型, 通过该应用类型的消息体来携 带对应于监听对象的媒体流描述信息。 比如, 所增加的基于 XML格式 的应.用类型可以定义为如下的形式:
Content-type: application/session-topology+xml
<?xml version-" 1.0"?>
<session-topology xmlns="ura:ietf:params:xml:ns:session-topology" version="0" state="Ml"
entity="sip:alice@example.com">
<session name="abcd@example.com">
<copiedstream>
<sourceaddr>[5555 ::1:2:3 :4]: 1357</sourceaddr>
<destinationaddr> [5555::a:b:c:d]:7531 </destinationaddr> <protocol>RTP</protocol>
</copiedstream>
<direction>upstream</direction>
</session>
</interception-data>
在上述 ML 消 息体中 , 给出 当 前呼叫 需要拷贝 从 [5555::1:2:3:4]:1357到 [5555::a:b:c:d]:7531的上行 ( upstream )媒体流。
在本步骤中, 使用标准的 H.248拓朴描述方式就可以描述在一个上 下文( Context )中各个端点间的拓朴关系, 具体实施方式可以参考 3GPP 33107附录 D, 这里不再资述。 同样, 也可以扩展所述的 H.248协议消 息, 使其能够携带对应于监听对象的媒体流描述信息时, 可以利用目前 已有的扩展 H.248监听包的方式, 其核心思想是:
1、 定义监听包标识;
2、 定义监听包媒体复制指示属性' 'Interception indication", 用来指定 端点的复制从属属性。 指示该终端是 slave还是 common, 对没有显式该 属性的认为是与复制无关的终端, 一律为 common。
3、 定义监听端点从属关系 "Master termination" , 用来对 slave终端 保存其需要复制端点的终端标识(简称 Master端点, 其媒体复制指示 属性为 common ), Master termination对 slave端点有效, 类型为长度为 8个字节的字符串。
4、 定义监听端点复制模式" Interception mode", 取值 "上行流", " 下行流" 和"合并流''。 用来表达 slave终端与被复制端点的连接方式, 是 '复制原端点的上行媒体还是下行媒体或者是上下行混合媒体。 该属性对 slave端点有效。
并且, 当处于同一个 context 中的某一(多)个端点被指示属性为 slave, 并指定其 master端点和复制模式, slave端点就从指定 master端 点复制相应流向的数据包。
在本步骤中, 在扩展所述的 Diameter协议消息, 使其能够携带对应 于监听对象的媒体流描述信息时,可以在 Diameter协议消息中增加一个 属性值对(AVP ), 比如, 所增加的属性值对可以定义为如下的形式:
Attribute Name: Stream-Copied
AVP Code: 整型值,如 531 , AVP中建议携带" V"比特,建议携带" M" 比特, 表示该 AVP是厂商专用的, 是接收者必须识别的。 可以进行端到 端安全加密。
. Value Type: Grouped
该 AVP格式定义如下:
AVP Format:
Globally-Unique-IP-Address ::= < AVP Header, xxx 13019 >
[Media-Stream-Description]
[Copy-Direction]
其中, Media-Stream-Description描述需要拷贝的媒体流信息, 如, 可以在 Media-Stream-Description中给出需要拷贝的媒体流源 IP地址、 目的 IP地址、 源端口号、 目的端口号和协议类型等。 Copy-Direction描 述需要拷贝的媒体流方向。 如可以使用 Copy-Direction描述当前仅拷贝 从源 IP地址到目的 IP地址方向的媒体流。
步驟 603:当需要对一个监听对象执行监听时,执法机构侧的 ADMF 实体通过 Xl_l接口将携带监听对象标识的监听数据发送至监听控制网 元 P-CSCF实体。
步骤 604: P-CSCF实体保存所接收到的携带监听对象标识的监听数 据。 步驟 605: 在会话建立过程中, P-CSCF实体根据所保存的携带监听 对象标识的监听数据和本次用户的标识, 判断本次用户是否为监听对 象, 如果是, 则执行步骤 606, 否则, 执行现有的建立连接并传输媒体 流的过程, 结束当前流程。
步驟 606: P-CSCF实体将本次会话中对应于监听对象的媒体流描述 信 携带在 Diameter协议的响应消息中发送至 SPDF实体。
这里, .根据步驟 602中扩展 Diameter协议消息的过程, P-CSCF实 体可以利用在 Diameter协议响应消息中增加的属性值对来携带对应于 监听对象的媒体流描述信息。
步驟 607: SPDF实体将本次会话中对应于监听对象的媒体流描述信 息携带在 H.248协议的响应消息中发送至 BGF实体。
这里, 根据步骤 602中扩展 H.248协议消息的过程, SPDF实体可 以利用在 H.248协议响应消息中增加的监听包来携带对应于监听对象的 媒体流描述信息。
步骤 608: BGF实体从所接收到的响应消息中获取本次会话中对应 于监听对象的媒体流描述信息。
步骤 609: BGF实体根据所获取的对应于监听对象的媒体流描述信 息, 复制对应于监听对象的媒体流, 并通过 X3接口将所复制的媒体流 发送至 DF3实体。
步骤 610: DF3 实体对所接收到的媒体流进行分析, 实现针对从固 定网络接入 NGN的监听对象的监听。
在本实施例 4中, 是由 P-CSCF实体首先构造携带对应于监听对象 的媒体流描述信息的消息,并将该消息通过 SPDF实体发送至 BGF实体。 在实际的业务实现中,也可以由 LI-AS或 S-CSCF实体利用所扩展的 SIP 协议的消息来首先构造携带对应于监听对象的媒体流描述信息的消息, 并将该消息通过 P-CSCF实体和 SPDF实体发送至 BGF实体,其具体实 现过程与上述图 6所示过程的原理相同。
在本发明中,还可以通过上述各实施例的方法将 ADMF实体发出的 查询命令和合法监听去激活命令等发送至 BGF实体, 从而触发 BGF实 体执行对应的查询监听对象相关属性和取消监听等操作。
在本发明中, 所述的本次用户可以是本次会话中的主叫用户和 /或被 叫用户。
在本发明中,所述的 BGF实体可以是提供用户终端与接入网连接的 接入边界网关功能(A-BGF ) 实体, 也可以是提供接入网与核心网间连 接的核心边界网关功能(C-BGF ) 实体。
总之, 以上所述仅为本发明的较佳实施例而已, 并非用于限定本发 明的保护范围。 凡在本发明的精神和原则之内, 所作的任何修改、 等同 替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
1、一种在下一代网络中实现合法监听的方法, 其特征在于, 将下一 代网络中的边界网关功能实体与执法机构侧的 3 通道递交功能实体相 连, 该方法还包括:
A 监听信息提供实体将监听对象信息发送至边界网关功能实体; B、 边界网关功能实体根据接收到的监听对象信息, 将对应于监听 对象的媒体流发送至 3通道递交功能实体。
2、根据权利要求 1所述的方法, 其特征在于, 所述监听信息提供实 体为执法机构侧的管理功能实体。
3、 根据权利要求 2所述的方法, 其特征在于, 该方法进一步包括: 在下一代网络中设置监听数据处理功能实体, 并将所设置的监听数据处 理功能实体分别与管理功能实体和边界网关功能实体相连;
所述监听对象信息为携带监听对象标识的监听数据;
所述步骤 A包括: 管理功能实体将携带监听对象标识的监听数据发 送至监听数据处理功能实体, 该监听数据处理功能实体将接收到的携带 监听对象标识的监听数据发送至边界网关功能实体。
4、 根据权利要求 3所述的方法, 其特征在于, 在步骤 A与步骤 B 之间进一步包括:
All , 在本次会话建立过程中, 将本次用户的标识发送至边界网关 功能实体;
A12、 边界网关功能实体根据本次用户的标识和携带监听对象标识 的监听数据判断本次用户是否为监听对象, 如果是, 则执行步骤 B。
5、 根据权利要求 4所述的方法, 其特征在于, 该方法进一步包括: 在 H.248协议消息中增加用户标识包; 在步骤 All中, 所述将本次用户的标识发送至边界网关功能实体的 步骤包括: 将本次用户的标识携带在 H.248协议消息中所增加的用户标 识包内发送至边界网关功能实体;
在步骤 A12中, 在执行所述的判断之前, 进一步包括: 边界网关功 能实体从所接收到的 H.248协议消息中所增加的用户标识包内获取所述 的本次用户的标识。
.6、 根据权利要求 5所述的方法, 其特征在于, 在步驟 All中, 由代理呼叫会话控制功能实体在接收到本次用户发来的会话建立请 求时, 执行所述的携带和发送的步骤;
或者, 由代理呼叫会话控制功能实体将接收到的会话建立请求中的 本次用户的标识发送至基于服务的策略决策功能实体, 并由基于服务的 策略决策功能实体执行所述的携带和发送的步骤。
7、 根据权利要求 2所述的方法, 其特征在于, 所述步骤 A包括: A21、 执法机构侧的管理功能实体将携带监听对象标识的监听数据 发送至现有的监听控制网元, 该监听控制网元保存所接收到的携带监听 对象标识的监听数据;
A22、 在本次会话建立过程中, 所述监听控制网元根据所保存的携 带监听对象标识的监听数据和本次用户的标识, 判断本次用户是否为监 听对象, 如果是, 则执行步驟 A23;
A23、 所述监听控制网元将本次会话中对应于监听对象的媒体流所 经过的边界网关功能实体的标识发送至执法机构侧的管理功能实体;
A24、 执法机构侧的管理功能实体根据接收到的边界网关功能实体 的标识, 将监听对象信息发送至边界网关功能实体。
8、根据权利要求 7所述的方法, 其特征在于, 所述监听对象信息为 携带监听对象标识的监听数据。 9、 根据权利要求 7所述的方法, 其特征在于, 所述步驟 A23进一 步包括: 监听控制网元将本次会话中对应于监听对象的媒体流描述信息 发送至执法机构侧的管理功能实体;
所述监听对象信息为对应于监听对象的媒体流描述信息。
10、 根据权利要求 1所述的方法, 其特征在于, 所述监听信息提供 实体为现有的监听控制网元。
11、根据权利要求 10所述的方法,其特征在于,该方法进一步包括: 扩展 H.248协议消息和 Diameter协议消息;
所述监听控制网元为代理呼叫会话控制功能实体;
在步骤 A之前进一步包括: 执法机构侧的管理功能实体将携带监听 对象标识的监听数据发送至所述代理呼叫会话控制功能实体;
所述步骤 A包括:
A31、 在本次会话建立过程中, 所述代理呼叫会话控制功能实体根 据所接收到的携带监听对象标识的监听数据和本次用户的标识, 判断本 次用户是否为监听对象, 如果是, 则执行步驟 A32;
A32、 所述代理呼叫会话控制功能实体通过所扩展的 Diameter协议 消息将监听对象信息发送至基于服务的策略决策功能实体;
A33、 基于服务的策略决策功能实体通过所扩展的 H.248协议消息 将监听对象信息发送至边界网关功能实体。
12、根据权利要求 10所述的方法,其特征在于,该方法进一步包括: 扩展 H.248协议消息、 Diameter协议消息和会话初始协议 SIP消息; 在步骤 A之前进一步包括: 接收执法机构侧的管理功能实体发来的 携带监听对象标识的监听数据;
所述步骤 A包括:
A41、 在本次会话建立过程中, 根据所接收到的携带监听对象标识 的监听数据和本次用户的标识,判断本次用户是否为监听对象,如果是, 则执行步骤 A42;
A42、 通过所扩展的 SIP消息将监听对象信息发送至代理呼叫会话 控制功能实体;
A43、 代理呼叫会话控制功能实体通过所扩展的 Diameter协议消息 将监听对象信息发送至基于服务的策略决策功能实体;
A44、 基于服务的策略决策功能实体通过所扩展的 H.248协议消息 将监听对象信息发送至边界网关功能实体。
13、根据权利要求 12所述的方法, 其特征在于, 由合法监听应用服 务器或服务呼叫会话控制功能实体执行所述的接收监听数据、 判断以及 通过所扩展的 SIP消息将监听对象信息发送至代理呼叫会话控制功能实 体的步骤。
14、 根据 利要求 11、 12或 13所述的方法, 其特征在于, 所述监 听对象信息为携带监听对象标识的监听数据, 或对应于监听对象的媒体 流描述信息。
15、 根据权利要求 11、 12或 13所述的方法, 其特征在于, 所述扩 展 H.248协议消息的步骤包括: 在 H.248协议消息中增加一个监听数据 包;
所述通过所扩展的 H.248协议消息将监听对象信息发送至边界网关 功能实体的步骤包括: 基于服务的策略决策功能实体将监听对象信息携 带在 H.248协议消息中所增加的监听数据包内, 然后将该 H.248协议消 息发送至边界网关功能实体。
16、 根据权利要求 11、 12或 13所述的方法, 其特征在于, 所述扩 展 Diameter协议消息的步骤包括:在 Diameter协议消息中增加一个属性 值对 AVP; 所述通过所扩展的 Diameter协议消息将监听对象信息发送至基于服 务的策略决策功能实体的步驟包括:将监听对象信息携带在 Diameter协 议消息中所增加的属性值对 AVP内, 然后将该 Diameter协议消息发送 至基于服务的策略决策功能实体。
17、根据权利要求 12所述的方法, 其特征在于, 所述扩展 SIP协议 消息的步骤包括:在 SIP协议消息中增加一个基于可扩展标记语言 XML 格式的应用类型;
所述步骤 A42包括: 将监听对象信息携带在 SIP消息中所增加的基 于 XML格式应用类型的消息体内, 然后将该 SIP消息发送至代理呼叫 会话控制功能实体。
18、 根据权利要求 1所述的方法, 其特征在于, 所述边界网关功能 实体为提供用户终端与接入网连接的接入边界网关功能 A-BGF 实体, 或提供接入网与核心网间连接的核心边界网关功能 C-BGF实体。
19、 一种在下一代网络中提供合法监听的系统, 包括: 3 通道递交 功能实体, 用于接收对应于监听对象的媒体流, 并对所接收到的媒体流 进行分析, 实现监听, 其特征在于, 该系统还包括: 监听信息提供实体 和边界网关功能实体, 其中,
监听信息提供实体,用于将监听对象信息发送至边界网关功能实体; 边界网关功能实体, 用于根据接收到的监听对象信息, 将对应于监 听对象的媒体流发送至 3通道递交功能实体。
20、根据权利要求 19所述的系统, 其特征在于, 所述监听信息提供 实体为执法机构侧的管理功能实体。
21、根据权利要求 20所述的系统, 其特征在于, 所述执法机构侧的 管理功能实体通过 XI— 1接口与所述边界网关功能实体直接相连。
11、才艮据权利要求 20所述的系统,其特征在于, 该系统进一步包括 监听数据处理功能实体, 用于通过 XI— 1接口接收执法机构侧的管理功 能实体发来的携带监听对象标识的监听数据 , 并将该携带监听对象标识 的监听数据发送至边界网关功能实体;
执法机构侧的管理功能实体, 用于通过 XI一 1接口将携带监听对象 标识的监听数据发送至监听数据处理功能实体。
23、根据权利要求 20所述的系统 ,其特征在于 ,该系统进一步包括: 现有的监听控制网元, 用于接收执法机构侧的管理功能实体发来的携带 监听对象标识的监听数据 , 根据该监听数据获取监听对象的媒体流所经 过的边界网关功能实体的标识, 并将所获取的边界网关功能实体的标识 发送至执法机构侧的管理功能实体;
所述执法机构侧的管理功能实体, 用于根据接收到的边界网关功能 实体的标识, 将监听对象信息发送至边界网关功能实体。
24、根据权利要求 19所述的系统, 其特征在于, 所述监听信息提供 实体为现有的监听控制网元, 用于根据执法机构侧的管理功能实体发来 的携带监听对象标识的监听数据, 获取对应于监听对象的媒体流描述信 息, 并发送至边界网关功能实体, 或直接将该携带监听对象标识的监听 数据发送至边界网关功能实体;
所述边界网关功能实体, 用于将接收到的对应于监听对象的媒体流 描述信息或携带监听对象标识的监听数据发送至 3通道递交功能实体。
PCT/CN2007/000192 2006-01-18 2007-01-18 A method for realizing the legal listening in the next generation network and a system thereof Ceased WO2007082477A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP07702124.4A EP1976186B1 (en) 2006-01-18 2007-01-18 A method for realizing the legal listening in the next generation network and a system thereof
US12/175,893 US20080275988A1 (en) 2006-01-18 2008-07-18 Method And System For Lawful Interception In Next Generation Networks

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2006100015178A CN101005409B (zh) 2006-01-18 2006-01-18 一种在下一代网络中实现合法监听的方法和系统
CN200610001517.8 2006-01-18

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/175,893 Continuation US20080275988A1 (en) 2006-01-18 2008-07-18 Method And System For Lawful Interception In Next Generation Networks

Publications (1)

Publication Number Publication Date
WO2007082477A1 true WO2007082477A1 (en) 2007-07-26

Family

ID=38287269

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/000192 Ceased WO2007082477A1 (en) 2006-01-18 2007-01-18 A method for realizing the legal listening in the next generation network and a system thereof

Country Status (4)

Country Link
US (1) US20080275988A1 (zh)
EP (1) EP1976186B1 (zh)
CN (1) CN101005409B (zh)
WO (1) WO2007082477A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009143881A1 (en) * 2008-05-27 2009-12-03 Telefonaktiebolaget Lm Ericsson (Publ) Lawful access data retention diameter application

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8320363B2 (en) * 2008-12-01 2012-11-27 Huawei Technologies Co., Ltd. Implementation method, system and device of IMS interception
FR2940569B1 (fr) * 2008-12-18 2011-08-26 Alcatel Lucent Systeme d'adaptation pour interception legale dans differents reseaux de telecommunications.
US9106603B2 (en) 2009-12-23 2015-08-11 Synchronics plc Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content
US20120144013A1 (en) * 2010-12-01 2012-06-07 Cisco Technology, Inc. Discovery of on-path services for media flows
ES2555256T3 (es) 2011-03-29 2015-12-30 Telefonaktiebolaget L M Ericsson (Publ) Interceptación lícita en una red de subsistema multimedia IP
US8553588B2 (en) * 2011-03-31 2013-10-08 Wipro Limited System and method for lawful interception in voice call continuity for telecommunication networks
US9450752B2 (en) * 2011-04-29 2016-09-20 Nokia Technologies Oy Method and apparatus for providing service provider-controlled communication security
CN102843337B (zh) * 2011-06-20 2017-07-14 中兴通讯股份有限公司 Ip多媒体子系统中媒体内容监听方法及装置
EP2922240B1 (en) 2012-11-19 2018-01-10 Huawei Technologies Co., Ltd. Method for configuring user data monitoring path, monitoring method, apparatus and entity
WO2015116229A1 (en) * 2014-02-03 2015-08-06 Nokia Solutions And Networks Oy SECURITY METHOD AND SYSTEM FOR INTER-NODAL COMMUNICATION FOR VoIP LAWFUL INTERCEPTION
CN107534588B (zh) * 2015-10-12 2020-08-14 泉州台商投资区天泰工业设计有限公司 监听方法和相关设备
EP3582478A4 (en) * 2017-02-28 2019-12-18 Huawei Technologies Co., Ltd. METHOD, DEVICE AND SYSTEM OF LEGAL INTERCEPTION
EP4144060B1 (en) * 2020-05-29 2023-09-13 Telefonaktiebolaget LM Ericsson (PUBL) Respecting the version of the transmission protocol in legal interception

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1509015A (zh) * 2002-12-16 2004-06-30 华为技术有限公司 实现分组语音网络监听的系统及方法
CN1684425A (zh) * 2004-04-16 2005-10-19 华为技术有限公司 一种实现合法监听的方法
CN1691601A (zh) * 2004-04-27 2005-11-02 华为技术有限公司 一种实现合法监听的系统及方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE438238T1 (de) * 2001-05-16 2009-08-15 Nokia Corp Verfahren und system zur ermöglichung eines legitimen abfangens von verbindungen, wie zum beispiel sprache-über-internet-protokoll-anrufen
ES2229073T3 (es) * 2002-08-08 2005-04-16 Alcatel Interceptacion legal de llamadas voip en redes basadas en ip.
EP1528774A1 (en) * 2003-10-30 2005-05-04 Alcatel Method and system of providing lawful interception of calls
US20050152275A1 (en) * 2004-01-14 2005-07-14 Nokia Corporation Method, system, and network element for monitoring of both session content and signalling information in networks
WO2006098668A1 (en) * 2005-03-18 2006-09-21 Telefonaktiebolaget Lm Ericsson (Publ) Lawful interception of unauthorized subscribers and equipments
US7843902B2 (en) * 2005-07-01 2010-11-30 Relefonaktiebolaget L M Ericsson Interception of multimedia services

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1509015A (zh) * 2002-12-16 2004-06-30 华为技术有限公司 实现分组语音网络监听的系统及方法
CN1684425A (zh) * 2004-04-16 2005-10-19 华为技术有限公司 一种实现合法监听的方法
CN1691601A (zh) * 2004-04-27 2005-11-02 华为技术有限公司 一种实现合法监听的系统及方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1976186A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009143881A1 (en) * 2008-05-27 2009-12-03 Telefonaktiebolaget Lm Ericsson (Publ) Lawful access data retention diameter application

Also Published As

Publication number Publication date
CN101005409A (zh) 2007-07-25
US20080275988A1 (en) 2008-11-06
EP1976186A4 (en) 2010-03-17
EP1976186A1 (en) 2008-10-01
CN101005409B (zh) 2010-12-01
EP1976186B1 (en) 2014-07-16

Similar Documents

Publication Publication Date Title
WO2007082477A1 (en) A method for realizing the legal listening in the next generation network and a system thereof
KR101242995B1 (ko) 기존 허가 아키텍쳐 및 프로토콜을 이용하여 sip 세션 정책을 지원하는 방법 및 시스템
CA2790516C (en) Lawful call interception support in packet cable network
US8959238B2 (en) Systems, methods and computer program products for providing access to web services via device authentication in an IMS network
JP5043392B2 (ja) Sip通信セッションをセットアップする方法、並びに、そのシステム及びコンピュータ・プログラム
WO2008049314A1 (fr) Procédé et système pour implémenter un service de multidiffusion ou un service de diffusion générale sur la base d&#39;un réseau de nouvelle génération
WO2008025211A1 (en) A communication network system and method for providing a service broker function and a service broker device
WO2006047925A1 (en) A method for selecting the authentication manner at the network side
CN101379802B (zh) 在媒体服务器和用户设备之间以加密方式传输媒体数据的方法和装置
WO2009065360A1 (en) Method, system and equipment for the end-to-end qos application
WO2008011819A1 (en) Method and device for transmitting legal intercepting information
US20140160990A1 (en) Mechanisms for Quality of Service to Over the Top Applications for Use in Commercial Wireless Networks
CN101420432A (zh) 一种ims监听的实现方法、系统及装置
WO2008067728A1 (en) A method, network and device of routing session
WO2013026327A1 (zh) 一种能力查询的方法、通信终端及应用服务器
WO2008151532A1 (en) Method for licit monitoring and device thereof
WO2007085195A1 (en) System and method for handling resource request
WO2008089694A1 (en) A method, a system and an equipment for obtaining the media stream protecting key in ims network
CN100401724C (zh) 发送即时消息的方法和设备
WO2013159623A1 (zh) 通信监听的指示、实现方法及装置
CN101072326A (zh) 访问非归属签约iptv业务提供者业务的方法、系统和设备
WO2007090348A1 (en) A method, apparatus and system for checking the validity for globally routable user agent uri
WO2008134956A1 (en) Media control method, system, device and media service combining device
WO2008080297A1 (en) A method, equipment and system for relating the session
WO2009092307A1 (zh) 一种访问非sip资源的方法、系统和设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2007702124

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWP Wipo information: published in national office

Ref document number: 2007702124

Country of ref document: EP