CN101022475B - Method, device and system for legal monitoring - Google Patents

Method, device and system for legal monitoring Download PDF

Info

Publication number
CN101022475B
CN101022475B CN2007100735864A CN200710073586A CN101022475B CN 101022475 B CN101022475 B CN 101022475B CN 2007100735864 A CN2007100735864 A CN 2007100735864A CN 200710073586 A CN200710073586 A CN 200710073586A CN 101022475 B CN101022475 B CN 101022475B
Authority
CN
China
Prior art keywords
lig
interface
pes
content
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007100735864A
Other languages
Chinese (zh)
Other versions
CN101022475A (en
Inventor
赵志洪
吴宏捷
方峻
刘新保
金黄哲
王更
张晓鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2007100735864A priority Critical patent/CN101022475B/en
Publication of CN101022475A publication Critical patent/CN101022475A/en
Application granted granted Critical
Publication of CN101022475B publication Critical patent/CN101022475B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A legal-monitoring method includes copying monitored communication content by using PESAS to control multimedia server MS and submitting copied communication content to legal-monitoring gate way LIG for realizing monitor on PSTN service in PES system. The monitoring system used for realizing said method is also disclosed.

Description

A kind of method of Lawful Interception, Apparatus and system
Technical field
The present invention relates to communication technical field, particularly the method for the Lawful Interception in the communication system, Apparatus and system.
Background technology
Lawful Interception is meant that (Law Enforcement Agency LEA), in order to hit purposes such as various forms crime and anti-terrorism, obtains the activity of intercept target telex network content to national law enforcement by network.Along with the raising of national governments, support that Lawful Interception has become one of requirement of the network equipment to the Lawful Interception attention degree.So TISPAN just begins its listen requirement and framework are studied after issue next generation network NGN relevant criterion.The NGN of TISPAN formulation at present monitors framework as shown in Figure 1.
The functional unit of network side comprises in this monitoring framework:
Lawful Interception management function (LEA Administration function, LEA AF): be responsible for configuration, the management of monitored data;
The mediating function unit (Lawful Interception Mediation Function, MF): be responsible for the information format on network side INI2 and the INI3 interface is fitted to the HI2 of LEA side and the information format on the HI3 interface;
Intercept related information-inner monitoring unit (Interception Related Internal InterceptionFunction, IRI-IIF): be responsible for transmitting Intercept related information (IRI), as call signaling, positional information etc. by the INI2 interface;
Content of Communication-inner monitoring unit (Content of communication Internal InterceptionFunction, CC-IIF): be responsible for by the INI3 interface transmit Content of Communication (Communication Content, CC);
The Content of Communication trigger element (Content of Communication Trigger Function, CCTF): be responsible for the monitored data on the configuration CC-IIF.
Interface in the framework comprises:
HI1/INI1a: be used to transmit managing configuration information, as activation, deexcitation and the modification etc. of intercept target;
INI2/HI2: be used to transmit and monitor relevant information, as call signaling, call state, positional information etc.;
INI3/HI3: interface is used for the transmission of call contents, as the speech coding in the conversation;
CCCI:CCTF is by the monitored data among this interface configuration CC-IIF, these configuration datas or come from AF (by the INI1b interface), or come from IRI-IIF (by the CCTI interface).
General general designation HI1/HI2/HI3 is the HI interface, and general designation INI1/INI2/INI3 is an internal interface.
On the other hand, proposition along with IP Multimedia System IMS technology, next generation network NGN has developed into a new stage, its main trend be move, fixed network merges on the basis of IMS core net IMS CoreNet, use the continuity of original business for PSTN/ISDN user before guaranteeing, TISPAN has defined a new subsystem on the basis of IMS Core Net: PSTN/ISDN Emulation Subsystem PES, come the original PSTN/ISDN network of emulation, ISDN/PSTN is provided service.This PES comprises PES application server PES AS, AGCF unit AGCF and access media gateway functional unit A-MGF, IMS core net IMS core net, media server MS etc.
In the prior art TISPAN draft agreement Lawful Interception of PES is finished the IRI-IIF function by AGCF and reported motoring gateway (Lawful Interception Gateway, LIG), A-MGF finishes the CC-IIF function, and report LIG, (LEMF also can be described as listening center Monitoring Center, and MC) it monitors framework as shown in Figure 2 to report LEMF after by LIG IRI and CC being integrated.
This monitoring framework realizes that the Lawful Interception scheme is:
1) intercept target is designated SIP-URI or TEL-URL;
2) by the IRI data (sip message) of configuration monitored data when obtaining the intercept target session on AGCF;
3) by the CC data (multimedia IP grouping) of configuration monitored data when obtaining the intercept target session on A-MGF;
4) HI interface or internal interface have adopted the interface format (information format on the INI2/HI2 interface is followed definition IRI form in the 3GPP TS 33.108IMS territory, and the form of INI3/HI3 interface is followed the CC form that defines in the 3GPP TS 33.108PS territory) of 3GPP TS 33.108.
By the Lawful Interception framework of above-mentioned prior art PES and scheme as can be seen: be to realize Lawful Interception, need all A-MGF to support the CC-IIF function, so just make the cost increase of whole framework; In addition, the PSTN service logic operates on the PES AS in the PES system, and prior art is only monitored by the IRI-IIF on the AGCF, can't reach the monitoring to some PSTN business information.
Summary of the invention
In view of this, be necessary to propose a kind of method, Apparatus and system of Lawful Interception, can be with the monitoring of lower cost realization to the PSTN business information of PES system.
Technical problem for the method that solves a kind of Lawful Interception of above-mentioned proposition, the embodiment of the invention provides a kind of method of Lawful Interception to comprise: PSTN/ISDN Emulation Subsystem application server PES AS provide INI2 interface to Lawful interception gateway LIG, described INI2 interface is based on the interface of IMS, perhaps based on the interface of non-IMS;
When the INI2 interface is based on the interface of IMS, PES AS is to the duplicating of sip message, and the sip message that duplicates as IRI message, with IRI information reporting LIG, is sent to listening center MC by LIG with IRI message, and carried out the parsing of sip message by MC; Perhaps
When the INI2 interface was based on the interface of non-IMS, this IRI message was made of the call event and the relevant parameter of ETSI definition, after this moment, PES AS resolved sip message, was mapped on the corresponding incident and parameter, and reported LIG;
PES AS control multimedia server MS duplicates the Content of Communication of monitoring users, and by the INI3 interface Content of Communication that duplicates is submitted to LIG, and described INI3 interface is based on the interface of IMS, perhaps based on the interface of non-IMS.
Be the technical problem of the method that solves a kind of Lawful Interception of above-mentioned proposition, the embodiment of the invention provides a kind of method of Lawful Interception to comprise:
PSTN/ISDN Emulation Subsystem application server PES AS reports Intercept related information IRI message to Lawful interception gateway LIG;
PES AS control multimedia server MS duplicates the Content of Communication of monitoring users, and the Content of Communication that duplicates is submitted to LIG;
AGCF unit AGCF reports to LIG and monitors IRI message.
Technical problem for the device that solves a kind of Lawful Interception of above-mentioned proposition, the embodiment of the invention provides a kind of PSTN/ISDN Emulation Subsystem application server PES AS, described PES AS provides INI2 interface to Lawful interception gateway LIG, described INI2 interface is based on the interface of IMS, perhaps based on the interface of non-IMS;
When the INI2 interface is based on the interface of IMS, described PES AS duplicates sip message, and the sip message that duplicates as IRI message, with IRI information reporting LIG, is sent to listening center MC by LIG with IRI message, and carried out the parsing of sip message by MC; Perhaps,
When the INI2 interface was based on the interface of non-IMS, this IRI message was made of the call event and the relevant parameter of ETSI definition, after described PES AS resolves sip message, was mapped on the corresponding incident and parameter, and reported LIG;
It comprises a media resource request unit, a control unit and an Intercept related information IRI information reporting unit, and this media resource request unit is used for media resource A, the B to multimedia server MS application calling subscriber and called subscriber; This control unit is used to control the Content of Communication that MS duplicates monitoring, and the Content of Communication that duplicates is submitted to Lawful interception gateway LIG; This IRI information reporting unit is used for reporting IRI message to LIG.
Be the technical problem of the device that solves a kind of Lawful Interception of above-mentioned proposition, the embodiment of the invention further provides a kind of multimedia server MS, and described MS is subjected to PES AS control to provide INI3 interface to Lawful interception gateway LIG;
When the INI3 interface was interface based on IMS, described MS was carried at Lawful Interception object identity LIOID and ICID in the Content of Communication that duplicates and sends to LIG;
When the INI3 interface was interface based on non-IMS, described MS was carried at call identification CIN in the Content of Communication that duplicates and sends LIG to;
It comprises media resource allocation units, a media resource copied cells and a transmitting element, and these media resource allocation units are used for being calling party's allocation medium resource A, B according to the request of PES AS; This media resource copied cells user duplicates according to media resource A, B allocation medium resource A ', B ' and to the Content of Communication of monitoring according to the request of PES AS; This transmitting element is used for connecting with LIG and/or sending the content of duplicating.
Technical problem for the system that solves a kind of Lawful Interception of above-mentioned proposition, the embodiment of the invention provides a kind of legal interception system, comprise a Lawful interception gateway LIG, a PSTN/ISDN Emulation Subsystem application server PES AS, an AGCF unit AGCF and a multimedia server MS, this PES AS is used for reporting Intercept related information IRI message to LIG, and control MS and duplicate the Content of Communication of monitoring, and the Content of Communication that duplicates is submitted to LIG; This AGCF is used for reporting IRI message to LIG; This MS is used to duplicate the Content of communciation of monitoring, and roing is submitted to LIG in the communication that will duplicate; This LIG is used to receive the Content of Communication message of duplicating that IRI message that this PES AS and AGCF report and MS report, and carries out the Content of Communication message that this IRI message and this report related.
Compared with prior art, the method of the Lawful Interception that the embodiment of the invention provides, MS duplicates the Content of Communication CC of monitoring by PES AS control multimedia server, and the CC that duplicates is submitted to LIG, realize monitoring with this to PSTN business information in the PES system, adopt the legal interception system of this legal listening method to need not the A-MGF participation simultaneously, avoided the support of A-MGF, reduced the cost of Lawful Interception the CC-IIF function.
Description of drawings
Fig. 1 monitors framework for the NGN that prior art TISPAN formulates;
Fig. 2 is the monitoring framework of prior art TISPAN to the Lawful Interception of PES;
Fig. 3 is the configuration schematic diagram of the network legal interception system of the embodiment of the invention;
Fig. 4 carries out related schematic diagram for the embodiment of the invention adopts ICID to IRI and CC;
Fig. 5 adopts ICID with CIN IRI and CC to be carried out related schematic diagram for the embodiment of the invention simultaneously;
Fig. 6 is the monitoring flow chart of the embodiment of the invention first execution mode;
Fig. 7 is the monitoring flow chart of the embodiment of the invention second execution mode;
Fig. 8 is the system schematic of the Lawful Interception framework of the embodiment of the invention.
Embodiment
The embodiment of the invention provides a kind of method, Apparatus and system of Lawful Interception scheme.For making technical scheme of the present invention clearer, below with reference to accompanying drawing and enumerate embodiment, the present invention is described in more detail.
The embodiment of the invention realizes the monitoring to the PSTN/ISDN service logic information by monitoring PES AS, and by the MS by PES AS control duplicate Business Stream be Content of Communication to LIG, flow process is as follows:
PSTN/ISDN Emulation Subsystem application server PES AS reports Intercept related information IRI message to Lawful interception gateway LIG;
PES AS control multimedia server MS duplicates the Content of Communication CC of monitoring, and the CC that duplicates is submitted to LIG.
The configuration of the network legal interception system of the embodiment of the invention connects by IMS-Core between PES AS and the AGCF as shown in Figure 3, and PES AS and AGCF provide INI2 interface to LIG respectively, reports the relevant information IRI message of monitoring users.Then finish data configurations such as intercept target between LIG and PES AS, the AGCF by the INI1a interface.Media server MS is controlled by PES AS, provides INI3 interface to LIG.Because the Content of Communication CC of monitoring users will monitor on MS and duplicate, so the Business Stream of monitoring users can pass through MS.The function that MS finishes can be regarded as the function that the media resource function MRF among the IMS finishes.
Embodiment of the invention INI1a, INI2 and INI3 support two kinds of interface formats: based on IMS's with based on non-IMS's.
For the INI2 interface, if the user is monitored data configurations such as (be finished between LIG and PES AS and the AGCF) intercept target, the sip message that AGCF, PES AS receive in miscellaneous service is handled (as Info/Subscribe/Notify/Refer/Message/Reinvite/Cancel/3xx/ 4xx/5xx/6xx etc.) all needs to report by the INI2 interface IRI message entity content of Intercept related information.When the INI2 interface was based on the interface of IMS, this IRI message entity mainly was that this IRI message sends to listening center MC by LIG to the duplicating of sip message, and was responsible for concrete SIP by MC and resolved.When INI2 interface during based on the interface of non-IMS, this IRI message entity is made of the call event (Establishment/Answer/Supplementary service/Handover/Release/SMS/Locationupdate/Subscriber controlled input) and the relevant parameter of ETSI definition, needs this moment PES AS and AGCF to resolve sip message and is mapped on the incident and parameter of correspondence.
For the INI3 interface, adopt and directly duplicate media mode, duplicating Business Stream by PES AS control MS is that Content of Communication is to LIG.Its basic process is: when the eavesdropping target calls out other users or during by other customer calls, directly by H.248 controlling MS allocation medium duplicate resource, instruct MS is submitted to LIG with the Content of Communication CC that duplicates by the INI3 interface to PES AS then.
After the IRI that monitors and CC delivered to LIG, LIG needed carry out association to these monitoring informations in the session of same intercept target.Association comprises two aspects: the one, and the association between the IRI of different network elements information, these IRI information may be repetitions, also might be that certain network element is exclusive, after delivering to LIG, LIG merges processing according to related information with them, delivers to listening center again; The 2nd, same network element IRI and CC's is related.
When adopting 3GPP TS 33.108 interface modes (promptly based on IMS interface mode), these two kinds of associations can realize that by the charging identifier ICID in IMS territory as shown in Figure 4, this implementation is identical with prior art one.Because MS does not also know ICID, so when adopting this interface, need PES AS ICID to be sent to MS by interface H.248, MS is carried at Lawful Interception object identity LIOID and ICID among the CC that duplicates and sends to LIG, AGCF and PES are carried at ICID in the IRI message that reports, and LIG carries out related with CC IRI according to ICID.
This moment, H.248 interface should carry parameter in the table one or other parameter of similar meaning.
Table one
Parameter name Implication
LIOID Legal prison institute object identity generally has corresponding relation at a monitoring users and LIID.
ICID IMS territory charging identifier.
When adopting ETSI DTS-LI-00030 interface format (being non-interface mode based on IMS), its IRI and the related of CC are realized by CIN.Because the definition of CIN and ICID is different, so in order to support ETSI DTS-LI-00030 interface, can make the IRI associating information of PES AS and AGCF again, this programme has adopted a kind of ICID that uses simultaneously to carry out related method with CIN, as shown in Figure 5, CIN is produced by PES AS, and guarantees the one-to-one relationship of this CIN and ICID, PES AS indicates CID to MS by interface H.248, and MS is carried at call identification CIN among the CC that duplicates and sends LIG to.Simultaneously, AGCF and PES are carried at ICID in the IRI message that reports.In the LIG side, IRI information is by the ICID parameter association in the IRI message, the related then CIN by carrying among IRI and the CC of IRI and CC.
At this moment, H.248 interface should carry parameter in the table two or other parameter of similar meaning.
Table two
Parameter name Implication
LIID The sign of intercept target.
NEID The sign of PES AS can be the address format of IP address or other LIG approval.
CIN Call identification number.
Order the parameter that issues in above-mentioned table one or the table two by Add in the embodiment of the invention, as
Add(normalinter`....lioid=123456789,icid=agcf001-20060920122030999)
Or
Add(normalinter`....liid=123456789,cin=30999,neid=10.144.18.18)
More than be after embodiment of the invention PES system Lawful Interception framework and LIG are received IRI, CC it to be carried out related simple declaration.Further describe below in conjunction with the Lawful Interception flow process of concrete scene the PES of the embodiment of the invention.
See also Fig. 6, be the Lawful Interception flow chart of first embodiment of the invention.User A inserts the PES network by AGCF in the present embodiment, and user B is an IP terminal.User A is monitoring users, and is the calling party.
It is as follows that it mainly monitors process step:
P1:AGCF receives the number reporting message of user A, carry out basic handling after, generate the ICID data, be encapsulated among the p-charge-vector, send out Invite message to IMS-Core, send IRI message to LIG simultaneously.
In this step,, mainly be the encapsulation of the message body of INVITE so in the IRI message if the interface that present embodiment adopts is the interface of 3GPP TS 33.108; If what present embodiment adopted is the ETSIDTS-LI-00030 interface, should comprise a call setup incident and relevant parameter so in the message.No matter which kind of interface all should comprise relevant parameter (ICID) in the IRI message.
P2:PES AS receives the INVITE of IMS-Core, handles the basic call section processes earlier, the content among the ICID among the record p-charge-vector.PES AS issues ADD message to MS, application calling subscriber (A) and called subscriber's (B) media resource.
After P3:PES AS received the response (Reply) of MS, the SDP parameter of A, the B of record application issued ADD message respectively to MS, applied for two media resources (A ' and B '), was used for duplicating the Content of Communication (comprising Media Stream) of user A and user B.
In this step, if present embodiment adopts the interface of 3GPP TS 33.108, H.248 interface should carry LIOID and ICID parameter.If present embodiment adopts ETSI DTS-LI-00030 interface, H.248 interface should carry network equipment sign NEID, LIID and CIN parameter.The far-end address of A ' and B ' should be IP address and the port numbers of LIG.
P4:MS receives the ADD message of PES AS, allocation medium resource A ' and B ', and write down corresponding relevant parameter, return Reply to PES AS.
After P5:PES AS received the response (Reply) of MS, the SDP parameter of A ', B ' that record distributes issued MODIFY message then, allows the end points of this A ' and B ' be connected with LIG.
After P6:MS receives the MODIFY message of PES AS, if udp protocol because of UDP is direct transmission packet, does not therefore produce actual connecting moves on network.If the use Transmission Control Protocol then can carry out being connected of TCP with LIG.At this moment, the passage of INI3 interface is set up successfully.Certainly, this step also can adopt other known technology.
When producing Content of Communication CC between user A, the B, A ' and B ' end points will duplicate Content of Communication CC, and a Content of Communication that duplicates is added that relevant parameter delivers to LIG.When adopting 3GPP TS
33.108 interface the time, relevant parameter comprises LIOID and ICID parameter.When adopting the ETSIDTS-LI-00030 interface, relevant parameter comprises NEID, LIID and CIN parameter.
P7:PES AS sends IRI message to LIG.
If adopt the interface of 3GPP TS 33.108, mainly be the encapsulation of the message body of INVITE in the IRI message so, and be with relevant parameter (ICID); If adopt ETSI DTS-LI-00030 interface, should comprise a call setup incident and related cells so in the message, and be with relevant parameter (ICID, CIN).
P8:PES AS if adopt the interface of 3GPP TS 33.108, reports IRI after receiving 180 called responses, should be the encapsulation of 180 message bodies in the IRI message so, and be with relevant parameter (ICID); If adopt ETSI DTS-LI-00030 interface, 180 message need not be handled so.
After P9:AGCF received called 180 responses, that describes among processing method and the P8 was the same.
P10:PES AS sends IRI message to LIG after receiving 200 called responses.
If adopt the interface of 3GPP TS 33.108, mainly be the encapsulation of 200 message bodies in the IRI message so, and be with relevant parameter (ICID); If adopt ETSI DTS-LI-00030 interface, should comprise one in the message so and reply incident and related cells, and be with relevant parameter (ICID, CIN).
After P11:AGCF receives 200 message of IMS-Core, send IRI message to LIG.
If adopt the interface of 3GPP TS 33.108, mainly be the encapsulation of 200 message body so in the IRI message, if adopt ETSI DTS-LI-00030 interface, should comprise one in the message so and reply incident and relevant parameter.No matter which kind of interface all should comprise relevant parameter (ICID) in the IRI message.
After P12:PES AS network element is received the caller ACK of IMS-Core,, send IRI message to LIG so, should be the encapsulation of ACK message body in the IRI message, and be with relevant parameter (ICID) if adopt the interface of 3GPP TS 33.108; If adopt ETSI DTS-LI-00030 interface, ACK message need not be handled so.
P13:AGCF receives the on-hook message of caller.Sending BYE message for IMS Core Net discharges.AGCF sends IRI message to LIG.
If adopt the interface of 3GPP TS 33.108, mainly be the encapsulation of the message body of BYE so in the IRI message, if adopt ETSI DTS-LI-00030 interface, should comprise a release event and relevant parameter so in the message.No matter which kind of interface all should comprise relevant parameter (ICID) in the IRI message.
P14:PES AS receives that the caller that IMS-Core comes discharges BYE message, and LIG sends IRI message.
If adopt the interface of 3GPP TS 33.108, mainly be the encapsulation of BYE message body in the IRI message so, and be with relevant parameter (ICID); If adopt ETSI DTS-LI-00030 interface, should comprise a release event and related cells so in the message, and be with relevant parameter (ICID, CIN).
P15:PES AS discharges the media resource of A, B, A ', B ' to SUBtract message under the MS.
After P16:MS receives SUBtract message, discharge the media resource of A, B, A ', B ', and if the INI3 interface between the LIG used the TCP connection, then can remove this connection, and return the Reply order to PES AS.
When user A is a monitoring users, and when being the callee, it monitors flow process and A is that calling party's monitoring flow process is identical, it is that user B makes a call earlier in this case that difference only is embodied in, PES AS receives the call information of user B by IMS Core Net prior to AGCF, therefore reporting AGCF receives the call information of user B and reports IRI message by IMS core before of its IRI message no longer repeat for monitoring flow process in this case.
See also Fig. 7, be the Lawful Interception flow chart of second embodiment of the invention.Present embodiment is an example of a divert when busy business, the callee is monitoring users A, inserts the PES network by AGCF, and calling subscriber B is an IP terminal, A is in busy condition when calling out A, and PES AS will forward another IP terminal A2 to according to prior business configuration before it.
Need to prove that in the present embodiment, MS is identical with the step among the embodiment one with the step that LIG sets up INI3 interface (CC) passage, so the process step that among Fig. 7 MS is participated in monitoring is not given unnecessary details; Same, because of user B to the Call Forwarding On Busy of user A to the user A2 its to monitor handling process identical with embodiment one, so equally the process step of this part monitoring is not given unnecessary details among Fig. 7.
Among this embodiment the main monitoring process step in the Call Forwarding On Busy process of user B is described in detail as follows:
P1:PES AS receives the INVITE of initiating the calling party A of process IMS-Core from user B, handles the basic call section processes earlier, and the content among the ICID among the record p-charge-vector is simultaneously to LIG transmission IRI message.
In the present embodiment,, mainly be the encapsulation of the message body of INVITE so in the IRI message if adopt the interface of 3GPP TS 33.108; If adopt ETSI DTS-LI-00030 interface, should comprise a call setup incident and relevant parameter so in the message.No matter which kind of interface all should comprise relevant parameter (ICID) in the IRI message.
P2:AGCF receives the next INVITE from IMS-Core, handles the basic call section processes earlier, and the content among the ICID among the record p-charge-vector is simultaneously to LIG transmission IRI message.
If adopt the interface of 3GPP TS 33.108, mainly be the encapsulation of the message body of INVITE so in the IRI message; If adopt ETSI DTS-LI-00030 interface, should comprise a call setup incident and relevant parameter so in the message.No matter which kind of interface all should comprise relevant parameter (ICID) in the IRI message.
P3:AGCF judges that by judging User Status or signaling exchange (DSS1) user A is busy, sends 486 responses to IMS Core Net.Send IRI message to LIG simultaneously.
If adopt the interface of 3GPP TS 33.108, mainly be the encapsulation of 486 response message bodies so in the IRI message; If adopt ETSI DTS-LI-00030 interface, should comprise a call release events and relevant parameter so in the message.No matter which kind of interface all should comprise relevant parameter (ICID) in the IRI message.
After P4:PES AS receives 486 responses, know that user A is busy, the subscription data during according to the user applies divert when busy, find should before the user A2 that forwards to.PES AS sends Invite message by IMS Core Net to user A2, sets up and calls out; Send 181 message by IMS Core Net to user B, divert when busy has taken place to inform that the calling subscriber calls out.Send IRI message to LIG simultaneously.
If adopt the interface of 3GPP TS 33.108, mainly be the encapsulation of Invite message and 181 message bodies so in the IRI message, if adopt ETSI DTS-LI-00030 interface, should comprise supplementary service (divert when busy) incident and relevant parameter so in the IRI message.No matter which kind of interface all should comprise relevant parameter (ICID) in the IRI message.
See also Fig. 8, in order to realize the method for above-mentioned Lawful Interception, the legal interception system of the invention process row comprises a LIG, a PES AS, an AGCF and a MS.
This PES AS is used for reporting IRI message to LIG, and controls MS and duplicate the Content of Communication CC of monitoring, and the CC that duplicates is submitted to LIG.It comprises a media resource request unit, a basic call processing unit, a control unit and an IRI information reporting unit, and this basic call processing unit is used for the basic call part of process user.This media resource request unit is used for the processing of user's basic call being applied for calling subscriber and called subscriber's media resource A, B to MS according to connecing the basic call processing unit.This control unit is used to control the Content of Communication CC that MS duplicates monitoring, and the CC that duplicates is submitted to LIG; This IRI information reporting unit is used for according to the basic call processing unit disposition of user's basic call being reported IRI message.This control unit comprises a media resource duplicate requests unit and connects control unit, this media resource duplicate requests unit is used for according to MS the media resource A of media resource request unit, the request responding of B, is used for capable media resource A ', the B ' that duplicates of Content of Communication to monitoring to the MS application; This connection control unit is used for according to the response of receiving MS, to the MS issuing message, requires A ', B ' end points are connected with LIG, and reports the CC that duplicates to deliver to LIG.
In order to support LIG with the IRI message and the CC association that report, when this system adopted interface mode based on IMS, this PES AS also comprised an ICID delivery unit (figure does not show), is used for sending ICID to MS.
When this system adopted interface mode based on IMS, this PES AS then comprised a CIN generation unit and CIN delivery unit (figure does not show), and this CIN generation unit is used for generating the CIN one to one with ICID; This CIN delivery unit is used for sending the CIN that this CIN generation unit is given birth to MS.
This AGCF is used for reporting IRI message to LIG.It comprises a basic call processing unit and an IRI information reporting unit.This basic call processing unit is used for the basic call of process user, and this IRI information reporting unit is used to report IRI message.
This MS is used to duplicate the Content of communciation CC of monitoring, and the CC that duplicates is submitted to LIG.It comprises media resource allocation units, a media resource copied cells and a transmitting element.These media resource allocation units are used for being calling party's allocation medium resource A, B according to the request of PES AS, and this media resource copied cells user duplicates according to media resource A, B allocation medium resource A ', B ' and to the CC of media resource A, B according to the request of PES AS; This transmitting element is used for connecting with LIG and/or sending the CC that duplicates.
This LIG is used to receive the CC message that IRI message that this PES AS and AGCF report and MS report, and carries out related with this CC message this IRI message.
The method of the Lawful Interception that the embodiment of the invention provides, MS duplicates the Content of Communication CC of monitoring by PES AS control multimedia server, and the CC that duplicates is submitted to LIG, realize monitoring with this to PSTN business information in the PES system, adopt the monitoring system of this legal listening method to need not the A-MGF participation simultaneously, reduced the support of A-MGF, reduced the cost of Lawful Interception the CC-IIF function.
More than to the method for a kind of Lawful Interception provided by the present invention and system thereof, device row detailed introduction, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used to help to understand disclosed technical scheme; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (15)

1. the method for a Lawful Interception is characterized in that, described method comprises:
PSTN/ISDN Emulation Subsystem application server PES AS provide INI2 interface to Lawful interception gateway LIG, and described INI2 interface is based on the interface of IMS, perhaps based on the interface of non-IMS;
When the INI2 interface is based on the interface of IMS, PES AS is to the duplicating of sip message, and the sip message that duplicates as IRI message, with IRI information reporting LIG, is sent to listening center MC by LIG with IRI message, and carried out the parsing of sip message by MC; Perhaps
When the INI2 interface was based on the interface of non-IMS, this IRI message was made of the call event and the relevant parameter of ETSI definition, after this moment, PES AS resolved sip message, was mapped on the corresponding incident and parameter, and reported LIG;
PES AS control multimedia server MS duplicates the Content of Communication of monitoring users, and by the INI3 interface Content of Communication that duplicates is submitted to LIG, and described INI3 interface is based on the interface of IMS, perhaps based on the interface of non-IMS.
2. the method for Lawful Interception according to claim 1 is characterized in that, PES AS control multimedia server MS duplicates the Content of Communication of monitoring, and the Content of Communication that duplicates is submitted to LIG comprises the steps:
PES AS is to MS application calling subscriber and called subscriber's media resource A, B;
After PES AS receives the response of MS, be used for media resource A ', B ' that the Content of Communication of monitoring is duplicated to MS application;
PES AS receives the response of MS, to the MS issuing message, requires A ', B ' end points are connected with LIG;
MS duplicates the Content of Communication of monitoring, and a Content of Communication that duplicates is delivered to LIG after receiving that PES AS requirement is carried out connection requests with A ', B ' end points and LIG.
3. the method for a Lawful Interception is characterized in that, described method comprises:
PSTN/ISDN Emulation Subsystem application server PES AS reports Intercept related information IRI message to Lawful interception gateway LIG;
PES AS control multimedia server MS duplicates the Content of Communication of monitoring users, and the Content of Communication that duplicates is submitted to LIG;
AGCF unit AGCF reports to LIG and monitors IRI message.
4. the method for Lawful Interception according to claim 3 is characterized in that, this method comprises that further the Content of Communication that IRI message and this are duplicated carries out related after LIG receives IRI message and the Content of Communication that duplicates.
5. the method for Lawful Interception according to claim 4 is characterized in that,
When INI2 interface and INI3 interface are interface based on IMS, this moment, PES AS was by sending to MS with ICID, MS is carried at Lawful Interception object identity LIOID and ICID in the Content of Communication that duplicates and sends to LIG, AGCF and PES are carried at ICID in the IRI message that reports, and LIG carries out related with the Content of Communication of monitoring IRI according to ICID; Perhaps
When INI2 interface and INI3 interface are interface based on non-IMS:
PES AS produces CIN, and this CIN and ICID are corresponding one by one;
PES AS is by indicating CIN to MS;
MS is carried at call identification CIN in the Content of Communication that duplicates and sends LIG to;
AGCF and PES AS are carried at ICID in the IRI message that reports;
LIG with IRI according to the ICID parameter association, IRI is related according to CIN with the Content of Communication that duplicates.
6. the method for Lawful Interception according to claim 5 is characterized in that, this method further comprises: before the user was monitored, LIG disposed monitored data on AGCF and PES.
7. PSTN/ISDN Emulation Subsystem application server PES AS, it comprises a media resource request unit, it is characterized in that, described PES AS provides INI2 interface to Lawful interception gateway LIG, described INI2 interface is based on the interface of IMS, perhaps based on the interface of non-IMS;
When the INI2 interface is based on the interface of IMS, described PES AS is to the duplicating of sip message, and the sip message that duplicates as IRI message, with IRI information reporting LIG, is sent to listening center MC by LIG with IRI message, and carried out the parsing of sip message by MC; Perhaps,
When the INI2 interface was based on the interface of non-IMS, this IRI message was made of the call event and the relevant parameter of ETSI definition, after described PES AS resolves sip message, was mapped on the corresponding incident and parameter, and reported LIG;
This PES AS also comprises a control unit and an Intercept related information IRI information reporting unit,
This media resource request unit is used for media resource A, the B to multimedia server MS application calling subscriber and called subscriber;
This control unit is used to control the Content of Communication that MS duplicates monitoring, and the Content of Communication that duplicates is submitted to Lawful interception gateway LIG;
This IRI information reporting unit is used for reporting IRI message to LIG.
8. PES AS according to claim 7 is characterized in that, this control unit comprises that a media resource duplicate requests unit and connects control unit,
This media resource duplicate requests unit is used for according to MS the media resource A of media resource request unit, the request responding of B, is used for capable media resource A ', the B ' that duplicates of Content of Communication to monitoring to the MS application;
This connection control unit is used for according to the response of receiving MS, to the MS issuing message, requires A ', B ' end points are connected with LIG, and reports the Content of Communication that duplicates to deliver to LIG.
9. PES AS according to claim 8 is characterized in that, this PES AS also comprises a charging identifier ICID delivery unit, is used for sending ICID to MS.
10. PES AS according to claim 8 is characterized in that, this PES AS also comprises a call identification CIN generation unit and CIN delivery unit,
This CIN generation unit is used for generating the CIN one to one with charging identifier ICID;
This CIN delivery unit is used for sending the CIN that this CIN generation unit is given birth to MS.
11. a multimedia server MS is characterized in that, described MS is subjected to PES AS control to provide INI3 interface to Lawful interception gateway LIG;
When the INI3 interface was interface based on IMS, described MS was carried at Lawful Interception object identity LIOID and ICID in the Content of Communication that duplicates and sends to LIG;
When the INI3 interface was interface based on non-IMS, described MS was carried at call identification CIN in the Content of Communication that duplicates and sends LIG to;
This MS comprises media resource allocation units, a media resource copied cells and a transmitting element,
These media resource allocation units are used for being calling party's allocation medium resource A, B according to the request of PES AS;
This media resource copied cells is used for request allocation medium resource A ', the B ' according to PES AS, so that the Content of Communication of monitoring is duplicated;
This transmitting element is used for connecting with LIG and/or sending the content of duplicating.
12. a legal interception system comprises a Lawful interception gateway LIG, it is characterized in that, this legal interception system also comprises a PSTN/ISDN Emulation Subsystem application server PES AS, an AGCF unit AGCF and a multimedia server MS,
This PES AS is used for reporting Intercept related information IRI message to LIG, and controls MS and duplicate the Content of Communication of monitoring, and the Content of Communication that duplicates is submitted to LIG;
This AGCF is used for reporting IRI message to LIG;
This MS is used to duplicate the Content of Communication of monitoring, and the Content of Communication that duplicates is submitted to LIG;
This LIG is used to receive the Content of Communication message of duplicating that IRI message that this PES AS and AGCF report and MS report, and carries out the Content of Communication message that this IRI message and this report related.
13. legal interception system as claimed in claim 12 is characterized in that, this PES AS comprises a media resource request unit, a control unit and an IRI information reporting unit,
This media resource request unit is used for media resource A, the B to MS application calling subscriber and called subscriber;
This control unit is used to control the Content of Communication that MS duplicates monitoring, and the Content of Communication that duplicates is submitted to LIG;
This IRI information reporting unit is used for reporting IRI message to LIG.
14. legal interception system as claimed in claim 12, it is characterized in that, this MS comprises media resource allocation units, these media resource allocation units are used for being calling party's allocation medium resource A, B according to the request of PES AS, it is characterized in that, this MS also comprises a media resource copied cells and a transmitting element
This media resource copied cells is used for duplicating according to media resource A, B allocation medium resource A ', B ' and to the Content of Communication of monitoring according to the request of PES AS;
This transmitting element is used for connecting with LIG and/or sending the Content of Communication that duplicates.
15. legal interception system as claimed in claim 12 is characterized in that,
Between this PES AS and this AGCF and the LIG INI2 interface is set, reports IRI message;
Between this MS and this LIG INI3 interface is set, reports the Content of Communication that duplicates;
This INI2 interface and INI3 interface are based on the interface of IMS, perhaps based on the interface of non-IMS.
CN2007100735864A 2007-03-16 2007-03-16 Method, device and system for legal monitoring Expired - Fee Related CN101022475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100735864A CN101022475B (en) 2007-03-16 2007-03-16 Method, device and system for legal monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100735864A CN101022475B (en) 2007-03-16 2007-03-16 Method, device and system for legal monitoring

Publications (2)

Publication Number Publication Date
CN101022475A CN101022475A (en) 2007-08-22
CN101022475B true CN101022475B (en) 2010-10-27

Family

ID=38710124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100735864A Expired - Fee Related CN101022475B (en) 2007-03-16 2007-03-16 Method, device and system for legal monitoring

Country Status (1)

Country Link
CN (1) CN101022475B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056102B (en) * 2009-10-30 2015-07-22 中兴通讯股份有限公司 Short message monitoring method and device thereof
CN102204235B (en) * 2011-05-25 2015-03-11 华为技术有限公司 Monitoring method,monitoring system and safe diverter equipment
CN105491567B (en) * 2014-09-18 2020-06-16 中兴通讯股份有限公司 Method and device for acquiring SIP signaling decryption parameters
CN105848141A (en) * 2016-03-17 2016-08-10 北京佰才邦技术有限公司 Monitoring method and device based on local unloading
CN111432075B (en) * 2020-03-12 2022-03-08 深圳震有科技股份有限公司 Voice call real-time monitoring method and device based on VOIP network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893476A (en) * 2005-11-28 2007-01-10 华为技术有限公司 Device for automatically testing and monitoring network gate characteristics

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1893476A (en) * 2005-11-28 2007-01-10 华为技术有限公司 Device for automatically testing and monitoring network gate characteristics

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
3GPP.3G Security
3GPP.3G Security;Lawful Interception Architecture and Functions.3GPP TS 33.107v4.3.0.2002,v4.3.01-57. *
ETSI.Lawful Interception (LI)
ETSI.Lawful Interception (LI);Handover interface for the lawfulinterception oftelecommunications traffic.ETSI ES 201 671V2.1.1.2001,V2.1.1全文. *
ETSI.Lawful Interception(LI)
ETSI.Lawful Interception(LI);Interception domain ArchitectureforIPnetworks.ETSI TR 102 528v1.1.1.2006,v1.1.11-38. *
Handover interface for the lawfulinterception oftelecommunications traffic.ETSI ES 201 671V2.1.1.2001,V2.1.1全文.
Interception domain ArchitectureforIPnetworks.ETSI TR 102 528v1.1.1.2006,v1.1.11-38.
Lawful Interception Architecture and Functions.3GPP TS 33.107v4.3.0.2002,v4.3.01-57.

Also Published As

Publication number Publication date
CN101022475A (en) 2007-08-22

Similar Documents

Publication Publication Date Title
US10721276B2 (en) Providing SIP signaling data for third party surveillance
EP2522122B1 (en) Lawful call interception support in packet cable network
US8223927B2 (en) Lawful interception of non-local subscribers
CN100531074C (en) Method and system for legally monitoring IP multimedia subsystem network
CN101189849B (en) Lawful interception method and architecture for transparent transmission of interception information
US20090088139A1 (en) Method, network unit and system for providing subscriber information of a group call to an interception unit
CN102238500B (en) Method and system for forwarding calls safely
CN101022475B (en) Method, device and system for legal monitoring
CN101141761A (en) Monitoring method, system and device
CN101217600A (en) A method and device of inquiring transferring operations
CN101179458B (en) Method to implement calling present service of multimedia information
WO2009097032A1 (en) Managing call delivery in an internet protocol communication system
CN101286951B (en) Session preemption method
CN101175230A (en) System, device and method for user service data management
CN106254692B (en) Multi-service control processor co-group response method and device and service control processor
CN101459731B (en) Method, system and server for intelligent service monitoring
CN100583786C (en) Legal listening system, method, and application server
CN101267318A (en) A method for indicating and realizing associated billing of related message
CN101267428B (en) A method for indication and prevention in related message
WO2007104225A1 (en) A method, device and system for optimizing call back service in communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101027

Termination date: 20130316