CN100361457C - Method for transferring monitored information - Google Patents

Method for transferring monitored information Download PDF

Info

Publication number
CN100361457C
CN100361457C CNB2004100389124A CN200410038912A CN100361457C CN 100361457 C CN100361457 C CN 100361457C CN B2004100389124 A CNB2004100389124 A CN B2004100389124A CN 200410038912 A CN200410038912 A CN 200410038912A CN 100361457 C CN100361457 C CN 100361457C
Authority
CN
China
Prior art keywords
target
communication equipment
virtual identifying
true identity
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100389124A
Other languages
Chinese (zh)
Other versions
CN1697406A (en
Inventor
周四红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2004100389124A priority Critical patent/CN100361457C/en
Publication of CN1697406A publication Critical patent/CN1697406A/en
Application granted granted Critical
Publication of CN100361457C publication Critical patent/CN100361457C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention discloses a method for transferring monitored information, which comprises: LIC provides a virtual label distributed for a set goal user device to communication devices which store the corresponding relationship between a true label and the virtual label of the goal user device, and the monitored information carrying the virtual label is transferred among the communication devices. The safety of the true label of the goal user device is guaranteed according to the method of the present invention, the true label of the goal user device is prevented from illegally stealing, and the safety and the confidentiality of monitored activities are greatly enhanced.

Description

A kind of method that transmits monitoring information
Technical field
The present invention relates to the monitoring field, be meant a kind of method that transmits monitoring information especially.
Background technology
Lawful Interception is meant that in the law allowed band activity of telecommunication service is monitored by state security department.Requirement according to state security department, the communication network of all operations, comprise PSTN (PSTN, Public Switched Telephone Network), global mobile communication (GSM, GlobalSystem for Mobile Communication) network, code division multiple access (CDMA, Code DivisionMultiple Access) communication network, and following Wideband Code Division Multiple Access (WCDMA) (W-CDMA, Wide CodeDivision Multiple Access) communication network, next generation network (NGN) etc., state security department can be monitored target UE, and the monitoring interface of realizing monitoring is provided, as policing interface (lawful interception interface).Subscriber equipment by Lawful Interception is called target UE.
Fig. 1 is an existing techniques in realizing scheme schematic diagram, as shown in Figure 1, when target UE is monitored, Lawful Interception Center (LIC, Lawful Information Center) 101 by policing interface (lawful interception interface) 105 and the (MSC of mobile switching centre, Mobile Switch Center) 102 attaching position register (HLR,, Home Location Register) 103 mobile positioning center (MPC,, Mobile PositionCenter)/GMLC (GMLC, Gateway Mobile Location Center) 104 communication equipments such as grade are continuous.When LIC 101 need monitor target UE, just in communication equipment, set the target UE of being monitored by policing interface (lawful interception interface) 105, when target UE communicates activity, communication equipment reports the communication activity relevant information of target UE to LIC 101, as the communication activity incident of target UE, Content of Communication, positional information or the like, thereby realize the monitoring of 101 pairs of target UEs of LIC.
Above-described communication equipment also can comprise (the SMC of short message service center, Short MessageCenter), group data service node (PDSN, Packet Data Service Node), Authentication Authorization and accounting server (AAA, Authentication Authority Accounting), home subscriber server (HSS, Home Subscriber Server), service universal grouping wireless business supporting node (SGSN, Serving GPRS Support Node), ggsn (GGSN, Gateway GPRS Support Node) or the like.
In the existing communication network, generally target UE is carried out Lawful Interception by the target UE sign, promptly monitoring system is set the target UE of being monitored according to customer equipment identification.For GSM network, WCDMA communication network, the target UE sign can be travelling carriage Integrated Services Digital Network number (MSISDN, Mobile Subscriber ISDN Number), international mobile subscriber identity (IMSI) or international mobile equipment identification number (IMEI); For the cdma communication network, this target UE sign can be mobile number book (MDN), IMSI or electronics string number (ESN).Above-described target UE sign can be described as sign commonly used or true identity.
In the monitoring activity, the true identity of target UE should be sensitive, must guarantee the confidentiality of target UE true identity, guarantee that the target UE true identity can not illegally be known, therefore, for improving the confidentiality and the fail safe of monitoring activity, the policing interface (lawful interception interface) between LIC and the communication equipment adopts private line access usually or takes encryption measures, make that the target UE true identity that transmits between LIC and the communication equipment is as safe as a house, can illegally do not known.
But in some cases, when target UE communicates activity, need mutual by between communication equipment, triggering certain or some communication equipments wherein report the monitoring information of target UE to LIC, at this moment, to transmit the true identity of target UE between communication equipment, owing to adopt signaling network to connect between communication equipment usually, the fail safe of signaling network and confidentiality are all well below policing interface (lawful interception interface), like this, the node by signaling network transmits the true identity of target UE, and as easy as rolling off a log quilt is is illegally intercepted and captured, reduce the fail safe and the confidentiality of monitoring activity greatly, for the activity of monitoring brings serious potential safety hazard.
Contrast Fig. 1 describes with application example below, for making the monitoring personnel can grasp the whereabouts of target UE timely and accurately, can in communication equipment, preestablish special number, as in MSC102 or HLR103, setting special number, when target UE is called out special number, the MSC102 notice MPC/GMLC104 at the current place of target UE positions operation to target UE, and MPC/GMLC104 provides the positioning result of target UE to LIC101.When the MSC102 notice MPC/GMLC104 at the current place of target UE positions target UE, MSC102 need send the true identity of target UE to MPC/GMLC104, like this, the target UE true identity that transmits between the signaling network node will be very easy to illegally be intercepted and captured, thereby know the target UE of being monitored, greatly reduced the fail safe and the confidentiality of monitoring activity.
Though can earlier the target UE true identity be encrypted, and then between communication equipment, transmit, be decrypted at last, thereby obtain the true identity of target UE, like this, just need communication equipment support encryption, decipher function, and for strengthening the fail safe that the target UE true identity transmits, the encryption key that also needing upgrades in time uses between the communication equipment, cause the processing procedure between the communication equipment too complicated, and when traffic carrying capacity is bigger, the encryption of above-mentioned communication equipment, decipher function will have a strong impact on its performance.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of method that transmits monitoring information, to strengthen the fail safe and the confidentiality of monitoring activity.
In order to achieve the above object, the invention provides a kind of method that transmits monitoring information, the method includes the steps of:
A, Lawful Interception Center LIC are that target UE distributes a plurality of virtual identifyings, LIC request communication equipment is set the target UE of being monitored, and provide the true identity and the described virtual identifying of target UE to communication equipment, and the corresponding relation between target UE true identity, virtual identifying and each communication equipment, the corresponding relation between communication apparatus stores target UE true identity, virtual identifying and each communication equipment;
Corresponding relation between B, communication equipment between target UE true identity, virtual identifying and each communication equipment transmits the monitoring information that carries virtual identifying;
C, communication equipment report monitoring information according to the monitoring requirement of setting to LIC.
In the such scheme, described step B is: when first communication equipment transmits monitoring information to second communication equipment, carry in the described monitoring information and the corresponding target UE virtual identifying of second communication equipment.
Described steps A further comprises:
Corresponding relation between a, LIC storage target UE true identity and the virtual identifying.
Carry the virtual identifying of target UE described in the step C in the monitoring information.
LIC is a target UE when distributing a plurality of virtual identifying, and described step a further comprises: the corresponding relation between LIC storage target UE true identity, virtual identifying and each communication equipment.
Carry in the monitoring information described in the step C and the corresponding target UE virtual identifying of communication equipment.
Carry the true identity of target UE described in the step C in the monitoring information.
According to the proposed method, LIC distributes virtual identifying for the target UE of setting, and provide the virtual identifying of distribution to communication equipment, corresponding relation between communication apparatus stores target UE true identity and the virtual identifying, when transmitting relevant monitoring information between the communication equipment, only transmit the target UE virtual identifying that LIC distributes, guaranteed the fail safe of target UE true identity, avoid the true identity of target UE illegally to be stolen, strengthened the fail safe and the confidentiality of monitoring activity greatly.
Description of drawings
Fig. 1 is an existing techniques in realizing scheme schematic diagram;
Fig. 2 is an implementation schematic diagram of the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Among the present invention, LIC distributes virtual identifying for the target UE of setting, and provide the virtual identifying of distribution to communication equipment, corresponding relation between communication apparatus stores target UE true identity and the virtual identifying, when transmitting relevant monitoring information between the communication equipment, only transmit the target UE virtual identifying that LIC distributes, to strengthen the fail safe and the confidentiality of monitoring activity.The virtual identifying of target UE also can be described as temporary mark.
Fig. 2 is an implementation schematic diagram of the present invention, as shown in Figure 2, LIC101 is before request communication equipment target setting subscriber equipment, for target UE distributes virtual identifying, the true identity and the virtual identifying of target UE are provided to communication equipment then, as the true identity and the virtual identifying of target UE, the corresponding relation between LIC101 and communication apparatus stores target UE true identity and the virtual identifying are provided to MSC102, HLR103, MPC/GMLC104 etc.
When target UE communicates activity, transmit the monitoring information that carries the target UE virtual identifying between the communication equipment, last communication equipment reports the monitoring information of target UE according to the monitoring requirement of setting to LIC101.
Contrast Fig. 2 describes with application example below, and the implementation procedure among the present invention may further comprise the steps:
Step 201:LIC101 for target UE distributes virtual identifying, and stored the corresponding relation between target UE true identity and the virtual identifying before request communication equipment target setting subscriber equipment.LIC101 can be target UE and distributes a unique and corresponding virtual identifying of true identity; Also can distribute a plurality of target UE virtual identifyings, as quantity according to communication equipment, the virtual identifying that distributes respective numbers, for example, LIC101 is at MSC102, HLR103 and MPC/GMLC104 are respectively target UE and distribute virtual identifying, be target UE and distribute 3 virtual identifyings, store the target UE true identity then, corresponding relation between virtual identifying and each communication equipment, or certain several communication equipment is corresponding to a target UE virtual identifying, for example, LIC101 is that target UE distributes a virtual identifying at MSC102 and HLR103, is that target UE distributes a virtual identifying at MPC/GMLC104.
Step 202:LIC101 request communication equipment target setting subscriber equipment provides the true identity and the virtual identifying of target UE, the corresponding relation between communication apparatus stores target UE true identity and the virtual identifying to communication equipment.If LIC101 has distributed a plurality of target UE virtual identifyings, then LIC101 also needs to provide the target UE true identity to each communication equipment, corresponding relation between virtual identifying and each communication equipment, each communication apparatus stores target UE true identity, corresponding relation between virtual identifying and each communication equipment, remove the corresponding relation of storing between target UE true identity and the virtual identifying as MSC102, also need store the target UE true identity, corresponding relation between virtual identifying and the HLR103, and target UE true identity, the corresponding relation of virtual identifying and MPC/GMLC104.
Step 203: when target UE communicates activity, transmit the virtual identifying that only carries target UE in the relevant monitoring information between communication equipment.If LIC101 has only distributed a unique target UE virtual identifying, the target UE virtual identifying that then transmits between all communication equipments is all identical; If LIC101 has distributed a plurality of target UE virtual identifyings, it is the corresponding relation of having stored in the communication equipment between target UE true identity, virtual identifying and the communication equipment, then communication equipment is according to stored relation, provide and the corresponding target UE virtual identifying of another communication equipment to another communication equipment, when MPC/GMLC104 sends the relevant monitoring information of target UE, provide corresponding target UE virtual identifying as MSC102 with MPC/GMLC104 to MPC/GMLC104.
Step 204: communication equipment reports the monitoring information of target UE according to the monitoring requirement of setting to LIC101.Owing to be connected to policing interface (lawful interception interface) 105 between communication equipment and the LIC101, policing interface (lawful interception interface) 105 has high fail safe and confidentiality, therefore, the target UE sign that transmits between communication equipment and the LIC101 can be the true identity of target UE, also can be the virtual identifying of target UE.
For example, LIC101 is that target UE distributes virtual identifying, the corresponding relation between storage target UE true identity and the virtual identifying; Target setting subscriber equipment in MSC102, HLR103 and MPC/GMLC104 then, and provide the virtual identifying of distribution, the corresponding relation between MSC102, HLR103 and MPC/GMLC104 storage target UE true identity and the virtual identifying to MSC102, HLR103 and MPC/GMLC104.For making the monitoring personnel can grasp the whereabouts of target UE timely and accurately, LIC101 has set special number in advance in communication equipment, requires when target UE is called out special number, and MPC/GMLC104 positions operation to target UE.
When the MSC102 at the current place of target UE detects the calling that target UE initiates special number, send the location indication to MPC/GMLC104, carry the virtual identifying of target UE in this location indication, can further carry the special number that target UE is called out in this location indication.If LIC101 is according to the quantity of communication equipment, the virtual identifying that has distributed respective numbers, it is the corresponding relation of having stored in the communication equipment between target UE true identity, virtual identifying and the communication equipment, then MSC102 carries the corresponding target UE virtual identifying with MPC/GMLC104 according to stored relation in the location indication that MPC/GMLC104 sends.
After MPC/GMLC104 receives the location indication, according to the target UE true identity of storage and the corresponding relation between the virtual identifying, after finding target UE, target UE is positioned operation, and MPC/GMLC104 provides the positioning result of target UE to LIC101 then.Since be connected to policing interface (lawful interception interface) 105 between LIC101 and the MPC/GMLC104, therefore, the true identity of portability target UE in the positioning result, the also virtual identifying of portability target UE.
If what communication equipment carried in the monitoring information that LIC101 reports is the true identity of target UE, then LIC101 can not store the corresponding relation between target UE true identity and the virtual identifying after distributing the target UE virtual identifying.
In a word, the above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (7)

1, a kind of method that transmits monitoring information is characterized in that the method includes the steps of:
A, Lawful Interception Center LIC are that target UE distributes a plurality of virtual identifyings, LIC request communication equipment is set the target UE of being monitored, and provide the true identity and the described virtual identifying of target UE to communication equipment, and the corresponding relation between target UE true identity, virtual identifying and each communication equipment, the corresponding relation between communication apparatus stores target UE true identity, virtual identifying and each communication equipment;
Transmit the monitoring information that carries virtual identifying according to the corresponding relation between target UE true identity, virtual identifying and each communication equipment between B, communication equipment;
C, communication equipment report monitoring information according to the monitoring requirement of setting to LIC.
2, method according to claim 1 is characterized in that, described step B is: when first communication equipment transmits monitoring information to second communication equipment, carry in the described monitoring information and the corresponding target UE virtual identifying of second communication equipment.
3, method according to claim 1 and 2 is characterized in that, described steps A further comprises:
Corresponding relation between a, LIC storage target UE true identity and the virtual identifying.
4, method according to claim 3 is characterized in that, carries the virtual identifying of target UE described in the step C in the monitoring information.
5, method according to claim 3, it is characterized in that, LIC is a target UE when distributing a plurality of virtual identifying, and described step a further comprises: the corresponding relation between LIC storage target UE true identity, virtual identifying and each communication equipment.
6, method according to claim 5 is characterized in that, carries in the monitoring information described in the step C and the corresponding target UE virtual identifying of communication equipment.
7, method according to claim 1 and 2 is characterized in that, carries the true identity of target UE described in the step C in the monitoring information.
CNB2004100389124A 2004-05-10 2004-05-10 Method for transferring monitored information Expired - Fee Related CN100361457C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100389124A CN100361457C (en) 2004-05-10 2004-05-10 Method for transferring monitored information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100389124A CN100361457C (en) 2004-05-10 2004-05-10 Method for transferring monitored information

Publications (2)

Publication Number Publication Date
CN1697406A CN1697406A (en) 2005-11-16
CN100361457C true CN100361457C (en) 2008-01-09

Family

ID=35349942

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100389124A Expired - Fee Related CN100361457C (en) 2004-05-10 2004-05-10 Method for transferring monitored information

Country Status (1)

Country Link
CN (1) CN100361457C (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000056029A1 (en) * 1999-03-12 2000-09-21 Nokia Networks Oy Interception system and method
CN1338169A (en) * 1999-01-14 2002-02-27 诺基亚网络有限公司 Interception method and system
WO2003044966A2 (en) * 2001-11-23 2003-05-30 Nokia Corporation Technique for generating correlation number for use in lawful interception of telecommunications traffic
CN1449218A (en) * 2002-02-13 2003-10-15 日本电气株式会社 Location system with enhanced security
CN1132374C (en) * 1996-07-31 2003-12-24 西门子公司 Method and system for user distinguishing and/or information enciphering
WO2004010649A1 (en) * 2002-07-19 2004-01-29 Nokia Corporation Informing a lawful interception system of the serving system serving an intercepted target
CN1474564A (en) * 2002-08-05 2004-02-11 ��Ϊ�������޹�˾ Communication method between virtual local area webs

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1132374C (en) * 1996-07-31 2003-12-24 西门子公司 Method and system for user distinguishing and/or information enciphering
CN1338169A (en) * 1999-01-14 2002-02-27 诺基亚网络有限公司 Interception method and system
WO2000056029A1 (en) * 1999-03-12 2000-09-21 Nokia Networks Oy Interception system and method
WO2003044966A2 (en) * 2001-11-23 2003-05-30 Nokia Corporation Technique for generating correlation number for use in lawful interception of telecommunications traffic
WO2003044966A3 (en) * 2001-11-23 2003-11-27 Nokia Corp Technique for generating correlation number for use in lawful interception of telecommunications traffic
CN1449218A (en) * 2002-02-13 2003-10-15 日本电气株式会社 Location system with enhanced security
WO2004010649A1 (en) * 2002-07-19 2004-01-29 Nokia Corporation Informing a lawful interception system of the serving system serving an intercepted target
CN1474564A (en) * 2002-08-05 2004-02-11 ��Ϊ�������޹�˾ Communication method between virtual local area webs

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Security Architecture. 3GPP TS 33.102 V5.3.0. 2003 *
移动通信中的LI(合法侦听)的实现技术. 孟旭东,王隽,陶海.江苏通信技术,第20卷第1期. 2004 *

Also Published As

Publication number Publication date
CN1697406A (en) 2005-11-16

Similar Documents

Publication Publication Date Title
EP1523827B1 (en) Informing a lawful interception system of the serving system serving an intercepted target
US7570941B2 (en) Method enabling detection of stolen mobile communication devices and systems thereof
US9072081B2 (en) Cellular telecommunications networks for temporarily associating unique connection numbers with terminals having token identification modules
US6405030B1 (en) System for interception of digital cellular phone communication
CN100473187C (en) Method and equipment for storing subscriber data
CN101437225B (en) System and method for ciphering key forwarding and RRC packet deciphering in a UMTS monitoring system
CN101142805B (en) Lawful interception of unauthorized subscribers and equipments
CN101563944A (en) IMSI handling system
KR20200053609A (en) Method for transmitting an encrypted subscription identifier stored in a secure element to a physical or virtual element of a telecommunication network, a corresponding secure element, a physical or virtual element and a terminal cooperating with the secure element
EP1985145A1 (en) Provision of position information in telecommunications networks
WO2001028273A1 (en) A method and system for protecting a user identifier
CN101600209B (en) Method for identifying copied subscriber identity module (SIM) card, device and system therefor
CN101227339B (en) Method for monitoring data traffic based on contents and/or IP address
US8543688B1 (en) Generating correlation codes for location information
CN103139769B (en) A kind of wireless communications method and network subsystem
CN101184303A (en) Anti-theft method and apparatus for mobile terminal
CN100361457C (en) Method for transferring monitored information
WO2006098669A1 (en) Area based monitoring
CN101431754B (en) Method for preventing clone terminal access
CN102124767B (en) A kind of method and apparatus for providing identity Confidentiality protection for user of communication terminal
CN101159625A (en) System and method of implementing monitor for police for WiMAX
CN101340643A (en) Air interface voice ciphering startup method and system
CN100353794C (en) Method of proceeding grouping business audiomonitoring according to user mark
CN1691675B (en) A method for automatically reporting target user equipment location information
CN1270477C (en) Monitoring realizing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080109

Termination date: 20200510

CF01 Termination of patent right due to non-payment of annual fee