WO2005107159A1 - A media control method for realizing the lawful interception by using the soft-switch system - Google Patents

A media control method for realizing the lawful interception by using the soft-switch system Download PDF

Info

Publication number
WO2005107159A1
WO2005107159A1 PCT/CN2004/000431 CN2004000431W WO2005107159A1 WO 2005107159 A1 WO2005107159 A1 WO 2005107159A1 CN 2004000431 W CN2004000431 W CN 2004000431W WO 2005107159 A1 WO2005107159 A1 WO 2005107159A1
Authority
WO
WIPO (PCT)
Prior art keywords
endpoint
shadow
monitored
uplink
downlink
Prior art date
Application number
PCT/CN2004/000431
Other languages
French (fr)
Chinese (zh)
Inventor
Wei Xu
Yan Tang
Xiaoxia Jiang
Original Assignee
Utstarcom Telecom Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Utstarcom Telecom Co., Ltd. filed Critical Utstarcom Telecom Co., Ltd.
Priority to PCT/CN2004/000431 priority Critical patent/WO2005107159A1/en
Priority to CNB2004800424304A priority patent/CN100461715C/en
Publication of WO2005107159A1 publication Critical patent/WO2005107159A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]

Definitions

  • the present invention relates to a related technology of a media networking model of a legal monitoring function in a communication network, and in particular, to a method for legal monitoring of media control in a soft switching system. Background technique
  • Legal interception refers to the requirement that telecommunication operators track and monitor the traffic and non-traffic activities of specific users in real time through user settings according to certain legal procedures.
  • the monitoring content includes the user's location information, power on / off information, call status information, short message sending / receiving content, call content, data communication, and fax content.
  • Softswitch technology is the core technology of the Next Generation Network (NGN). It separates call signaling control and media bearers in traditional switches, and connects and communicates between entities through standard protocols. Call control is separated.
  • the media bearer access, resource control, and management are implemented by the entity MGW (Media Gateway), and the control of the media in the CallServer (call server) is implemented by the entity MGC (Media Gateway Controller).
  • MGW Media Gateway
  • MGC Media Gateway Controller
  • the control interface between the media gateway controller and the media gateway uses standard protocol standards, such as the media gateway control protocol proposed by the IETF (Internet Engineering Task Force): the Media Gateway Control Protocol (MGCP) and the media gateway control developed by the ITU-T Protocol H.248 / Megaco protocol.
  • MGC Media Gateway Controller
  • MGW Media Gateway
  • FIG. 1 shows the situation where calling user A and called user B are on different gateways.
  • the calling context in which calling user A is located (Call Context) 1 includes an intermediate endpoint TA
  • the call context 2 where the called user B is located includes an intermediate endpoint TB, and these intermediate endpoints constitute a path.
  • calling user A is monitored, that is, in the case where calling user A is the monitored user, the endpoint TA of the monitored user and the endpoint TB of the call user and the legal monitoring endpoint Tm corresponding to the monitoring center are bridged to a conference bridge in conference context 3.
  • the mixing function of the conference bridge is used to monitor the media stream after the voices of the monitored user A and his call user B are mixed.
  • this networking method is simple, this method changes the networking mode of the monitored call, which affects the media control process of the original ordinary call, and turns the original ordinary call into a multi-party call based on the conference bridge. Operations for ordinary endpoints have become operations for listening to endpoints on the conference bridge.
  • the media connection operation for each supplementary service will send different media connection commands as the user is being monitored, forming different media networking models. Such changes will make the media control quite complicated and impossible. accept. Summary of the invention
  • the present invention proposes a media control method for monitoring service implementation. Based on the concept of "shadow endpoint", the monitoring call is attached to the basic call.
  • the "upstream shadow endpoint” and “downlink shadow endpoint” The topological connection between the monitoring object and the call object, so as to obtain the upstream and downstream media streams of the monitored object, and then 1
  • the "up and down shadow endpoints of the monitored object" and the circuit of the monitoring center are bridged into a conference bridge, and the mixing function of the conference bridge is used to monitor the media stream after the voice mixing of the monitored user and his callee.
  • the networking mode does not change the media topology connection and media control process of any original ordinary calls.
  • a media control method for implementing legal interception including the following steps:
  • the uplink media stream and downlink media stream of the monitored object are mixed on the conference bridge through the IP streams of the upstream shadow endpoint and the downstream shadow endpoint, respectively, thereby implementing the monitoring function of the monitored endpoint.
  • a media control method including the following steps:
  • the Megaco command Mod is used to disconnect the bidirectional topology connection between the uplink shadow endpoint and the peer endpoint of the monitored endpoint;
  • the Megaco command Mod is used to disconnect the bidirectional topology connection between the downstream shadow endpoint and the monitored endpoint.
  • Figure 1 is a traditional legal monitoring network model diagram
  • Figure 2 is a media control diagram in a media gateway
  • FIG. 3 is a network model diagram of a legal monitoring media network according to the present invention.
  • FIG. 4 is a flowchart of basic call monitoring media control. detailed description
  • Figure 2 is a media control diagram in a media gateway.
  • the media control involved in the present invention uses a soft switching architecture, and call signaling is separated from media control.
  • MGC Media Gateway Control
  • MG Media Gateway
  • MGC Media Gateway Control
  • MG Media Gateway
  • Megaco h.248
  • a series of standard messages Additional messages and standard message packages defined by Megaco are used to implement the media networking model described below.
  • the termination is the generation and / or termination of the media stream
  • the context is a set of interconnected series of endpoints. There can be multiple associated endpoints in a context, and this association can be demonstrated by different topological relationships between the endpoints.
  • the method proposed by the present invention makes use of this, and adds auxiliary "shadows" and "endpoints" in the context of the original call, and utilizes the one-way topological connection between the corresponding endpoints and the media bearer of the cause call to implement the monitoring function
  • MGC's media flow control for endpoints includes modification of endpoint media bearer attributes and modification of topology connection relationships between endpoints.
  • the endpoint media bearer attribute refers to the media stream sending and receiving attributes of the endpoint, including: SendOnly (receive only), ReceiveOnly (receive only), SendReceive (receive), Inactive (not available), Loop (loopback).
  • the topology connection refers to the transmission direction of the media stream between two endpoints, including: OneWay (unidirectional), BothWay (bidirectional), Isolate (no media connection).
  • the call monitoring media control networking model of the present invention makes full use of these two standard media control methods to change the media connection of the endpoints in the MG.
  • FIG. 3 shows a network model of a legal monitoring media network according to the present invention.
  • the calling user A initiates a call from its endpoint TA to the endpoint TB of the called user B.
  • the situation shown in FIG. 3 is the case where the calling user A and the called user B are at different gateways, and the calling user A
  • the call context 1 in which it is located includes the peer endpoint TA
  • the call context 2 in which the called user B is located includes the peer endpoints TB,, endpoints TA, and TB, which are all intermediate endpoints constituting the path.
  • Uplink shadow endpoints" UpT and " The downstream shadow endpoint "DownT” and the legal interception endpoint Tm corresponding to the monitoring center (not shown) are bridged to a conference bridge where the conference context 3 is located. In this way, the upstream media stream and downstream media stream of the monitored user respectively pass the "upstream shadow endpoint"
  • the IP streams of UpT and "Down Shadow Endpoint” DownT are mixed on the conference bridge, so that the monitoring function of endpoint TA is implemented.
  • the "uplink shadow endpoint" UpT and “downlink shadow endpoint” DownT and all auxiliary IP points on the conference bridge and the monitoring endpoint Tm are attached to the monitored endpoint TA and have a master-slave relationship with the monitored endpoint TA. This must be saved in the MGC Kind of relationship.
  • FIG. 4 is a flowchart of the media control corresponding to the monitoring of ordinary calls according to the present invention.
  • the media control steps are:
  • an auxiliary "upstream shadow endpoint" UpT is added to the context 1 corresponding to the monitored endpoint where the monitored user A is located, which is used to monitor the upstream media stream of the monitored user A.
  • the endpoints in the newly added context are bidirectional topology connections with other endpoints.
  • the Megaco command Add adds an auxiliary IP point in the context where the endpoint Tm is located and assigns the remote IP as the endpoint T3.
  • the Megaco command Mod is used to disconnect the possible two-way topological connection between the "uplink shadow endpoint" UpT and the opposite endpoint TA of the endpoint TA to avoid possible crosstalk.
  • the networking model must ensure that call monitoring does not fail due to the impact of these services.
  • call monitoring is a limited set of media control processes for these services, with the set element being 2. In this way, the media control process of monitoring will not be increased due to the increase of services.
  • This implementation method has good versatility and scalability.
  • Endpoint TA changes, delete shadow endpoints UpT and DownT, and add endpoints UpT and DownT to the new endpoint TA context, change the conference bridge and The remote information of the corresponding IP point disconnects the topology connection between the endpoint TA and the endpoint DownT, disconnects the topology connection between the endpoint TA and the endpoint UpT.
  • CH CH, CW, user 110, user A initiated MPT Y can be classified as media control process.
  • the call monitoring media control of the present invention is implemented in the following manner: A user initiates a call from one endpoint to another endpoint. After the call is successfully established, the originating or accepting endpoint is monitored, and the corresponding "uplink shadow endpoint" and “downlink shadow endpoint” are added to the context of the monitored endpoint.
  • the "uplink shadow endpoint” and “downlink shadow endpoint” are IP endpoints with a media bearer attribute of SendOnly.
  • the "uplink shadow endpoint” has only a two-way topology connection with the monitored endpoint; the "downlink shadow endpoint” only has the monitored endpoint.
  • the peer endpoint has a bidirectional Topology connection.
  • the shadow endpoint, and all auxiliary DP points on the conference bridge and the listening endpoint are attached to the monitored endpoint and have a master-slave relationship with the monitored endpoint. This relationship must be saved in the MGC.
  • the above-mentioned media control method for legal monitoring intercepts the copying of the media stream and networking occurs after both the calling party and the called party are successfully established.
  • the method includes the following processing principles:

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Monitoring And Testing Of Exchanges (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A media control method for realizing the lawful interception includes the following steps : establish the up-shadow-termination corresponding to the intercepted termination in the context of the intercepted termination of the intercepted object, the up-shadow-termination is used to audit the up media flow of the intercepted object ; establish the down-shadow-termination corresponding to the opposite termination in the context of the opposite termination of the intercepted termination, the down-shadow-termination is used to audit the down media flow of the intercepted object ; and bridge the up-shadow-termination, the down-shadow-termination and intercepting termination corresponding to the interception center to the same conference bridge, wherein the up media flow and the down media flow of the intercepted object is mixed on the conference bridge through the up-shadow-termination and the down-shadow-termination. So the present invention realizes the interception function to the intercepted termination.

Description

T N2004/000431  T N2004 / 000431
采用软交换体系实现 Implemented with a softswitch system
合法监昕的媒体控制方法 技术领域  Media control method for legal surveillance
本发明涉及通信网络中的合法监听功能的媒体连网模型的有 关技术, 特别涉及一种软交换体系下合法监听媒体控制的方法。 背景技术  The present invention relates to a related technology of a media networking model of a legal monitoring function in a communication network, and in particular, to a method for legal monitoring of media control in a soft switching system. Background technique
合法监听是指依据一定的合法程序要求电信运营商通过用户 设置对特定用户的话务和非话务活动进行实时的跟踪和监听。 监 听内容包括用户的位置信息,开关机信息, 呼叫状态信息,短消息 收发内容,通话的内容,数据通信,收发传真内容等。 随着通信技术 的不断发展, 越来越多的电信运营商要求系统具有这种合法监听 的功能。  Legal interception refers to the requirement that telecommunication operators track and monitor the traffic and non-traffic activities of specific users in real time through user settings according to certain legal procedures. The monitoring content includes the user's location information, power on / off information, call status information, short message sending / receiving content, call content, data communication, and fax content. With the continuous development of communication technology, more and more telecommunications operators require the system to have this function of legal interception.
软交换技术是下一代网络(NGN ) 的核心技术, 它通过将传 统交换机中的呼叫信令控制和媒体承载相分离, 并且各实体之间 通过标准的协议进行连接和通信, 从而实现了业务于呼叫控制相 分离。 媒体承载接入、 资源控制及管理由实体 MGW (媒体网 关) 实现, CallServer (呼叫服务器) 中对于媒体的控制由实体 MGC (媒体网关控制器) 实现。 媒体网关控制器与媒体网关之间 的控制接口使用标准协议标准, 例如由 IETF (互联网工程任务 组)提出的媒体网关控制协议: 媒体网关控制协议(MGCP ) 以 及由 ITU-T制定的媒体网关控制协议 H.248/ Megaco协议。  Softswitch technology is the core technology of the Next Generation Network (NGN). It separates call signaling control and media bearers in traditional switches, and connects and communicates between entities through standard protocols. Call control is separated. The media bearer access, resource control, and management are implemented by the entity MGW (Media Gateway), and the control of the media in the CallServer (call server) is implemented by the entity MGC (Media Gateway Controller). The control interface between the media gateway controller and the media gateway uses standard protocol standards, such as the media gateway control protocol proposed by the IETF (Internet Engineering Task Force): the Media Gateway Control Protocol (MGCP) and the media gateway control developed by the ITU-T Protocol H.248 / Megaco protocol.
3GPP (第三代合作项目 ) 的技术规范 TS33.107-Lawful Interception Architecture and Functions 中对合法监听的各功能 实体有了详细的描述, 因此, CallServer 中媒体控制的联网模型 即 DF3功能的实现方案是合法监听功能实现的关键技术。 我们可 N2004/000431 The technical specifications of 3GPP (Third Generation Partnership Project) TS33.107-Lawful Interception Architecture and Functions have detailed descriptions of the functional entities that are legally intercepted. Therefore, the implementation scheme of the DF3 function, the media control networking model in CallServer is Key technologies for legal interception. We can N2004 / 000431
以在软交换的体系下通过 MGC (媒体网关控制器) 和 MGW (媒体网关) 间标准的接口协议实现一定的媒体联网, 从而在不 改变呼叫信令控制,使用标准媒体网关的前提下实现呼叫监听业 务。 To achieve certain media networking through the standard interface protocol between MGC (Media Gateway Controller) and MGW (Media Gateway) under the softswitch system, so that calls can be implemented without changing the call signaling control and using standard media gateways Listening to business.
一种最简单易行的媒体连网方法是采用本地会议桥的连网方 式, 如图 1所示。 呼叫用户 A从其端点 TA处发起呼叫到被叫用 户 B的端点 TB, 图 1所示情况为呼叫用户 A和被叫用户 B在不 同的网关的情况, 其中呼叫用户 A 所在的呼叫上下文 ( Call Context ) 1包括中间端点 TA,, 被叫用户 B所在的呼叫上下文 2 包括中间端点 TB,, 这些中间端点构成通路。 当呼叫用户 A被监 听, 即呼叫用户 A为被监听用户的情况下, 被监听用户的端点 TA及其通话用户的端点 TB 以及监听中心对应的合法监听端点 Tm桥接到会议上下文 3的一个会议桥中, 利用会议桥的混音功 能监听被监听用户 A和其通话用户 B的话音混音后的媒体流。 这 种连网方式虽然简单, 但是这种方式改变了被监听呼叫的连网模 式, 从而影响了原来普通呼叫的媒体控制流程, 使原来的普通呼 叫变成了基于会议桥的多方通话, 各种针对普通端点的操作变成 了针对监听会议桥上端点的操作.。 并且, 这样对每一种补充业务 的媒体连接操作会随着用户是否被监听而发送不同的媒体连接命 令, 形成不同的媒体組网模型, 这样的改动会使媒体控制变的相 当的复杂而无法接受。 发明内容  One of the most simple and easy media networking methods is to use the local conference bridge networking method, as shown in Figure 1. Calling user A initiates a call from its endpoint TA to endpoint TB of called user B. Figure 1 shows the situation where calling user A and called user B are on different gateways. The calling context in which calling user A is located (Call Context) 1 includes an intermediate endpoint TA, and the call context 2 where the called user B is located includes an intermediate endpoint TB, and these intermediate endpoints constitute a path. When calling user A is monitored, that is, in the case where calling user A is the monitored user, the endpoint TA of the monitored user and the endpoint TB of the call user and the legal monitoring endpoint Tm corresponding to the monitoring center are bridged to a conference bridge in conference context 3. In the middle, the mixing function of the conference bridge is used to monitor the media stream after the voices of the monitored user A and his call user B are mixed. Although this networking method is simple, this method changes the networking mode of the monitored call, which affects the media control process of the original ordinary call, and turns the original ordinary call into a multi-party call based on the conference bridge. Operations for ordinary endpoints have become operations for listening to endpoints on the conference bridge. In addition, in this way, the media connection operation for each supplementary service will send different media connection commands as the user is being monitored, forming different media networking models. Such changes will make the media control quite complicated and impossible. accept. Summary of the invention
针对上述问题, 本发明提出了一种监听业务实现的媒体控制 方法, 它基于 "影子端点"的概念, 使监听呼叫附着于基本的呼 叫, 通过"上行影子端点 "和"下行影子端点"与被监听对象和通话 对象的拓朴连接, 从而分别获得被监听对象的上下行媒体流, 再 1 In view of the above problems, the present invention proposes a media control method for monitoring service implementation. Based on the concept of "shadow endpoint", the monitoring call is attached to the basic call. The "upstream shadow endpoint" and "downlink shadow endpoint" The topological connection between the monitoring object and the call object, so as to obtain the upstream and downstream media streams of the monitored object, and then 1
将被监听对象的 "上下行影子端点,,以及监听中心的电路桥接到一 个会议桥中, 利用会议桥的混音功能监听被监听用户和其通话对 象的话音混音后的媒体流。 这种连网方式不改变任何原有普通呼 叫的媒体拓朴连接以及媒体控制流程。 The "up and down shadow endpoints of the monitored object" and the circuit of the monitoring center are bridged into a conference bridge, and the mixing function of the conference bridge is used to monitor the media stream after the voice mixing of the monitored user and his callee. The networking mode does not change the media topology connection and media control process of any original ordinary calls.
根据本发明的另一个方面, 提供了一种实现合法监听的媒体控制 方法, 包含以下的步骤: According to another aspect of the present invention, a media control method for implementing legal interception is provided, including the following steps:
1 ) 在被监听对象的被监听端点所在的上下文中建立与所述 被监听端点对应的上行影子端点, 所述上行影子端点用来旁听被 监听对象的上行媒体流;  1) establishing an uplink shadow endpoint corresponding to the monitored endpoint in the context of the monitored endpoint of the monitored object, where the uplink shadow endpoint is used to listen to the uplink media stream of the monitored object;
2 ) 在所述被监听端点的对端端点的上下文中建立与所述对 端端点对应的下行影子端点, 所述下行影子端点用来旁听被监听 对象的下行媒体流; 以及  2) establishing a downlink shadow endpoint corresponding to the peer endpoint in the context of the peer endpoint of the monitored endpoint, where the downlink shadow endpoint is used to listen to the downlink media stream of the monitored object; and
3 ) 将所述上行影子端点与下行影子端点及与监听中心对应 的监听端点桥接至同一会议桥,  3) bridging the uplink shadow endpoint with the downlink shadow endpoint and the listening endpoint corresponding to the listening center to the same conference bridge,
其中被监听对象的上行媒体流和下行媒体流分别通过所述上 行影子端点和下行影子端点的 IP流在会议桥上混音, 由此实现对 被监听端点的监听功能。  The uplink media stream and downlink media stream of the monitored object are mixed on the conference bridge through the IP streams of the upstream shadow endpoint and the downstream shadow endpoint, respectively, thereby implementing the monitoring function of the monitored endpoint.
根据本发明的一个方面, 提供了一种媒体控制方法, 包括以下的 步骤: According to an aspect of the present invention, a media control method is provided, including the following steps:
1 )通过 Megaco命令 Add, 在一个新的上下文中建立与监 听呼叫媒体承载对应的监听端点;  1) Use the Megaco command Add to establish a listening endpoint corresponding to the monitored call media bearer in a new context;
2 )通过 Megaco命令 Add, 在被监听对象所在的被监听端点 对应的上下文中增加辅助上行影子端点, 它用来旁听被监听对象 的上行媒体流;  2) Through the Megaco command Add, add an auxiliary uplink shadow endpoint to the context corresponding to the monitored endpoint where the monitored object is located, which is used to listen to the upstream media stream of the monitored object;
3 )通过 Megaco命令 Add, 在被监听对象所在的被监听端点 对应的上下文中增加辅助下行影子端点, 它用来旁听被监听对象 的下行媒体流; 31 3) Via the Megaco command Add, add an auxiliary downlink shadow endpoint to the context corresponding to the monitored endpoint where the monitored object is located, which is used to listen to the downstream media stream of the monitored object; 31
4 )通过 Megaco命令 Add建立一个三方会议桥, 包括用于 向外提供服务的第一端点、 第二端点和第三端点; 4) Establish a three-party conference bridge through the Megaco command Add, including a first endpoint, a second endpoint, and a third endpoint for providing services to the outside;
5 )通过 Megaco命令 Add在监听端点所在的上下文增加一 个辅助 IP点并配远端 IP为第三端点;  5) Use the Megaco command Add to add a secondary IP point in the context of the listening endpoint and configure the remote IP as the third endpoint;
6 )通过 Megaco命令 Mod分别将上行影子端点和下行影子 端点的远端 IP配为第一端点和第二端点;  6) Use the Megaco command Mod to configure the remote IP of the uplink shadow endpoint and the downlink shadow endpoint as the first endpoint and the second endpoint, respectively;
7 )通过 Megaco命令 Mod, 断开上行影子端点和被监听端点 的对端端点的双向拓朴连接;  7) The Megaco command Mod is used to disconnect the bidirectional topology connection between the uplink shadow endpoint and the peer endpoint of the monitored endpoint;
8) 通过 Megaco命令 Mod, 断开下行影子端点和被监听端点 的双向拓朴连接。  8) The Megaco command Mod is used to disconnect the bidirectional topology connection between the downstream shadow endpoint and the monitored endpoint.
通过参照附图的以下的详细说明将会明了本发明的上述和其 它目的、 特征、 各方面和优点。 附图说明  The above and other objects, features, aspects and advantages of the present invention will be made clear by the following detailed description with reference to the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS
以下附图提供本发明的进一步理解, 构成说明书的一部分, 说明本发明的实施例, 与文字说明一起解释本发明原理。  The following drawings provide a further understanding of the present invention, constitute a part of the description, illustrate embodiments of the present invention, and explain the principles of the present invention together with the text description.
图 1为传统的合法监听网络模型图;  Figure 1 is a traditional legal monitoring network model diagram;
图 2为媒体网关中的媒体控制图;  Figure 2 is a media control diagram in a media gateway;
图 3为本发明的合法监听媒体网络联网模型图;  FIG. 3 is a network model diagram of a legal monitoring media network according to the present invention; FIG.
图 4为基本呼叫监听媒体控制流程图。 具体实施方式  Figure 4 is a flowchart of basic call monitoring media control. detailed description
下面根据附图, 具体描述本发明的具体实施方式。  Hereinafter, specific embodiments of the present invention will be described in detail based on the drawings.
图 2为媒体网关中的媒体控制图。  Figure 2 is a media control diagram in a media gateway.
如图 2所示, 本发明所涉及的媒体控制采用软交换构架, 呼 叫信令与媒体控制相分离。 MGC (媒体网关控制) 实现媒体建立 的控制, MG (媒体网关) 实现具体的承载建立和资源管理控 1 As shown in FIG. 2, the media control involved in the present invention uses a soft switching architecture, and call signaling is separated from media control. MGC (Media Gateway Control) implements control of media establishment, MG (Media Gateway) implements specific bearer establishment and resource management control 1
制。 system.
MGC (媒体网关控制)对于 MG (媒体网关) 的控制遵从标 准的 ITU— T的协议 Megaco ( h.248 ) 。 通过 Megaco所定义的 一系列标准消息 (Add、 Subtract Modify ) 和标准消息包实现 后述的媒体联网模型。  MGC (Media Gateway Control) controls MG (Media Gateway) in accordance with the standard ITU-T protocol Megaco (h.248). A series of standard messages (Add, Subtract Modify) and standard message packages defined by Megaco are used to implement the media networking model described below.
其中, 端点 (Termination ) 为媒体流的产生和(或)终结; 上下文(Context ) 为相互关联的一系列端点的集合。 一个上下文 中可以有多个相关联的端点, 这种关联可以通过端点间的不同拓 朴关系来表证。 本发明提出的方法利用这一点, 在原有呼叫的上 下文中增加了辅助的 "影子,,端点, 利用其和原因呼叫的媒体承载 对应的端点间的单向拓朴连接, 从而实现监听功能  Among them, the termination (Termination) is the generation and / or termination of the media stream; the context (Context) is a set of interconnected series of endpoints. There can be multiple associated endpoints in a context, and this association can be demonstrated by different topological relationships between the endpoints. The method proposed by the present invention makes use of this, and adds auxiliary "shadows" and "endpoints" in the context of the original call, and utilizes the one-way topological connection between the corresponding endpoints and the media bearer of the cause call to implement the monitoring function
根据 h.248协议描述, MGC对于端点的媒体流控制包括对于 端点媒体承载属性的修改和端点间拓朴连接关系的修改。  According to the h.248 protocol description, MGC's media flow control for endpoints includes modification of endpoint media bearer attributes and modification of topology connection relationships between endpoints.
端点媒体承载属性是指端点的媒体流收发属性, 包括: SendOnly (只发) 、 ReceiveOnly (只收) 、 SendReceive (收 发 ) 、 Inactive (不可用) 、 Loop (回环) 。  The endpoint media bearer attribute refers to the media stream sending and receiving attributes of the endpoint, including: SendOnly (receive only), ReceiveOnly (receive only), SendReceive (receive), Inactive (not available), Loop (loopback).
拓朴连接指的是两个端点之间媒体流的传输方向, 包括: OneWay (单向) 、 BothWay (双向) 、 Isolate (没有媒体连 接) 。  The topology connection refers to the transmission direction of the media stream between two endpoints, including: OneWay (unidirectional), BothWay (bidirectional), Isolate (no media connection).
本发明的呼叫监听媒体控制连网模型就是充分利用了这两种 标准的媒体控制方式来改变 MG中端点的媒体连接。  The call monitoring media control networking model of the present invention makes full use of these two standard media control methods to change the media connection of the endpoints in the MG.
图 3示出了本发明的合法监听媒体网络联网模型图。  FIG. 3 shows a network model of a legal monitoring media network according to the present invention.
如图 3所示, 呼叫用户 A从其端点 TA处发起呼叫到被叫用 户 B的端点 TB, 图 3所示情况为呼叫用户 A和被叫用户 B在不 同的网关的情况, 其中呼叫用户 A所在的呼叫上下文 1包括对端 端点 TA,, 被叫用户 B所在的呼叫上下文 2包括对端端点 TB,, 端点 TA,、 TB,均为构成通路的中间端点。 当呼叫用户 A被监 听, 即呼叫用户 A为被监听用户, 被监听端点为 TA的情况下, 在呼叫用户 A所在的上下文(Context ) 1中增加其端点 TA对应 的"上行影子端点 "UpT和其对端端点 TA,对应的"下行影子端 点" DownT, "上行影子端点" UpT和"下行影子端点 "DownT是 IP 端点, 并且媒体承载属性为 SendOnly (只发) 。 "上行影子端 点" UpT只与被监听端点 TA有双向的拓朴连接; "下行影子端 点,, DownT只与对端端点 TA,有双向的拓朴连接。 分别将"上行影 子端点 "UpT和"下行影子端点 "DownT和监听中心 (未示出)对 应的合法监听端点 Tm桥接到会议上下文 3所在的一个会议桥。 这样, 被监听用户的上行媒体流和下行媒体流分别通过"上行影子 端点" UpT和"下行影子端点 "DownT的 IP流在会议桥上混音, 这 样就实现了对端点 TA的监听功能。 As shown in FIG. 3, the calling user A initiates a call from its endpoint TA to the endpoint TB of the called user B. The situation shown in FIG. 3 is the case where the calling user A and the called user B are at different gateways, and the calling user A The call context 1 in which it is located includes the peer endpoint TA, and the call context 2 in which the called user B is located includes the peer endpoints TB,, endpoints TA, and TB, which are all intermediate endpoints constituting the path. When calling user A is monitored Listening, that is, if the calling user A is a monitored user and the monitored endpoint is TA, the "uplink shadow endpoint" UpT corresponding to its endpoint TA and its peer endpoint TA are added to the context (Context) 1 where the calling user A is located. The corresponding "downlink shadow endpoint" DownT, "uplink shadow endpoint" UpT and "downlink shadow endpoint" DownT are IP endpoints, and the media bearer attribute is SendOnly (send only). "Up Shadow Endpoint" UpT only has a two-way topology connection with the monitored endpoint TA; "Down Shadow Endpoint, DownT only has a two-way topology connection with the peer endpoint TA. Uplink shadow endpoints" UpT and " The downstream shadow endpoint "DownT" and the legal interception endpoint Tm corresponding to the monitoring center (not shown) are bridged to a conference bridge where the conference context 3 is located. In this way, the upstream media stream and downstream media stream of the monitored user respectively pass the "upstream shadow endpoint" The IP streams of UpT and "Down Shadow Endpoint" DownT are mixed on the conference bridge, so that the monitoring function of endpoint TA is implemented.
"上行影子端点" UpT和"下行影子端点 "DownT和所有会议 桥上的辅助 IP点以及监听端点 Tm都依附于被监听端点 TA, 并 且与被监听端点 TA存在主从关系, MGC中必须保存这种关系。  The "uplink shadow endpoint" UpT and "downlink shadow endpoint" DownT and all auxiliary IP points on the conference bridge and the monitoring endpoint Tm are attached to the monitored endpoint TA and have a master-slave relationship with the monitored endpoint TA. This must be saved in the MGC Kind of relationship.
上面以呼叫用户为被监听对象为例进行了说明。 本领域的技 术人员应当理解, 也可以被叫用户为监听对象进行监听。  The above description is made by taking the calling user as the monitored object as an example. Those skilled in the art should understand that the called user can also be monitored as the monitoring object.
图 4所示为本发明对普通呼叫实现监听所对应的媒体控制流 程图。 该媒体控制步骤为:  FIG. 4 is a flowchart of the media control corresponding to the monitoring of ordinary calls according to the present invention. The media control steps are:
1 )通过 Megaco命令 Add, 在一个新的上下文($ ) 中建立 与监听呼叫媒体承载对应的监听端点 Tm。  1) Through the Megaco command Add, a monitoring endpoint Tm corresponding to the monitoring call media bearer is established in a new context ($).
2 )通过 Megaco命令 Add, 在被监听用户 A所在的被监听 端点对应的上下文 1 中增加辅助 "上行影子端点" UpT, 它用来 旁听被监听用户 A的上行媒体流。 (缺省的, 新加入的上下文中 的端点与其他的端点间是双向的拓朴连接)  2) Through the Megaco command Add, an auxiliary "upstream shadow endpoint" UpT is added to the context 1 corresponding to the monitored endpoint where the monitored user A is located, which is used to monitor the upstream media stream of the monitored user A. (By default, the endpoints in the newly added context are bidirectional topology connections with other endpoints.)
3 )通过 Megaco命令 Add, 在¾ ^听用户 A所在的被监听 端点对应的上下文 1 中增加辅助 "下行影子端点" DownT, 它用 来旁听被监听用户 A的下行媒体流。 3) Via the Megaco command Add, add the auxiliary "downstream shadow endpoint" DownT to context 1 corresponding to the monitored endpoint where user A is located, which uses Come and listen to the downstream media stream of the monitored user A.
4 )通过 Megaco命令 Add建立一个三方会议桥, 其包括端 点 T1 (第一端点) 、 端点 T2 (第二端点)和端点 T3 (第三端 点) , 这些端点为会议桥向外提供服务的端点。  4) Establish a three-party conference bridge through the Megaco command Add, which includes endpoint T1 (first endpoint), endpoint T2 (second endpoint), and endpoint T3 (third endpoint). These endpoints provide endpoints for the conference bridge to provide services to the outside. .
5 )通过 Megaco命令 Add在监听端点 Tm所在的上下文增 加一个辅助 IP点并配远端 IP为端点 T3。  5) The Megaco command Add adds an auxiliary IP point in the context where the endpoint Tm is located and assigns the remote IP as the endpoint T3.
6 )通过 Megaco命令 Mod分别将影子端点 UpT和 DownT 的远端 IP配为端点 T1和端点 T2。  6) Use the Megaco command Mod to configure the remote IPs of the shadow endpoints UpT and DownT as endpoints T1 and T2, respectively.
7 )通过 Megaco命令 Mod, 断开 "上行影子端点" UpT和 端点 TA的对端端点 TA,之间的可能产生的双向拓朴连接, 以避 免可能的串扰。  7) The Megaco command Mod is used to disconnect the possible two-way topological connection between the "uplink shadow endpoint" UpT and the opposite endpoint TA of the endpoint TA to avoid possible crosstalk.
8) 通过 Megaco命令 Mod, 断开 "下行影子端点" DownT 和被监听用户端点 TA之间的可能产生的双向拓朴连接, 以避免 可能的串扰。  8) Using the Megaco command Mod, disconnect the possible two-way topology connection between the "downlink shadow endpoint" DownT and the monitored user endpoint TA to avoid possible crosstalk.
由于被监听用户可能做各种业务, 例如呼叫前转、 多呼、 MPTY等, 联网模型要保证呼叫监听不受这些业务的影响而失 败。 在采用软交换体系的本发明得联网模型下, 不仅保证了这一 点, 而且呼叫监听对于这些业务的媒体控制流程是一个有限的集 合, 集合的元素为 2。 这样, 不会因为业务的增加而增加监听的 媒体控制流程, 这种实现方法有很好的通用性和可扩展性。  Since the monitored user may perform various services, such as call forwarding, multi-call, MPTY, etc., the networking model must ensure that call monitoring does not fail due to the impact of these services. Under the networking model of the present invention using a softswitch system, this is not only ensured, but call monitoring is a limited set of media control processes for these services, with the set element being 2. In this way, the media control process of monitoring will not be increased due to the increase of services. This implementation method has good versatility and scalability.
分析图 3所示的连网模型, 无论用户 A做何种业务, 只可能 有两种结果: 端点 TA发生变化, 端点 TA,发生变化。 因此, 我 们可以针对这两种变化定义两个媒体控制流程来实现监听连接网 络的重建。 定义集合《。  Analyzing the network model shown in Figure 3, no matter what kind of service the user A does, there are only two possible results: the endpoint TA changes, and the endpoint TA changes. Therefore, we can define two media control processes for these two changes to realize the reconstruction of the listening connection network. Definition set ".
a = {Cl 3C2} a = {C l 3 C 2 }
Q : 端点 TA变化, 删除影子端点 UpT和 DownT, 并在新 的端点 TA上下文中增加端点 UpT和 DownT, 改变会议桥上与 之对应的 IP点的远端信息, 断开端点 TA和端点 DownT间的拓 朴连接, 断开端点 TA,和端点 UpT间的拓朴连接。 Q: Endpoint TA changes, delete shadow endpoints UpT and DownT, and add endpoints UpT and DownT to the new endpoint TA context, change the conference bridge and The remote information of the corresponding IP point disconnects the topology connection between the endpoint TA and the endpoint DownT, disconnects the topology connection between the endpoint TA and the endpoint UpT.
C2 : 端点 TA, 变化, 断开新的端点 TA' 和端点 UpT间的拓 朴连接。 C 2 : End point TA, change, disconnect the topology connection between the new end point TA 'and the end point UpT.
可以分析一下一般的业务: CH、 CW、 用户 的110、 用户 A发起 MPT Y都可以归为媒体控制流程 。  Can analyze the general business: CH, CW, user 110, user A initiated MPT Y can be classified as media control process.
呼叫前转、 用户 B Call Retrieve, 用户 B的 HO, 用户 A参 加 MPTY都可以归为媒体控制流程 C2Call forwarding, user B's Call Retrieve, user B's HO, and user A's participation in MPTY can be classified as media control process C 2 .
因此, 本发明所述及的这种解决呼叫监听的媒体控制实现方 法  Therefore, the media control implementation method for solving call monitoring described in the present invention
1 ) 满足了合法监听功能的要求。  1) The requirements of the legal monitoring function are met.
2 ) 采用软交换体系结构, 呼叫控制与媒体控制分离, 为 实现呼叫监听业务而增加的媒体控制流程的不影响原有的呼叫信 令控制, 并且也不改变原有普通呼叫的媒体拓朴连接以及媒体控 制流程。  2) Adopting a softswitch architecture, call control is separated from media control, and the media control process added to implement the call monitoring service does not affect the original call signaling control, and does not change the original media connection of the original call. And media control processes.
3 ) 媒体控制 (MGC ) 与媒体网关 (MGW ) 间的接口遵 从标准的 Megaco ( h.248 )协议。  3) The interface between the Media Control (MGC) and the Media Gateway (MGW) complies with the standard Megaco (h.248) protocol.
4 ) 当被监听用户进行各种业务操作时, 对这种监听媒体 控制的影响是有限的, 可以通过一个有限集合的媒体控制操作使 得监听不受被监听用户业务的影响。  4) When the monitored user performs various business operations, the impact on this type of monitoring media control is limited, and a limited set of media control operations can be used to prevent the monitoring from being affected by the monitored user's business.
因此, 如上所述, 本发明的呼叫监听媒体控制是通过如下的 方式实现的: 用户从一个端点发起对另一端点的呼叫。 呼叫建立 成功后, 对发起呼叫或接受呼叫端点进行监听, 在被监听端点的 上下文中增加与其对应的"上行影子端点 "和"下行影子端点"。 所 述的"上行影子端点 "和"下行影子端点 "为媒体承载属性为 SendOnly的 IP端点, "上行影子端点"只与被监听端点有双向的 拓朴连接; "下行影子端点"只与被监听端点的对端端点有双向的 拓朴连接。 分别将 "影子端点"和与监听中心对应的监听端点桥接 到一个会议桥。 这样, 被监听用户的上行媒体流和下行媒体流分 别通过 "上行影子端点"和"下行影子端点 "的 IP流在会议桥上混 音, 就实现了端点监听的功能。 Therefore, as mentioned above, the call monitoring media control of the present invention is implemented in the following manner: A user initiates a call from one endpoint to another endpoint. After the call is successfully established, the originating or accepting endpoint is monitored, and the corresponding "uplink shadow endpoint" and "downlink shadow endpoint" are added to the context of the monitored endpoint. The "uplink shadow endpoint" and "downlink shadow endpoint" are IP endpoints with a media bearer attribute of SendOnly. The "uplink shadow endpoint" has only a two-way topology connection with the monitored endpoint; the "downlink shadow endpoint" only has the monitored endpoint. The peer endpoint has a bidirectional Topology connection. Bridge the "shadow endpoint" and the listening endpoint corresponding to the listening center to a conference bridge, respectively. In this way, the uplink media stream and downlink media stream of the monitored user are mixed on the conference bridge through the IP streams of the "upstream shadow endpoint" and the "downlink shadow endpoint" respectively, thereby achieving the function of endpoint monitoring.
"影子端点,,和所有会议桥上的辅助 DP点以及监听端点都依附 于被监听端点, 并且与被监听端点存在主从关系, MGC 中必须 保存这种关系。  "The shadow endpoint, and all auxiliary DP points on the conference bridge and the listening endpoint are attached to the monitored endpoint and have a master-slave relationship with the monitored endpoint. This relationship must be saved in the MGC.
上述的实现合法监听的媒体控制方法监听媒体流的复制和联 网发生在主被叫都建立成功后。  The above-mentioned media control method for legal monitoring intercepts the copying of the media stream and networking occurs after both the calling party and the called party are successfully established.
除此之外, 该方法还包括以下的处理原则:  In addition, the method includes the following processing principles:
当删除监听端点时 (如停止监听) , 必须删除所有的 "影子 端点" 和所有会议桥上的辅助 IP点; 当删除被监听端点 (如被监 听用户挂机) , 需要删除所有的 "影子端点" 和所有会议桥上的 辅助 IP点以及监听端点; 当被监听端点改变 (如用户进行多呼或 者切换) 时, 重建"上行影子端点 "和"下行影子端点", 并改变会 议桥上 IP点的远端属性; 对被监听端点的对端端点改变(如对端 用户呼叫前转) , 需要断开 "上行影子端点" 与被监听对端端点 的拓朴连接。  When deleting the monitoring endpoint (such as stopping monitoring), you must delete all "shadow endpoints" and all auxiliary IP points on the conference bridge; when deleting the monitored endpoint (such as monitored user hanging up), you need to delete all "shadow endpoints" And the auxiliary IP points and monitoring endpoints on all conference bridges; when the monitored endpoint changes (such as a user making multiple calls or switching), reconstruct the "uplink shadow endpoint" and "downlink shadow endpoint" and change the IP points on the conference bridge. Remote attributes; For changes to the peer endpoint of the monitored endpoint (such as call forwarding by the peer user), it is necessary to disconnect the topology connection between the "uplink shadow endpoint" and the monitored peer endpoint.
上述说明描述了本发明的合法监听的媒体控制方法, 但是本 发明的范围并不局限于这里表示和说明的具体细节和典型实施 例。 根据上述说明及附图和权利要求, 本领域的技术人员应当理 解在不脱离由下述权利要求和它们的等同所限定的本发明的精神 和范围的情况下, 可对其做出各种改变、 修改和变化。  The above description describes the lawful monitoring media control method of the present invention, but the scope of the present invention is not limited to the specific details and typical embodiments shown and described herein. Based on the above description and the drawings and claims, those skilled in the art should understand that various changes can be made thereto without departing from the spirit and scope of the invention as defined by the following claims and their equivalents. , Modifications and changes.

Claims

权 利 要 求 Rights request
1. 一种实现合法监听的媒体控制方法, 包含以下的步骤: 1. A media control method for implementing legal interception, comprising the following steps:
1 ) 在被监听对象的被监听端点所在的上下文中建立与所述 被监听端点对应的上行影子端点, 所述上行影子端点用来旁听被 监听对象的上行媒体流;  1) establishing an uplink shadow endpoint corresponding to the monitored endpoint in the context of the monitored endpoint of the monitored object, where the uplink shadow endpoint is used to listen to the uplink media stream of the monitored object;
2 ) 在所述被监听端点的对端端点的上下文中建立与所述对 端端点对应的下行影子端点, 所述下行影子端点用来旁听被监听 对象的下行媒体流; 以及  2) establishing a downlink shadow endpoint corresponding to the peer endpoint in the context of the peer endpoint of the monitored endpoint, where the downlink shadow endpoint is used to listen to the downlink media stream of the monitored object; and
3 ) 将所述上行影子端点与下行影子端点及与监听中心对应 的监听端点桥接至同一会议桥,  3) bridging the uplink shadow endpoint with the downlink shadow endpoint and the listening endpoint corresponding to the listening center to the same conference bridge,
其中被监听对象的上行媒体流和下行媒体流分别通过所述上 行影子端点和下行影子端点的 IP流在会议桥上混音, 由此实现对 被监听端点的监听功能。  The uplink media stream and downlink media stream of the monitored object are mixed on the conference bridge through the IP streams of the upstream shadow endpoint and the downstream shadow endpoint, respectively, thereby implementing the monitoring function of the monitored endpoint.
2. 如权利要求 1所述的方法, 其特征在于: 所述上行影子端点 和下行影子端点为属性为 sendonly的 IP端点。  2. The method according to claim 1, wherein: the uplink shadow endpoint and the downlink shadow endpoint are IP endpoints with an attribute of sendonly.
3. 如权利要求 1或 2所述的方法, 其中所述上行影子端点与所 述被监听端点拓朴相连, 所述下行影子端点与被监听端点的对端 端点拓朴相连。  3. The method according to claim 1 or 2, wherein the uplink shadow endpoint is connected to the monitored endpoint topology, and the downlink shadow endpoint is connected to the peer endpoint topology of the monitored endpoint.
4. 如权利要求 1所述的方法, 其中媒体流的复制和联网监听在 主被叫建立成功后进行。  4. The method according to claim 1, wherein the copying and network monitoring of the media stream are performed after the calling party and the called party are successfully established.
5. 如权利要求 1所述的方法, 还包括: 断开被监听端点和下行 影子端点间的拓朴连接, 以及断开被监听端点的对端端点和上行 影子端点间的拓朴连接。  5. The method according to claim 1, further comprising: disconnecting the topology connection between the monitored endpoint and the downstream shadow endpoint, and disconnecting the topology connection between the peer endpoint of the monitored endpoint and the upstream shadow endpoint.
6. 如权利要求 1所述的方法, 还包括: 当被监听端点改变时, 在新的被监听端点重建上行影子端点和下行影子端点。  6. The method according to claim 1, further comprising: when the monitored endpoint changes, reconstructing the uplink shadow endpoint and the downlink shadow endpoint at the new monitored endpoint.
7. 如权利要求 6所述的方法, 其中在新的被监听端点重建上行 影子端点和下行影子端点还包括: 改变会议桥上与所述影子端点 对应的 IP点的远端信息。 7. The method according to claim 6, wherein the uplink is reestablished at the new monitored endpoint The shadow endpoint and the downlink shadow endpoint further include: changing remote information of an IP point corresponding to the shadow endpoint on the conference bridge.
8. 如权利要求 7所述的方法, 其中还包括: 在改变会议桥上与 所述影子端点对应的 IP点的远端信息之后, 断开被监听端点和下 行影子端点间的拓朴连接, 以及断开被监听端点的对端端点和上 行影子端点间的拓朴连接。  8. The method according to claim 7, further comprising: after changing the remote information of the IP point corresponding to the shadow endpoint on the conference bridge, disconnecting the topology connection between the monitored endpoint and the downstream shadow endpoint, And disconnect the topological connection between the peer endpoint of the monitored endpoint and the upstream shadow endpoint.
9. 如权利要求 1所述的方法, 还包括:. 当 听端点的对端端 点改变时, 断开上行影子端点与被监听端点的对端端点的拓朴连 接。  9. The method according to claim 1, further comprising: disconnecting the topology connection between the uplink shadow endpoint and the peer endpoint of the monitored endpoint when the peer endpoint of the listening endpoint changes.
10. 一种媒体控制方法, 包括以下的步骤:  10. A media control method, comprising the following steps:
1 )通过 Megaco命令 Add, 在一个新的上下文中建立与监 听呼叫媒体承载对应的监听端点;  1) Use the Megaco command Add to establish a listening endpoint corresponding to the monitored call media bearer in a new context;
2 )通过 Megaco命令 Add, 在被监听对象所在的被监听端点 对应的上下文中增加辅助上行影子端点, 它用来旁听被监听对象 的上行媒体流;  2) Through the Megaco command Add, add an auxiliary uplink shadow endpoint to the context corresponding to the monitored endpoint where the monitored object is located, which is used to listen to the upstream media stream of the monitored object;
3 )通过 Megaco命令 Add, 在被监听对象所在的被监听端点 对应的上下文中增加辅助下行影子端点, 它用来旁听被监听对象 的下行媒体流;  3) Through the Megaco command Add, add an auxiliary downlink shadow endpoint in the context corresponding to the monitored endpoint where the monitored object is located, which is used to listen to the downstream media stream of the monitored object;
4 )通过 Megaco命令 Add建立一个三方会议桥, 包括用于 向外提供服务的第一端点、 笫二端点和第三端点;  4) Establish a three-party conference bridge through the Megaco command Add, including a first endpoint, a second endpoint, and a third endpoint for providing services to the outside;
5 )通过 Megaco命令 Add在监听端点所在的上下文增加一 个辅助 IP点并配远端 IP为笫三端点;  5) Use the Megaco command Add to add a secondary IP point in the context of the listening endpoint and assign the remote IP as the third endpoint;
6 )通过 Megaco命令 Mod分别将上行影子端点和下行影子 端点的远端 IP配为第一端点和第二端点;  6) Use the Megaco command Mod to configure the remote IP of the uplink shadow endpoint and the downlink shadow endpoint as the first endpoint and the second endpoint, respectively;
7 )通过 Megaco命令 Mod, 断开上行影子端点和被监听端点 的对端端点的双向拓朴连接;  7) The Megaco command Mod is used to disconnect the bidirectional topology connection between the uplink shadow endpoint and the peer endpoint of the monitored endpoint;
8) 通过 Megaco命令 Mod, 断开下行影子端点和被监听端点 的双向拓朴连接。 8) Disconnect the downstream shadow endpoint and the monitored endpoint through the Megaco command Mod Bidirectional topology connection.
11. 如权利要求 10所述的方法, 其特征在于: 所述上行影子端 点和下行影子端点为属性为 sendonly的 IP端点。  11. The method according to claim 10, wherein: the uplink shadow endpoint and the downlink shadow endpoint are IP endpoints with an attribute of sendonly.
12. 如权利要求 10所述的方法, 还包括: 被监听端点改变时, 在新的被监听端点重建上行影子端点和下行影子端点。  12. The method according to claim 10, further comprising: when the monitored endpoint changes, reconstructing the uplink shadow endpoint and the downlink shadow endpoint at the new monitored endpoint.
13. 如权利要求 12所述的方法, 其中在新的被监听端点重建上 行影子端点和下行影子端点还包括: 改变会议桥上与所述影子端 点对应的 IP点的远端信息。  13. The method according to claim 12, wherein reconstructing the uplink shadow endpoint and the downlink shadow endpoint on the new monitored endpoint further comprises: changing remote information of the IP point corresponding to the shadow endpoint on the conference bridge.
14. 如权利要求 13所述的方法, 其中还包括: 在改变会议桥上 与所述影子端点对应的 IP点的远端信息之后, 断开被监听端点和 下行影子端点间的拓朴连接, 以及断开被监听对端的对端端点和 上行影子端点间的拓朴连接。  14. The method according to claim 13, further comprising: after changing the remote information of the IP point corresponding to the shadow endpoint on the conference bridge, disconnecting the topology connection between the monitored endpoint and the downstream shadow endpoint, And disconnect the topology connection between the peer endpoint being monitored by the peer and the uplink shadow endpoint.
15. 如权利要求 10所述的方法, 还包括: 当被监听端点的对端 端点改变时, 断开上行影子端点与监听对端的拓朴连接。  15. The method according to claim 10, further comprising: when the peer endpoint of the monitored endpoint changes, disconnecting the topology connection between the uplink shadow endpoint and the listening peer.
PCT/CN2004/000431 2004-04-29 2004-04-29 A media control method for realizing the lawful interception by using the soft-switch system WO2005107159A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2004/000431 WO2005107159A1 (en) 2004-04-29 2004-04-29 A media control method for realizing the lawful interception by using the soft-switch system
CNB2004800424304A CN100461715C (en) 2004-04-29 2004-04-29 Medium control method for realizing legal monitoring using soft exchanging system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2004/000431 WO2005107159A1 (en) 2004-04-29 2004-04-29 A media control method for realizing the lawful interception by using the soft-switch system

Publications (1)

Publication Number Publication Date
WO2005107159A1 true WO2005107159A1 (en) 2005-11-10

Family

ID=35242016

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2004/000431 WO2005107159A1 (en) 2004-04-29 2004-04-29 A media control method for realizing the lawful interception by using the soft-switch system

Country Status (2)

Country Link
CN (1) CN100461715C (en)
WO (1) WO2005107159A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007128190A1 (en) * 2006-04-29 2007-11-15 Huawei Technologies Co., Ltd. A method of making conference bridge context and call leg context incident and corresponding media gateway and system
CN100442877C (en) * 2006-08-21 2008-12-10 华为技术有限公司 System and method of implementing cluster communication service

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111432075B (en) * 2020-03-12 2022-03-08 深圳震有科技股份有限公司 Voice call real-time monitoring method and device based on VOIP network
CN112351145B (en) * 2020-10-27 2021-12-28 山东亚华电子股份有限公司 Monitoring control method and device based on P2P call

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000056029A1 (en) * 1999-03-12 2000-09-21 Nokia Networks Oy Interception system and method
WO2001067683A1 (en) * 2000-03-08 2001-09-13 Telefonaktiebolaget Lm Ericsson (Publ) Signalling in a telecommunications network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004010649A1 (en) * 2002-07-19 2004-01-29 Nokia Corporation Informing a lawful interception system of the serving system serving an intercepted target

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000056029A1 (en) * 1999-03-12 2000-09-21 Nokia Networks Oy Interception system and method
WO2001067683A1 (en) * 2000-03-08 2001-09-13 Telefonaktiebolaget Lm Ericsson (Publ) Signalling in a telecommunications network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007128190A1 (en) * 2006-04-29 2007-11-15 Huawei Technologies Co., Ltd. A method of making conference bridge context and call leg context incident and corresponding media gateway and system
CN100442877C (en) * 2006-08-21 2008-12-10 华为技术有限公司 System and method of implementing cluster communication service

Also Published As

Publication number Publication date
CN1926807A (en) 2007-03-07
CN100461715C (en) 2009-02-11

Similar Documents

Publication Publication Date Title
JP4901197B2 (en) Soft switch call control method and soft switch device using the method
US8599747B1 (en) Lawful interception of real time packet data
US7092493B2 (en) Methods and systems for providing lawful intercept of a media stream in a media gateway
US6754180B1 (en) System, method, and computer program product for support of bearer path services in a distributed control network
JP4359394B2 (en) Method for exchanging signaling messages in two phases
US7254832B1 (en) Firewall control for secure private networks with public VoIP access
CN100531074C (en) Method and system for legally monitoring IP multimedia subsystem network
WO2004034637A1 (en) A method and system of teleservice interworking of broadband heterogeneous networks
WO2008116408A1 (en) System, equipment and method for implementing special calling services
CN102148775A (en) Webpage call service gateway, call service system and method
CN101018216B (en) Voice, Modem and Fax full control method
WO2006048769A1 (en) A new h.248.1 topology descriptor
US20070172051A1 (en) Setting up a packet-oriented multimedia connection using an interactive voice response system
CN100450024C (en) Method for monitoring multi-medium sub-system domain
CN101557603B (en) Method, device and system for lawful monitoring
CN106161357B (en) method, device and application server for realizing lawful interception in IMS network
WO2007093116A1 (en) A method and system for realizing the simulating service and the access signaling adaptive entity
WO2007101383A1 (en) Method and apparatus to implement media gateway internal connection
CN100463404C (en) Method for implementing telephone conference service by using media resource server
WO2005107159A1 (en) A media control method for realizing the lawful interception by using the soft-switch system
WO2012000337A1 (en) Method and device for implementing voice signaling tracking
WO2007082435A1 (en) A system, method and network equipment for implementing the lawful interception in next generation network
CA2560802A1 (en) Method and apparatus for dynamically establishing links between ip private branch exchanges
KR100640289B1 (en) Method of internet protocol terminals for providing a plurality of call services and ip terminals enabling the method
CN102843337A (en) Method and device for monitoring media content in IP (internet protocol) multimedia sub-system

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200480042430.4

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

122 Ep: pct application non-entry in european phase