CN101009604A - System, method and network device for legal monitoring in the next-generation network - Google Patents

System, method and network device for legal monitoring in the next-generation network Download PDF

Info

Publication number
CN101009604A
CN101009604A CNA2006100598294A CN200610059829A CN101009604A CN 101009604 A CN101009604 A CN 101009604A CN A2006100598294 A CNA2006100598294 A CN A2006100598294A CN 200610059829 A CN200610059829 A CN 200610059829A CN 101009604 A CN101009604 A CN 101009604A
Authority
CN
China
Prior art keywords
mgf
lawful interception
media stream
session
next generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006100598294A
Other languages
Chinese (zh)
Other versions
CN100550784C (en
Inventor
郑波
施有铸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2006100598294A priority Critical patent/CN100550784C/en
Priority to PCT/CN2006/002893 priority patent/WO2007082435A1/en
Publication of CN101009604A publication Critical patent/CN101009604A/en
Application granted granted Critical
Publication of CN100550784C publication Critical patent/CN100550784C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1083In-session procedures
    • H04L65/1093In-session procedures by adding participants; by removing participants

Abstract

The invention provides a system, as well as method and device for legal monitoring in next-generation network, wherein adding the application server for legal monitoring business into the calling signaling route, and adding the function entity for monitoring media gateway into the media route to collect and report communication content. Since it is independent with the access network, this invention can legal monitor users calling both through fixed network and mobile network, avoids the authorization between the dialogue control layer and access layer.

Description

Realize system, method and the network equipment of Lawful Interception in the next generation network
Technical field
The present invention relates to the network communications technology field, be specifically related to system, method and the network equipment of Lawful Interception Content of Communication in a kind of next generation network.
Background technology
LI (Lawful Interception, Lawful Interception) is meant the needs for law enforcement such as release mechanism such as country, and certain user or certain communication process are monitored.Monitoring comprises that the signaling aspect is monitored and the medium aspect is monitored.For the monitoring of signaling aspect, need output eavesdropping target's IRI (Intercept RelatedInformation, Intercept related information); For the monitoring of medium aspect, need output eavesdropping target's CC (Content of Communication, Content of Communication).
ETSI (ETSI) has provided the demand of monitoring in ETSI TS 101 331, and in ETSI ES 201 671, provided three interfaces between the communication equipment and Lawful Interception law actuating equipment in traditional CS (circuit switching) territory, promptly data-interface, IRI report interface and CC to report interface.ADMF (Administration Function, the management function entity) as the management function entity of Lawful Interception, the Lawful Interception dependent instruction that receives is provided with interface by monitored data is issued to next generation communication network ICE (Interception Control Element monitors the control network element).Communication network is when listening to by eavesdropping target movable, report interface being sent to DF2 (Delivery Function by IRI by eavesdropping target's Intercept related information, passage is submitted functional entity), when monitoring needs output by eavesdropping target's Content of Communication such as Media Stream, what report that interface will collect by CC is that duplicate media stream reports LEA (Law Enforcement Agency, judicial carry out agency) by eavesdropping target's Content of Communication.
From foregoing description as can be seen, collection Lawful Interception Content of Communication also reports, and is being exactly to duplicate the communicate media data bag that is exchanged by eavesdropping target's the inverter circuit territory based on VOIP (voice on the IP) on the technological layer, and duplicated data packet is reported LEA.Therefore, a key technology relating to of Lawful Interception is exactly medium replication.Medium replication is the part of medium control.
The NGN network is based on the pattern of fusion network of group technology, and it has inherited all business of original fixed network, has also inherited mobile network's professional ability simultaneously.In the NGN network of each normal structure research at present, the NGN server net of primary study is IP Multimedia System (IMS) network, and the IMS network can be simultaneously for providing service from the user of fixed network access and the user who inserts from the mobile network.
IMS (IP Multimedia Subsystem, IP Multimedia System) is the subsystem of the support IP multimedia service that proposes in Release 5 versions of 3GPP.The core characteristics of IMS are to adopt the independence of SIP (SessionInitiation Protocol, Session initiation Protocol) agreement and access.IMS is a multimedia control/calling controlling platform on PS (Packet Switched, packet switching) territory, supports conversation class and non-conversation class multimedia service, for the multimedia application in future provides a general business platform.
Under the development trend of the network integration, many international and domestic organizing all in the network integration scheme of research based on IMS, purpose is to make IMS become general-purpose platform based on the SIP session, makes IMS support simultaneously to move and fixing plurality of access modes.
Because the research of the network integration just begins, technology is ripe not enough, and its standardization effort also correspondingly becomes the emphasis of present research.At NGN (Next Generation Network, next generation network) in the framework, terminal and access network are various, and have only an IMS network based on the core network of SIP session, provide service for fixing and portable terminal simultaneously based on the core network of SIP session.This just needs the IMS network to support fixing access way from the aspects such as functional entity, QoS (Quality of Service, service quality) and safety of network frame, network comprehensively.
In 3GPP TS33.107, provided in the IMS territory, two kinds of Lawful Interceptions also report the technical scheme of Content of Communication:
Method one: duplicate Content of Communication and report by GSN, as shown in Figure 1.
Among Fig. 1,3G GSN (3rd Generation GPRS Support Node, the 3rd generation GGSN) to duplicate by eavesdropping target's communicate media data bag as GGSN/SGSN etc. be Content of Communication, and the communicate media data bag that duplicates reported to LEA by DF3 ( Delivery Function 3P, 3 passages are submitted functional entity).
3G GSN can adopt MGCP (MediaGateway Control Protocol, MGCP) and H248 agreement when duplicating by eavesdropping target's communicate media data bag.MGCP and H248 agreement are current the most widely used two kinds of MGCPs, and H.248 Profile for BasicRTP-based Lawful Interception (H.248 the Lawful Interception based on rtp streaming is described) is one piece of motion of current normal structure research Lawful Interception media portion.In this piece motion, the description of the topological logic that the packet based on RTP (Real-time Transfer Protocol, RTP) is duplicated is shown in accompanying drawing 2 and accompanying drawing 3.
Topological logic shown in Fig. 2 and Fig. 3 is applicable to the situation of creating a plurality of Media Streams in a session, as in video call, creates video flowing and audio stream.Adopt the topological logic among Fig. 2, Fig. 3 can finish duplicating of video flowing and audio stream respectively.
The monitoring bag of H248 expansion is that H248 realizes a kind of concrete protocol language description that above-mentioned RTP duplicates, and the method that adopts expansion H248 to monitor the mode duplicate packet of bag below in conjunction with 1 pair in accompanying drawing is described.
This method at first needs to carry out following three kinds of definition:
1, the ID (sign) of bag is monitored in definition.
2, definition is monitored package media and is duplicated indication attribute " Interception indication ", what medium replication indication attribute was used for specified endpoint duplicates the subordinate attribute, promptly indicating end points is slave (subordinate) attribute, master (master) attribute, or common (common) attribute, for the end points that does not show this attribute, think then and duplicate irrelevant end points that the subordinate attribute of this end points is common without exception.
3, end points subordinate relation " Master termination " is monitored in definition, and Master termination is effective to the slave end points, and type is the character string of 8 byte lengths.The endpoint id of the pairing master end points of slave end points is set among the Master termination, and this attribute is effective to the slave end points.As T3, T4 in Fig. 2, Fig. 3 is the slave end points, and T1 is the master end points of T3, and T2 is the master end points of T4.
4, end points replication mode " Interception mode " is monitored in definition, and the value of monitoring the end points replication mode comprises " upstream ", " downstream " and " merging stream ".Monitor the end points replication mode and be used for expressing slave end points and the connected mode that is replicated end points, promptly represent the up medium of copy source end points, descending medium or up-downgoing mixed-media.This attribute is effective to the slave end points.
After having carried out above-mentioned definition, it is slave that some or a plurality of end points in being in same context (context) are instructed to attribute, and after specifying its master end points and replication mode, the slave end points just from the master end points of appointment duplicate respective streams to packet.
Method two: duplicate Content of Communication and report by PDG, as shown in Figure 4.
Among Fig. 4,3GPP WLAN (Wireless Local Area Network, WLAN (wireless local area network)) PDG in (Packet Data Gateway, packet gateway) duplicates by eavesdropping target's communicate media data bag, and the communicate media data bag that duplicates is reported to LEA by DF3.PDG can adopt MGCP (Media Gateway Control Protocol, MGCP) and H248 agreement equally when duplicating by eavesdropping target's communicate media data bag, concrete as the description in the above-mentioned method one.
As can be seen, no matter being to adopt 3G GSN or adopt the PDG duplicate packet to report Content of Communication from the description of above-mentioned two kinds of methods, all is to rely on access network equipment to provide corresponding monitor function to realize.Like this, the user that fixed network inserts, method does not realize that the Lawful Interception Content of Communication is gathered and the function of report at present; And, because intercept communications content acquisition and the function that reports depend on the packet copy function that access layer equipment provides under mobile network's access way, certainly will need between session control layer and Access Layer, transmit Lawful Interception control signaling information or transmit the Lawful Interception data message, and this need be based upon session control layer and the Access Layer mutual trust is monitored or mutual the mandate on the basis of monitoring, when by the eavesdropping target when the Access Network of un-trusted or uncommitted monitoring inserts, said method can not realize the user is monitored and reports the function of Content of Communication.
Summary of the invention
The objective of the invention is to, system, method and the network equipment of realizing Lawful Interception in a kind of next generation network are provided, by LI-AS being joined in the call signaling route, LI-MGF being joined in the medium route, duplicate and export the conversation Media Stream by LI-MGF, make the implementation procedure and the Access Network of Lawful Interception Content of Communication of the present invention irrelevant, and, avoided the trust and the licensing issue of session control layer and Access Layer, thereby the technical scheme of the complete feasible Lawful Interception Content of Communication of a cover is provided for the NGN network.
For achieving the above object, the invention provides the system that realizes Lawful Interception in a kind of next generation network, described system comprises:
Legal monitoring business application server LI-AS, Lawful Interception medium gateway function LI-MGF;
LI-AS is when determining to monitor calling, the session request of setting up according to its reception will oneself join in the call signaling route, LI-AS controls LI-MGF according to the call signaling that it receives, LI-MGF is joined in the medium route, LI-MGF duplicates the conversation Media Stream, and output.
Described LI-MGF is positioned at by the home domain of eavesdropping target's home domain or arbitrary correspondent, and LI-MGF is the gateway of an IP to IP.
Described LI-MGF is an independent function entity, or described LI-MGF is arranged among the LI-AS.
When described LI-MGF is independent function entity, there is interface between described LI-AS and the LI-MGF, interface protocol comprises: H.248 agreement and/or Session initiation Protocol SIP;
When described LI-MGF is arranged among the LI-AS, adopt self-defining internal interface to connect between described LI-AS and the LI-MGF.
Be provided with between described LI-AS and the LI-MGF: Lawful Interception MGCF LI-MGCF;
LI-AS joins in the medium route by LI-MGCF control LI-MGF.
Described LI-MGCF is an independent function entity, or described LI-MGCF is arranged among the LI-AS or is arranged among the LI-MGF.
When described LI-MGCF is independent function entity, there is interface between described LI-AS and the LI-MGCF, H.248 and/or Session initiation Protocol SIP H.248 and/or SIP this interface protocol is:, and have interface between described LI-MGF and the LI-MGCF, and interface protocol is:;
When described LI-MGCF is arranged among the LI-AS or be arranged among the LI-MGF, adopt self-defining internal interface to connect between described LI-AS and the LI-MGCF or between LI-MGF and the LI-MGCF.
The invention provides the method that realizes Lawful Interception in a kind of next generation network, comprising:
A, LI-AS ask and will oneself join in the call signaling route according to the session foundation of its reception when determining to monitor calling;
B, LI-AS control LI-MGF according to the call signaling that it receives, and LI-MGF is joined in the medium route;
C, LI-MGF duplicate conversation Media Stream and output.
Described step a comprises:
S-CSCF carries out the Lawful Interception initial filter criteria after receiving session foundation request, request message is set up in session routed to LI-AS;
LI-AS sets up request message according to the session of its reception and judges whether the needs monitoring;
If determine and to monitor, will oneself join in the call signaling route, and the session request of setting up is back to S-CSCF;
If determining does not need to monitor, directly the session request of setting up is back to S-CSCF.
Described step b comprises:
LI-AS is in call establishment, to LI-MGF application session connection resource;
LI-AS makes LI-MGF set up IP address and the RTP port number information that the SDP in request and the call request corresponding message describes according to described session connection resource modifying session by control LI-MGF, and LI-MGF is joined in the medium route.
Described step b comprises:
B1, LI-AS initiate the media redirection flow process by control LI-MGF LI-MGF are joined in the medium route behind call setup.
Described step b comprises:
When b11, listening center determine to duplicate and to export by the current ongoing dialog context of eavesdropping target, transfer to LI-AS with carrying by the instruction of the output of eavesdropping target's identify label conversation Media Stream;
B12, LI-AS are obtained the encoding scheme that calling both sides is consulted according to its reception by eavesdropping target's identify label, and according to this encoding scheme to LI-MGF application session connection resource;
Make a call both sides' media redirection flow process of b13, LI-AS;
B14, LI-AS are after receiving the media redirection response message of calling both sides, and the conversation current according to described session connection resource modifying calling both sides connects, and LI-MGF is arrived in the conversation Media Stream tandem of calling both sides.
Described step b11 comprises:
When listening center is determined to duplicate and to export by the current ongoing dialog context of eavesdropping target, the X1_1 instruction by ADMF will carry by the instruction of the output of eavesdropping target's identify label conversation Media Stream and transfer to LI-AS.
Described step b comprises:
LI-AS directly controls LI-MGF according to its call signaling that receives, and LI-MGF is joined in the medium route; Or
LI-AS controls LI-MGF according to its call signaling that receives indirectly by LI-MGCF, and LI-MGF is joined in the medium route.
Described step c comprises:
The topological descriptor that c1, LI-AS will monitor media stream duplication transfers to LI-MGF;
C2, LI-MGF duplicate the conversation Media Stream according to the topological descriptor of the monitoring media stream duplication that it receives, and output.
Described step c comprises:
LI-AS transfers to LI-MGF with user's monitored data;
LI-MGF duplicates the conversation Media Stream according to user's monitored data that it receives, and output.
The topological descriptor of described monitoring media stream duplication or user's monitored data are carried among the SIP of the H.248 agreement of expansion and/or expansion and transfer to LI-MGF.
Described H.248 protocol extension is: the expansion of carrying monitored data is the monitored data bag H.248, and described SIP expands to: XML message body of the topological descriptor of monitoring media stream duplication is carried in expansion, or XML message body of monitored data information is carried in expansion.
Described step c also comprises:
LI-AS submits functional entity DF3 to 3 passages and makes a call, and the conversation Media Stream that control LI-MGF will duplicate transfers to listening center by DF3.
The present invention also provides a kind of network equipment with Lawful Interception medium gateway function, and the described network equipment is arranged in the medium route of being conversed by the eavesdropping target, duplicates the conversation Media Stream, and output.
The described network equipment is positioned at by the home domain of eavesdropping target's home domain or arbitrary correspondent, and is the gateway of an IP to IP.
The present invention also provides a kind of application server, be provided with the Lawful Interception control module in the described application server, this Lawful Interception control module is when determining to monitor calling, the session request of setting up according to its reception will oneself join in the call signaling route, the Lawful Interception control module is controlled LI-MGF according to the call signaling that it receives, and LI-MGF is joined in the medium route.
Description by technique scheme as can be known, the present invention joins in the medium route by LI-AS being joined in the call signaling route and with LI-MGF, duplicate and export the conversation Media Stream by LI-MGF, make the implementation procedure and the Access Network of Lawful Interception Content of Communication of the present invention irrelevant, like this, the present invention can carry out Lawful Interception to the user's that inserts by fixed network in the NGN network calling, also can carry out Lawful Interception to the user's that inserts by the mobile network in the NGN network calling; Because the implementation procedure of Lawful Interception Content of Communication of the present invention can accomplish to have nothing to do with Access Network, so the present invention has avoided the trust and the licensing issue of session control layer and Access Layer; LI-AS among the present invention can join LI-MGF in the medium route by revising the mutual media information of calling both sides in call establishment; LI-AS also can join LI-MGF in the medium route by initiating the changed course flow process behind call establishment; The present invention duplicates, exports the conversation Media Stream of current ongoing calling; Thereby provide the technical scheme of the complete feasible Lawful Interception Content of Communication of a cover for the NGN network.
Description of drawings
Fig. 1 is IMS of the prior art territory GSN Lawful Interception Content of Communication and reports schematic diagram;
Fig. 2 is the topological logic schematic diagram one that the packet based on RTP is duplicated of the prior art;
Fig. 3 is the topological logic schematic diagram two that the packet based on RTP is duplicated of the prior art;
Fig. 4 is IMS of the prior art territory PDG Lawful Interception Content of Communication and reports schematic diagram;
Fig. 5 is the cellular logic structural representation of Lawful Interception Content of Communication of the present invention;
Fig. 6 is Lawful Interception Content of Communication of the present invention and the flow chart one that reports;
Fig. 7 is Lawful Interception Content of Communication of the present invention and the flowchart 2 that reports;
Fig. 8 is Lawful Interception Content of Communication of the present invention and the flow chart 3 that reports.
Embodiment
In the time need monitoring the user who is linked into the IMS territory, the present invention adopted and insert application server in the call signaling route, inserted media gateway in conversation medium route mode realizes duplicating and output function by eavesdropping target's conversation Media Stream.
Therefore, the system of Lawful Interception Content of Communication provided by the invention mainly comprises: LI-AS (legal monitoring business application server) and LI-MGF (Lawful Interception medium gateway function).Cooperate between LI-AS and the LI-MGF and realize that Lawful Interception Content of Communication and the main process that reports are:
At first, LI-AS is when receiving session foundation request and determining to carry out Lawful Interception to this calling, LI-AS will oneself join in the call signaling route of this calling, then, LI-AS is by the control to LI-MGF, LI-MGF is joined in the medium route of this calling, duplicate by eavesdropping target's conversation Media Stream by LI-MGF, and output.The conversation Media Stream of LI-MGF output can transfer to listening center by DF3.The session that above-mentioned LI-AS the receives request of setting up can be that the S-CSCF transmission comes.
System to Lawful Interception Content of Communication of the present invention is described in detail below.
The AS that realizes legal monitoring business in the communication system is LI-AS, and promptly LI-AS is a functional entity of carrying out the legal monitoring business logic, is provided with the Lawful Interception control module among the LI-AS.LI-MGF is arranged in by eavesdropping target's home domain or is positioned at conversation either party's home domain, LI-MGF is the gateway function entity of an IP to IP, and LI-MGF can be independent function entity, also can close with other functional entity and establish, and is made as same functional entity as closing with LI-AS.
Lawful Interception control module among the LI-AS and S-CSCF (Serving-CSCF, service call conversation control function) there is interface between, this interface can be the SIP interface of standard, Lawful Interception control module among the LI-AS can be passed through ISC (IMS Service control, IMS serves control) provides the Lawful Interception service for IMS.Lawful Interception control module among the LI-AS is when realizing the Lawful Interception service, oneself need be joined in the call signaling route, Lawful Interception control module among the LI-AS in joining the call signaling route after, according to its call signaling that receives, directly LI-MGF is controlled by the interface between itself and the LI-MGF, control LI-MGF joins in the medium route.Lawful Interception control module among the LI-AS can be set up in the process in session, by revising the mutual media information of session both sides, LI-MGF is joined in the medium route, Lawful Interception control module among the LI-AS also can be after session foundation be finished, by initiating the media redirection flow process, LI-MGF is added in the medium route.Lawful Interception control module among the LI-AS can transfer to LI-MGF with the topological logic descriptor of conversation medium replication, also monitored data can be passed to LI-MGF.
LI-MGF according to the control of LI-AS join conversed in the medium route by the eavesdropping target after, LI-MGF need provide the function of Lawful Interception Content of Communication, promptly LI-MGF needs duplicate media stream.LI-MGF can adopt the method for the various Lawful Interception Content of Communication of present existence to realize the function of intercept communications content, when receiving the topological logic descriptor that LI-AS transmission comes as LI-MGF, adopt method shown in accompanying drawing 2 and accompanying drawing 3 to realize the process of intercept communications content based on RTP Lawful Interception Content of Communication.
Have interface between the Lawful Interception control module among LI-MGF and the LI-AS, when LI-MGF was independent function entity, this interface can be the E1 interface, and the interface protocol between the Lawful Interception control module among LI-MGF and the LI-AS can adopt SIP or H.248.When LI-MGF and LI-AS close when being made as a functional entity, the interface between the Lawful Interception control module among LI-MGF and the LI-AS can be self-defining internal interface.
Can also comprise in the system of Lawful Interception Content of Communication provided by the invention: LI-MGCF (Lawful Interception MGCF), like this, Lawful Interception control module among the LI-AS can directly not controlled LI-MGF, but realize control to LI-MGF by LI-MGCF, be that Lawful Interception control module among the LI-AS can directly be controlled LI-MGF by interface such as El interface between itself and the LI-MGF, also can control LI-MGF indirectly by the interface between itself and the LI-MGCF.
LI-MGCF can independent function entity, also can close with other functional entity and establish, and is made as same functional entity as closing with LI-MGF, closes with LI-AS for another example and is made as same functional entity.
System below in conjunction with the Lawful Interception Content of Communication of 5 couples of LI-MGCF of comprising provided by the invention of accompanying drawing describes.
Among Fig. 5, LI-MGCF is a Lawful Interception MGCF entity, and LI-MGCF finishes the function of Lawful Interception Content of Communication according to the control command control LI-MGF of LI-AS.When LI-MGCF is independent function entity, there is the E3 interface between LI-MGCF and the LI-MGF, the interface protocol between LI-MGCF and the LI-MGF can adopt SIP or H.248.When LI-MGCF and LI-MGF were all one, the E3 interface can be self-defining internal interface.LI-AS can control LI-MGF indirectly by LI-MGCF.The interface E2 of LI-AS existence and LI-MGCF, interface protocol is SIP.When LI-MGCF and LI-AS close when being made as same functional entity, the interface between LI-MGCF and the LI-AS can be self-defining internal interface.
When LI-AS needs LI-MGF to duplicate by the system of eavesdropping target's conversation Media Stream and Lawful Interception Content of Communication LI-MGCF among Fig. 5 not to be set, LI-AS can directly transfer to LI-MGF by the El interface between itself and the LI-MGF with the message that carries monitored data, LI-MGF is by resolving the monitored data in its message that receives, trigger and monitor, and duplicate by eavesdropping target's conversation Media Stream; LI-AS also can directly transfer to LI-MGF by the El interface between itself and the LI-MGF with carrying message that the topology of monitoring media stream duplication describes, LI-MGF describes by the topology of resolving in its message that receives, trigger and monitor, and duplicate the conversation Media Stream according to the topology description.
When LI-AS needs LI-MGF to duplicate to be provided with LI-MGCF among Fig. 5 by the system of eavesdropping target's conversation Media Stream and Lawful Interception Content of Communication, LI-AS can transfer to LI-MGCF by the E2 interface between itself and the LI-MGCF with the message that carries monitored data, LI-MGCF by the E3 interface between itself and the LI-MGF with this transmission of messages to LI-MGF, LI-MGF is by resolving the monitored data in its message that receives, trigger and monitor, and duplicate by eavesdropping target's conversation Media Stream; LI-AS also can transfer to LI-MGCF by the E2 interface between itself and the LI-MGCF with carrying message that the topology of monitoring media stream duplication describes, by LI-MGCF by the E3 interface between itself and the LI-MGF with this transmission of messages to LI-MGF, LI-MGF describes by the topology of resolving in its message that receives, trigger and monitor, and duplicate the conversation Media Stream according to the topology description.
Be example with two kinds of concrete execution modes below, Lawful Interception Content of Communication of the present invention and the system and method that reports are described.
Embodiment one, duplicating by transmission topology information realization conversation Media Stream, that is to say, LI-AS carries the topology of monitoring media stream duplication and describes in transferring to the message of LI-MGF, describe by the topology that LI-MGF monitors media stream duplication according to the message parse of its reception, and describe duplicate media stream according to this topology.
When LI-AS uses the E2 of the system description among Fig. 5 and E3 interface or El interface to transmit the topology of monitoring media stream duplication to describe, if the topology that adopts agreement H.248 to transmit to monitor media stream duplication is described, can adopt the H.248 monitoring bag of existing expansion to carry topology and describe; If adopt SIP, then can relate to the protocol extension of SIP, expand as follows:
The present invention can realize the protocol extension of SIP by application type based on the XML form of expansion, then, carries the topology of monitoring media stream duplication by message body and describes.XML message body can be following form:
Content-type:application/session-topology+xml
<?xml?version=″1.0″?>
<session-topology?xmlns=″urn:ietf:params:xml:ns:session-topology″
version=″0″state=″full″
entity=″sip:alice@example.com″>
<session?name=″abcd@example.com″>
<copiedstream>
<sourceaddr>[5555::1:2:3:4]:1357</sourceaddr>
<destinationaddr>[5555::a:b:c:d]:7531</destinationaddr>
<protocol>RTP</protocol>
</copiedstream>
<direction>upstream</direction>
</session>
</interception-data>
XML message body in the above-mentioned example provides current calling and need copy from [5555::1:2:3:4]: 1357 to [5555::a:b:c:d]: 7531 RTP up (upstream) Media Stream.
What deserves to be explained is, the above-mentioned expansion embodiment below explanation that describes about the topology of carrying the monitoring media stream duplication can adopt this extended method, realize monitoring the transmittance process that the topology of media stream duplication is described, and understood by LI-MGF and carry out, thereby make LI-MGF can carry out duplicating of Lawful Interception media data flow, this does not also mean that SIP must expand according to the above-mentioned mode that provides, other extended mode, describe as long as can transmit the topology of monitoring media stream duplication, and can just can by LI-MGF identification.If it not is emphasis of the present invention that SIP is expanded.
Among the embodiment one, in call establishment, LI-AS adopts the method for revising the mutual media information of session both sides, and LI-MGF is inserted in the medium route.Set in this example, LI-MGF exists and the direct interface of LI-AS, and interface protocol is agreement H.248.LI-AS that is to say that as MGC (media gateway controlling part) LI-AS possesses MGCF, and LI-MGF is controlled.LI-AS adopts the H.248 monitoring bag of expansion directly to control LI-MGF.The calling party who sets basic call is by the eavesdropping target.The process of realization Lawful Interception Content of Communication as shown in Figure 6.
Among Fig. 6, in step 1 to step 2, made a call as the calling party who calls out by the eavesdropping target.When request is set up in this session through S-CSCF, trigger the Lawful Interception filtering rule among the S-CSCF, S-CSCF is routed to LI-AS with the session request of setting up.
Receive according to it that session request of setting up determines that the calling party who calls out is monitored and during needs output communication content in step 3 to step 5, LI-AS, LI-AS uses the H.248 monitoring bag control LI-MGF of expansion, application session connection resource on LI-MGF, and the session connection resource of request for utilization is replaced the IP address and the RTP port number information of calling party's SDP description in the session foundation request, call out in the route oneself joining, then, LI-AS returns this call request route to S-CSCF.Here can adopt the method to set up among Fig. 2, Fig. 3 that LI-MGF is joined in the calling route.
Step 6 is receiving the call request that the LI-AS route returns to step 8, S-CSCF after, the identify label of the DNS among the S-CSCF (domain name system) resolving called, and this call request sent to next-hop node.This call request finally arrives the callee.After the callee responded this call request, loopback 200 OK message carried the medium type that callee SDP describes and selects in the 200 OK message.This message is routed to LI-AS through behind the S-CSCF.
The callee SDP that extracts in the message in step 9 to step 12, LI-AS describes, and describes according to callee SDP and to revise its connection resource on LI-MGF, makes LI-MGF connect the both call sides Media Stream.
Use H.248 monitoring of expansion to wrap control LI-MGF in step 13 to step 18, LI-AS and finish duplicating the conversation Media Stream between calling party and the callee, then, LI-AS is initiated to the calling of DF3, and the duplicated Media Stream of LI-MGF is transported to listening center.
Describe to the callee SDP that step 22, LI-AS revise among called party answer message 200 OK in step 19, the connection resource of going up application with LI-MGF substitutes callee SDP description, and called party answer message 200 OK are sent to next-hop node, this response message finally arrives the calling party.
What deserves to be explained is, in above-mentioned flow process, LI-AS sets up the media description of mutual both sides in the signalling route by control LI-MGF and by revising session, makes the tandem of both call sides Media Stream in LI-MGF, thereby is implemented in the purpose of inserting LI-MGF in the medium route.This process does not influence the media negotiation of both call sides, and this is because in the both call sides interactive signaling, LI-AS only revises both sides IP address and the RTP port numbers in the media description, does not change the encoding scheme that both sides consult.Like this, LI-MGF has realized providing Lawful Interception media stream duplication function as a gateway function entity that is positioned at the IP to IP in controlled user attaching territory.
Embodiment one has provided under non-resource reservation situation, and when caller was monitored in the basic call, LI-MGF duplicated the implementation procedure of conversation Media Stream.In fact, under the situation of resource reservation, LI-AS can control LI-MGF by said method equally, and describes the purpose that is implemented in insertion LI-MGF in the medium route by the SDP that revises in the both call sides Signalling exchange.
Under the situation of resource reservation, realize that the roughly flow process of Lawful Interception Content of Communication is: when calling party's the session request of setting up arrived S-CSCF, S-CSCF triggered Lawful Interception iFC (initial filter criteria), and the session request of setting up is routed to LI-AS.LI-AS receives according to it that session request of setting up determines that the calling party who calls out is monitored and during needs output communication content, to oneself join in this calling signaling route, and apply for resource on LI-MGF, like this, follow-up Signalling exchange message all can be passed through LI-AS.When the SDP that carries the calling either party in the follow-up process signaling message of LI-AS described, the SDP that LI-AS uses the resource of applying on LI-MGF to replace calling both sides described, and makes the tandem of both call sides Media Stream arrive LI-MGF.This shows, under the situation of resource reservation, realize that the process of Lawful Interception Content of Communication with under the situation of non-resource reservation, realizes that the process of Lawful Interception Content of Communication is identical.
Embodiment one is to be that example is described by the eavesdropping target with caller in the basic call.Callee in calling out is during by the eavesdropping target, the S-CSCF of callee's registration can adopt the implementation of above-mentioned calling party's S-CSCF equally, in called territory, the session request of setting up is routed among the LI-AS in called territory, and in calling out the medium route, insert LI-MGF by called territory LI-AS, duplicate the conversation Media Stream by LI-MGF.
In actual applications, when the caller territory can obtain the called party identity sign and exist listening center to monitor callee's data, also can adopt said method directly to monitor the callee in the caller territory.During being equally applicable to call out, this method has situation about being monitored in many ways.And this method also is applicable to subsequent embodiment of the present invention.
In the flow process of embodiment one, some the interim message in calling out have been omitted, as 100 response messages of Invite message etc.Embodiment one is that example is described with the basic call, the present invention also is applicable to other business except that basic call, that is to say, in when, by monitoring side business being taken place when, adopt the method for describing among the embodiment one, can duplicate the conversation Media Stream being inserted LI-MGF equally by in the calling medium route of monitoring side.
In the description of the foregoing description one, the method that LI-MGF is added the medium route also can for: after conversation is set up, LI-AS makes the tandem of both call sides Media Stream in LI-MGF by initiating the media redirection flow process, thereby is implemented in the function of inserting LI-MGF in the conversation Media Stream.As receive callee's call answering message 200 OK as LI-AS after, control LI-MGF application session connection resource, after the resource bid success, use the session connection resource to replace the media description of calling both sides, then, be initiated to the media redirection flow process of calling both sides respectively, make the calling both sides media redirection to LI-MGF, thus the tandem Media Stream.LI-AS can describe by carry the topology of monitoring media stream duplication in message, controls LI-MGF, makes LI-MGF duplicate the conversation Media Stream.
In the description of the foregoing description one, LI-AS uses the H.248 monitoring bag of expansion directly to control LI-MGF.Equally, the topology that LI-AS also can use the XML body of expansion to carry in sip message and monitor media stream duplication is described, and LI-MGF describes duplicate media stream by resolving this topology of monitoring media stream duplication.As when the session request of setting up arrives LI-AS, LI-AS sends to the session request of setting up among the LI-MGF, application session connection resource in LI-MGF, the session connection resource of LI-AS utilization application is replaced session and is set up SDP description in the request, and will oneself join in the call signaling route, then, the session request of setting up is returned to LI-AS, and finally return to S-CSCF, by S-CSCF the session request of setting up is sent to next-hop node.When LI-MGF received called party answer message, the SDP that replaces in the called party answer message described, and LI-MGF is arranged in calls out the medium route; When LI-AS received called party answer message, LI-AS was initiated to the calling of LI-MGF, and by the topology description that the XML body of expansion carries the monitoring media stream duplication, LI-MGF resolves the topology of the monitoring media stream duplication in this XML body and describes, and duplicates corresponding Media Stream.
In actual applications, LI-AS also can control LI-MGF indirectly by LI-MGCF, that is to say, LI-AS realizes concrete MGCF by LI-MGCF, and control LI-MGF duplicates the conversation Media Stream.At this moment, LI-AS can route the call to LI-MGCF, and when calling party was by the eavesdropping target and needs the Content of Communication of output Lawful Interception, LI-MGCF used the H.248 monitoring bag control LI-MGF of expansion, makes it duplicate the conversation Media Stream.
No matter LI-AS adopts is set up in the process in session, revise SDP describing mode in the Signalling exchange message, still adopt after session foundation is finished, initiatively initiate the media redirection flow process by LI-AS, in the description of above-mentioned embodiment, all give tacit consent to before by eavesdropping target's bid, there has been this user's monitored data in network and has monitored needs output media stream.In actual applications, the Intercept related information (IRI) that listening center reports in the time of can be according to customer call selectively requires network copy conversation Media Stream, and concrete implementation procedure as shown in Figure 7.
Among Fig. 7, set the user and enter talking state, listening center is determined this user's communication Media Stream of needs network copy according to user's Intercept related information that network reports temporarily.
Be in the session in steps A, controlled device, session enters talking state.Listening center is exported this by the Content of Communication of eavesdropping target's current talking according to the definite temporarily needs of the Intercept related information that reports, ADMF (management function entity) sends the output media stream instruction by the X1_1 instruction to LI-AS, carries the identify label by the eavesdropping target in the X1_1 instruction.
Step 1 to step 2, LI-AS according to by eavesdropping target's identify label, the encoding scheme that calling both sides was consulted when the acquisition call signaling was mutual is used this encoding scheme, control LI-MGF, LI-AS applies for the session connection resource in LI-MGF, be used to connect the calling both sides Media Stream.Here, LI-AS can adopt the method to set up among Fig. 2, Fig. 3 that LI-MGF is provided with.
Be initiated to the media redirection flow process of calling both sides in step 3 to step 14, LI-AS, promptly LI-AS is initiated to calling party and callee's media redirection flow process, carries LI-AS in the message of media redirection flow process and applies for that on LI-MGF the SDP of resource describes.LI-AS revises the connection on the LI-MGF after receiving the media redirection response message of calling both sides, make the tandem of call conversation both sides Media Stream to LI-MGF.
Use the H.248 monitoring bag of expansion to control LI-MGF in step 15 to step 26, LI-AS, application Lawful Interception medium replication resource is duplicated the user's communication Media Stream.And be initiated to the calling of DF3, the conversation Media Stream that duplicates is outputed to listening center.
Receive the receipt of call response message of DF3 at step B, LI-AS after, send request output media stream response message, indicate its output to specify by eavesdropping target's Media Stream to ADMF.
In the above-mentioned flow process, LI-AS controls LI-MGF, initiates the media redirection flow process by setting up the back in session, makes the tandem of both call sides Media Stream in LI-MGF, thereby is implemented in the purpose of inserting LI-MGF in the medium route.This does not influence the media negotiation of both call sides.In the description of above-mentioned initiation media redirection flow process, in call out calling party's media redirection flow process and in call out callee's media redirection flow process do not distinguish sequencing.In actual applications, in call out calling party's media redirection flow process and in call out the sequencing of callee's media redirection flow process do not influence the solution of the present invention.
In the description of the foregoing description, LI-AS is arranged in the call signaling route.This is because the supposition precondition of embodiment is: the user is monitored, but does not need the output communication content.So when user's bid, LI-AS is positioned at signalling route, and it is mutual to participate in call signaling.
Embodiment two, duplicating by transmission monitored data realization conversation Media Stream, that is to say, LI-AS carries monitored data in transferring to the message of LI-MGF, by the message parse monitored data of LI-MGF according to its reception, and according to this monitored data duplicate media stream.
When LI-AS uses the E2 of the system description among Fig. 5 and E3 interface or E1 interface to transmit monitored data, can relate to the expansion of SIP and the H.248 expansion of agreement.
When by expanding the H.248 monitored data bag of agreement, when making its monitored data that can carry the user, can adopt following extend type.
Monitored data package definition: (Lawful Interception Data Package)
PackageID:normal int (as 0xCE)
Properties:
●Monitored?Subscriber?Identifier:
PropertyID:SubscriberId(0x0001)
Description: definition is used for describing the User Identity of being correlated with by the eavesdropping target by eavesdropping target's User Identity " Monitored Subscriber Identifier ".
Type:string
Defined?in:Local?Control?descriptor
Characteristics:Read/Write
●Monitor?Type:
PropertyID:MonitorType(0x0002)
Description: definition is used for describing the current interception type by the eavesdropping target by the current interception type of eavesdropping target " Monitor Type ".The current monitoring of thinking that does not have explicit this attribute is neither needed to export Intercept related information, also do not need the output communication content.
Type:Enumeration
Possible?Values:
" None " (0x0000) do not have any output.
" IRI " (0x0001) only exports IRI.
" CC " (0x0002) only exports CC.
" Both " (0x0003) exports IRI and CC.
Default: " None " (0x0000) do not have any output.
Defined?in:Local?Control?descriptor
Characteristics:Read/Write
●DF2?Address:
PropertyID:DF2Address(0x0003)
Description: definition is used for describing the DF2 address of being exported by eavesdropping target's Intercept related information by the DF2 address " DF2 Address " that eavesdropping target IRI exports.
Type:string
Defined?in:Local?Control?descriptor
Characteristics:Read/Write
●DF3?Address:
PropertyID:DF3Address(0x0004)
Description: definition is used for describing the DF3 address of being exported by eavesdropping target's Content of Communication by the DF3 address " DF3 Address " that eavesdropping target CC exports.
Type:string
Defined?in:Local?Control?descriptor
Characteristics:Read/Write
Events:none
Statistics:none
Signals:none
Procedures:MGC can carry the monitored data bag and indicate this user to be monitored monitored data with current this user in any order.
SIP is being expanded, when making it carry monitored data, can realize the protocol extension of SIP by application type of expansion based on the XML form.XML message body can be following form:
Content-type:application/interception-data+xml
<?xml?version=″1.0″?>
<interception-data?xmlns=″urn:ietf:params:xml:ns:interception-data″
version=″0″state=″full″
entity=″sip:alice@example.com″>
<monitor?identity=″abcd@example.com″>
<type>both</type>
<df2addr>sip:df2@lea.com</df2addr>
<df3?addr>sip:df3@lea.com</df3?addr>
</monitor>
</interception-data>
In the above-mentioned XML message body, providing current is abcd@example.com by eavesdropping target's identify label, and providing the current user is monitored needs output IRI and CC.Simultaneously, the address that gives output IRI is df2@lea.com, and the address of output CC is df3@lea.com.
What deserves to be explained is that the above-mentioned H.248 monitored data bag of middle expansion, or XML message body that expands in the sip message all only are can use the mode of expansion to transmit relevant monitored data in order to illustrate in the interface protocol of existing architecture definition.The concrete field of definition and implication also need to have such some fields and data in the monitored data just to explanation in these expansions, and do not mean that monitored data must expand according to the mode that above provides.As when a user is monitored by a plurality of listening centers, can in monitored data, carry a plurality of listening centers simultaneously and monitor same user's data, at this moment, exist a plurality of listening centers to current by the different monitoring attribute of eavesdropping target, different DF2 OPADD and different DF3 OPADD, these can carry in same message body.
In interacting message, transmit monitored data, finish method that communicating data stream duplicates as shown in Figure 8 by LI-MGF.
Among Fig. 8, in step 1 to step 2, made a call as the calling party who calls out by the eavesdropping target.The session request of setting up arrives S-CSCF, and S-CSCF triggers Lawful Interception iFC, and the session request of setting up is routed to LI-AS.
, when judgement does not need to export by eavesdropping target's Content of Communication, directly will call out route and return S-CSCF at step 3A, LI-AS, and by S-CSCF call request be sent to the callee, and utilize existing call flow to finish this calling.
, when judgement needs output by eavesdropping target's Content of Communication, the session request of setting up is routed to LI-MGF, and in call request, carries by eavesdropping target's monitored data at step 3B, LI-AS by the XML message body of expanding.
Resolve and preserve monitored data in the XML message body in step 4 to step 7, LI-MGF, LI-MGF application session connection resource, and caller ip address and RTP port numbers in the SDP description in the session connection resource of the request for utilization replacement session foundation request, call out in the route oneself joining.LI-MGF returns to LI-AS with this session request of setting up then, by LI-AS this session request of setting up is back to S-CSCF, and the final callee of arrival of request is set up in this session.
Respond calling in step 8 to step 16, callee, response message 200 OK routes arrive LI-MGF, the session connection resource of LI-MGF request for utilization is replaced callee SDP description in the message, and response message sent to next-hop node, this response message finally arrives the calling party, like this, LI-MGF is arranged in and calls out the medium route.LI-MGF application Lawful Interception duplicate resource is duplicated the current talking Media Stream between calling party and the callee, and LI-MGF outputs to assigned address such as listening center receiver address according to the monitored data of its preservation with its conversation Media Stream that duplicates out.
In above-mentioned flow process, describe in the following way: LI-AS is when judging that current calling need be exported the intercept communications content, set up XML message body that carries expansion in the request in session, monitored data is passed to LI-MGF, LI-MGF preserves monitored data, and when called response is called out, duplicate the conversation medium and flow to appointment listening center receiver address.In above-mentioned flow process, LI-AS also can use the XML message body of expansion to carry monitored data in called response message, and monitored data is sent to LI-MGF.And, also can use H.248 agreement to transmit monitored data between LI-AS and the LI-MGF.LI-MGF resolves the monitored data of its reception, and duplicates the conversation Media Stream.
In above-mentioned flow process, there is the SIP interface between LI-AS and the LI-MGF, and uses the XML message body of in sip message, expanding to carry monitored data.In actual applications, LI-AS also can control LI-MGF indirectly by LI-MGCF, and transmits monitored data in signaling, and control LI-MGF duplicates the conversation Media Stream, and specific implementation process such as above-mentioned description are basic identical, are not described in detail at this.
Though described the present invention by embodiment, those of ordinary skills know, the present invention has many distortion and variation and do not break away from spirit of the present invention, and the claim of application documents of the present invention comprises these distortion and variation.

Claims (22)

1, realizes the system of Lawful Interception in a kind of next generation network, it is characterized in that described system comprises: the legal monitoring business application server LI-AS, the Lawful Interception medium gateway function LI-MGF that are provided with the Lawful Interception control module;
Lawful Interception control module among the LI-AS is when determining to monitor calling, the session request of setting up according to its reception will oneself join in the call signaling route, Lawful Interception control module among the LI-AS is controlled LI-MGF according to the call signaling that it receives, LI-MGF is joined in the medium route, LI-MGF duplicates the conversation Media Stream, and output.
2, realize the system of Lawful Interception in a kind of next generation network as claimed in claim 1, it is characterized in that described LI-MGF is positioned at by the home domain of eavesdropping target's home domain or arbitrary correspondent, and LI-MGF is the gateway of an IP to IP.
3, realize the system of Lawful Interception in a kind of next generation network as claimed in claim 1, it is characterized in that described LI-MGF is an independent function entity, or described LI-MGF is arranged among the LI-AS.
4, realize the system of Lawful Interception in a kind of next generation network as claimed in claim 3, it is characterized in that:
When described LI-MGF is independent function entity, there is interface between Lawful Interception control module among the described LI-AS and the LI-MGF, interface protocol comprises: H.248 agreement and/or Session initiation Protocol SIP;
When described LI-MGF is arranged among the LI-AS, adopt self-defining internal interface to connect between Lawful Interception control module among the described LI-AS and the LI-MGF.
5, as realizing the system of Lawful Interception in claim 1 or the 2 or 3 described a kind of next generation networks, it is characterized in that, be provided with between described LI-AS and the LI-MGF: Lawful Interception MGCF LI-MGCF;
Lawful Interception control module among the LI-AS joins in the medium route by LI-MGCF control LI-MGF.
6, realize the system of Lawful Interception in a kind of next generation network as claimed in claim 5, it is characterized in that described LI-MGCF is an independent function entity, or described LI-MGCF is arranged among the LI-AS or is arranged among the LI-MGF.
7, realize the system of Lawful Interception in a kind of next generation network as claimed in claim 6, it is characterized in that:
When described LI-MGCF is independent function entity, there is interface between Lawful Interception control module among the described LI-AS and the LI-MGCF, H.248 and/or SIP this interface protocol is:, H.248 and/or Session initiation Protocol SIP and have interface between described LI-MGF and the LI-MGCF, and interface protocol is:;
When described LI-MGCF is arranged among the LI-AS or be arranged among the LI-MGF, adopt self-defining internal interface to connect between Lawful Interception control module among the described LI-AS and the LI-MGCF or between LI-MGF and the LI-MGCF.
8, realize the method for Lawful Interception in a kind of next generation network, it is characterized in that, comprising:
A, LI-AS ask and will oneself join in the call signaling route according to the session foundation of its reception when determining to monitor calling;
B, LI-AS control LI-MGF according to the call signaling that it receives, and LI-MGF is joined in the medium route;
C, LI-MGF duplicate conversation Media Stream and output.
9, realize the method for Lawful Interception in a kind of next generation network as claimed in claim 8, it is characterized in that described step a comprises:
S-CSCF carries out the Lawful Interception initial filter criteria after receiving session foundation request, request message is set up in session routed to LI-AS;
LI-AS sets up request message according to the session of its reception and judges whether the needs monitoring;
If determine and to monitor, will oneself join in the call signaling route, and the session request of setting up is back to S-CSCF;
If determining does not need to monitor, directly the session request of setting up is back to S-CSCF.
10, realize the method for Lawful Interception in a kind of next generation network as claimed in claim 8, it is characterized in that described step b comprises:
LI-AS is in call establishment, to LI-MGF application session connection resource;
LI-AS makes LI-MGF set up IP address and the RTP port number information that the SDP in request and the call request corresponding message describes according to described session connection resource modifying session by control LI-MGF, and LI-MGF is joined in the medium route.
11, realize the method for Lawful Interception in a kind of next generation network as claimed in claim 8, it is characterized in that described step b comprises:
B1, LI-AS initiate the media redirection flow process by control LI-MGF LI-MGF are joined in the medium route behind call setup.
12, realize the method for Lawful Interception in a kind of next generation network as claimed in claim 8, it is characterized in that described step b comprises:
When b11, listening center determine to duplicate and to export by the current ongoing dialog context of eavesdropping target, transfer to LI-AS with carrying by the instruction of the output of eavesdropping target's identify label conversation Media Stream;
B12, LI-AS are obtained the encoding scheme that calling both sides is consulted according to its reception by eavesdropping target's identify label, and according to this encoding scheme to LI-MGF application session connection resource;
Make a call both sides' media redirection flow process of b13, LI-AS;
B14, LI-AS are after receiving the media redirection response message of calling both sides, and the conversation current according to described session connection resource modifying calling both sides connects, and LI-MGF is arrived in the conversation Media Stream tandem of calling both sides.
13, realize the method for Lawful Interception in a kind of next generation network as claimed in claim 12, it is characterized in that described step b11 comprises:
When listening center is determined to duplicate and to export by the current ongoing dialog context of eavesdropping target, the X1_1 instruction by ADMF will carry by the instruction of the output of eavesdropping target's identify label conversation Media Stream and transfer to LI-AS.
14, as realizing the method for Lawful Interception in the described a kind of next generation network of arbitrary claim in the claim 8 to 13, it is characterized in that described step b comprises:
LI-AS directly controls LI-MGF according to its call signaling that receives, and LI-MGF is joined in the medium route; Or
LI-AS controls LI-MGF according to its call signaling that receives indirectly by LI-MGCF, and LI-MGF is joined in the medium route.
15, realize the method for Lawful Interception in a kind of next generation network as claimed in claim 8, it is characterized in that described step c comprises:
The topological descriptor that c1, LI-AS will monitor media stream duplication transfers to LI-MGF;
C2, LI-MGF duplicate the conversation Media Stream according to the topological descriptor of the monitoring media stream duplication that it receives, and output.
16, realize the method for Lawful Interception in a kind of next generation network as claimed in claim 8, it is characterized in that described step c comprises:
LI-AS transfers to LI-MGF with user's monitored data;
LI-MGF duplicates the conversation Media Stream according to user's monitored data that it receives, and output.
17, as realizing the method for Lawful Interception in claim 15 or the 16 described a kind of next generation networks, it is characterized in that the topological descriptor of described monitoring media stream duplication or user's monitored data are carried among the SIP of the H.248 agreement of expansion and/or expansion and transfer to LI-MGF.
18, realize the method for Lawful Interception in a kind of next generation network as claimed in claim 17, it is characterized in that, described H.248 protocol extension is: the expansion of carrying monitored data is the monitored data bag H.248, described SIP expands to: XML message body of the topological descriptor of monitoring media stream duplication is carried in expansion, or XML message body of monitored data information is carried in expansion.
19, as realizing the method for Lawful Interception in the described a kind of next generation network of arbitrary claim in the claim 8 to 13, it is characterized in that described step c also comprises:
LI-AS submits functional entity DF3 to 3 passages and makes a call, and the conversation Media Stream that control LI-MGF will duplicate transfers to listening center by DF3.
20, a kind of network equipment with Lawful Interception medium gateway function is characterized in that, the described network equipment is arranged in the medium route of being conversed by the eavesdropping target, duplicates the conversation Media Stream, and output.
21, a kind of network equipment with Lawful Interception medium gateway function as claimed in claim 20 is characterized in that the described network equipment is positioned at by the home domain of eavesdropping target's home domain or arbitrary correspondent, and is the gateway of an IP to IP.
22, a kind of application server, it is characterized in that, be provided with the Lawful Interception control module in the described application server, this Lawful Interception control module is when determining to monitor calling, the session request of setting up according to its reception will oneself join in the call signaling route, the Lawful Interception control module is controlled LI-MGF according to the call signaling that it receives, and LI-MGF is joined in the medium route.
CNB2006100598294A 2006-01-23 2006-03-15 Realize system, the methods and applications server of Lawful Interception in the next generation network Expired - Fee Related CN100550784C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB2006100598294A CN100550784C (en) 2006-01-23 2006-03-15 Realize system, the methods and applications server of Lawful Interception in the next generation network
PCT/CN2006/002893 WO2007082435A1 (en) 2006-01-23 2006-10-30 A system, method and network equipment for implementing the lawful interception in next generation network

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN200610001744 2006-01-23
CN200610001744.0 2006-01-23
CNB2006100598294A CN100550784C (en) 2006-01-23 2006-03-15 Realize system, the methods and applications server of Lawful Interception in the next generation network

Publications (2)

Publication Number Publication Date
CN101009604A true CN101009604A (en) 2007-08-01
CN100550784C CN100550784C (en) 2009-10-14

Family

ID=38287246

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100598294A Expired - Fee Related CN100550784C (en) 2006-01-23 2006-03-15 Realize system, the methods and applications server of Lawful Interception in the next generation network

Country Status (2)

Country Link
CN (1) CN100550784C (en)
WO (1) WO2007082435A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008080335A1 (en) * 2006-12-31 2008-07-10 Huawei Technologies Co., Ltd. A lawful interception system, method and application server
CN101237660B (en) * 2008-02-28 2012-05-09 中兴通讯股份有限公司 A monitoring system and method for next generation network
WO2017063124A1 (en) * 2015-10-12 2017-04-20 华为技术有限公司 Interception method and related equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2003271736A1 (en) * 2003-04-09 2004-11-01 Telefonaktiebolaget Lm Ericsson (Publ) Lawful interception of multimedia calls
EP1528774A1 (en) * 2003-10-30 2005-05-04 Alcatel Method and system of providing lawful interception of calls
US20050152275A1 (en) * 2004-01-14 2005-07-14 Nokia Corporation Method, system, and network element for monitoring of both session content and signalling information in networks

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008080335A1 (en) * 2006-12-31 2008-07-10 Huawei Technologies Co., Ltd. A lawful interception system, method and application server
CN101237660B (en) * 2008-02-28 2012-05-09 中兴通讯股份有限公司 A monitoring system and method for next generation network
WO2017063124A1 (en) * 2015-10-12 2017-04-20 华为技术有限公司 Interception method and related equipment

Also Published As

Publication number Publication date
CN100550784C (en) 2009-10-14
WO2007082435A1 (en) 2007-07-26

Similar Documents

Publication Publication Date Title
CN101005409B (en) Method and system for realizing legal monitoring in nextgeneration network
US8599747B1 (en) Lawful interception of real time packet data
CN100531074C (en) Method and system for legally monitoring IP multimedia subsystem network
US8825875B2 (en) Session establishment in a communication network
CN101374256B (en) Method, apparatus and system processing session medium stream succession
US20080037533A1 (en) Methods, systems, and computer program products for associating independent legs of a call in a telecommunications network
CN101227272A (en) System and method for obtaining media stream protection cryptographic key
CN100455045C (en) One-to-one communication
CN101114985B (en) Coding/decoding transition system and method
CN100450024C (en) Method for monitoring multi-medium sub-system domain
CN101557603B (en) Method, device and system for lawful monitoring
CN101247440B (en) Method for implementing call switching service
CN100550784C (en) Realize system, the methods and applications server of Lawful Interception in the next generation network
US20100128718A1 (en) Supporting Method for REFER Message Expansion Parameter
CN101350742B (en) Method and system for implementing voice listen of next generation network
CN100583786C (en) Legal listening system, method, and application server
CN101330640B (en) Method for implementing call retention business of IP multimedia subsystem centralized business
CN100527727C (en) Method and system for duplicating medium flow in next-generation network
CN101141273B (en) Method of implementing session blind transferring service and conference service interaction
CN101800948B (en) Method, device and system for implementing call deflection service
CN101742448B (en) Method, device and system for realizing call forwarding service
WO2008080335A1 (en) A lawful interception system, method and application server
FI118711B (en) Improved use of parallel media flows
CN1926807A (en) Medium control method for realizing legal monitoring using soft exchanging system
WO2008131619A1 (en) Identifying method for business type

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091014