WO2008082329A1 - Method, arrangement, node and artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos) - Google Patents

Method, arrangement, node and artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos) Download PDF

Info

Publication number
WO2008082329A1
WO2008082329A1 PCT/SE2006/001508 SE2006001508W WO2008082329A1 WO 2008082329 A1 WO2008082329 A1 WO 2008082329A1 SE 2006001508 W SE2006001508 W SE 2006001508W WO 2008082329 A1 WO2008082329 A1 WO 2008082329A1
Authority
WO
WIPO (PCT)
Prior art keywords
traffic
qos
requested
x3qosl
hi3qosa
Prior art date
Application number
PCT/SE2006/001508
Other languages
French (fr)
Inventor
Amedeo Imbimbo
Raffaele De Santis
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to EP06835915.7A priority Critical patent/EP2098052B1/en
Priority to US12/521,704 priority patent/US8107480B2/en
Priority to PCT/SE2006/001508 priority patent/WO2008082329A1/en
Publication of WO2008082329A1 publication Critical patent/WO2008082329A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/80Responding to QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]

Definitions

  • the present invention relates to methods and arrangements to enhance delivery capacity for traffic in a telecommunication network.
  • Optimized bandwidth consumption is a well known problem in communication networks of today.
  • Various solutions to keep down bandwidth consumption exist.
  • the problem with unevenly distributed data is identified in the International Patent Application PCT/IB02/03353.
  • the problem is solved by a user selecting delivery from at least two delivery classes : "deliver NOW" in real time or a specified "time delay delivery” whereby the "time delay delivery” class allows the network to send content at a time when the network is least utilized.
  • a system administrator requests packet filtering based upon selected active users or active applications.
  • a bandwidth history database is compiled from bandwidth usage data associated with multiple entities within a data processing system.
  • bandwidth usage for the requested action can be predicted with reference to the bandwidth history database in order to change bandwidth consumption behaviour.
  • the above solutions present drawbacks such as preventing needed delivery of services to receiving users, at any time.
  • Figure 1 belongs to prior art and discloses a solution for monitoring of Interception Related Information IRI and Content of Communication CC for the same target .
  • the different parts used for interception belong to prior art and are disclosed in current Lawful Interception standards (see 3GPP TS 33.108 and 3GPP TS 33.107 - Release 7).
  • a Law Enforcement Monitoring Facility LEMF is connected to three Mediation Functions respectively for ADMF, DF2 , DF3 i.e. an Administration Function ADMF and two Delivery Functions DF2 and DF3.
  • the Administration Function and the Delivery Functions are each one connected to the LEMF via standardized handover interfaces HI1-HI3, and connected via interfaces Xl-X3 to an Intercepting Control Element ICE in a telecommunication system.
  • the ADMF is used to hide from ICEs that there might be multiple activations by different Law Enforcement Agencies.
  • the messages sent from LEMF to ADMF via HIl and from the ADMF to the network via the Xl interface comprise identities of a target that is to be monitored.
  • the Delivery Function DF2 receives Intercept Related Information IRI from the network via the X2 interface. DF2 is used to distribute the IRI to relevant Law Enforcement Agencies via the HI2 interface.
  • the Delivery Function DF3 receives Content of Communication CC, i.e. speech and data, on X3 from the ICE. Requests are also sent from the ADMF to a Mediation Function MF3 in the DF3 on a Handover Interface HI_3. The requests sent on HI_3 are used for activation of Content of
  • DF3 is responsible for call control signaling and bearer transport for an intercepted product.
  • Intercept Related Information IRI received by DF2 is triggered by Events that in Circuit Switching domain are either call related or non-call related.
  • Packet Switching domain the events are session related or session unrelated.
  • the access method for the delivering of Packet Data GPRS Support Node GSN Intercept Product is based on duplication of packets without modification at 3G GSN.
  • the duplicated packets with additional information are sent to DF3 for further delivery via a tunnel.
  • DF3 architecture in the lawful interception solution when a LEMF is interested in receiving the service contents of the target subscriber, the LEMF must be able to receive and decode high bandwidth consuming Content of Communication for service like IP-TV or broadcasting, which may be as high as Gbits of information per second. This requires the LEMF to handle/consume high bandwidth also when media content is considered as non-meaningful for LI investigation purposes (e.g. encrypted attachments in MMS/SMS, bandwidth and processing capacity consuming multimedia contents) .
  • the present invention relates to problems to limit bandwidth consumption and not overload the system while yet open up for full delivery of services if needed.
  • a further problem is unnecessary high buffered traffic storage amount, for example when a receiving monitoring facility does not operate in real-time.
  • a purpose with the invention is to bandwidth optimize the use of the delivery interface by introducing an enhanced delivery mechanism.
  • Services QoS to a maximum sustainable level for the delivery interface and, optionally, if the delimited QoS is lower than the original QoS, buffer the original traffic for later usage and at request, retrieving the buffered traffic.
  • the solution to the problem more in detail is a method to enhance delivery capacity for traffic in a communication network, comprising:
  • the further mentioned problem i.e. reduction of buffered storage amount e.g. when a traffic receiving monitoring facility does not operate in real time is solved by a filtering mechanism that makes storage needs of buffered traffic significantly lower.
  • a further problem is to ensure that possible buffered contents are not altered by unauthorized entities . This problem is solved for example by techniques like requirement of digital signatures to access stored data.
  • a purpose with the invention is to optimize usage of the delivery interface and prevent high bandwidth consumption unless necessary for monitoring aims.
  • This purpose and others are achieved by methods, arrangements, nodes, systems and articles of manufacture. Examples of advantages of the invention are as follows:
  • Figure 1 belongs to prior art and discloses a block schematic illustration of interception configuration items attached to an Intercepting Control Element.
  • Figure 2 discloses a block schematic illustration of an Intercept Control element that is split into an MSC server and a Media Gateway wherein traffic is monitored from the media Gateway.
  • Figure 3 discloses a block schematic illustration of a monitoring configuration attached to IP Multimedia Subsystem IMS wherein a Gateway GPRS Support Node is acting as Intercept Control element .
  • Figure 4 discloses a signal sequence diagram representing a method wherein traffic in Packet Switched domain is monitored.
  • Figure 5 disclose a flow chart illustrating some essential method steps of the invention.
  • Figure 6 discloses a block schematic illustration of a system that can be used to put the invention into practise.
  • 3GPP applies separation of signalling and media planes with the introduction of split architecture for the Mobile Switching Centre MSC.
  • the MSC is split into an MSC server and a Media Gateway MGW.
  • the split architecture was introduced in Release 4 of the 3GPP specifications.
  • Media such as video and voice is handled in bearer domain and sent via the MGW while signalling is handled by the MSC Server.
  • FIG. 2 discloses a delivery configuration to the Law Enforcement Monitoring Facility LEMF when monitoring a Circuit Switched call.
  • the figure shows an Intercepting Control Element ICE that comprises an MSC Server and a Media Gateway MGW.
  • the ICE is connected to two Radio Base Station RBSl and RBS2 in a GSM Access Network wherein a mobile station A (subscriber) is radio linked to RBSl and a mobile station B is radio linked to RBS2.
  • a voice session is set up between A and B.
  • Signalling information used to set up the session is transported via the MSC Server between A and B.
  • the signalling information is shown in the figure with divided lines. Traffic, such as speech SA in this example, is sent via the Media Gateway MGW.
  • LEMF Law Enforcement Monitoring Facility
  • MSC Server will setup the multiparty in the MGW for the duplication of Content of Communication CC on the X3 interface.
  • speech from A to B and speech from B to A will be sent on separate stub-lines between the MF3 and the LEMF, and cause download of the Handover
  • the traffic SA sent between A to B comprises a certain coded level of Quality of Services QoS, so called originally coded QoS.
  • the originally coded QoS for the speech SA is referred to in figure 2 as [X3QoSA] .
  • an agency have the possibility to request a
  • the requested QoS level can be lower than the originally coded level of QoS.
  • the requested QoS for the signal SA is referred to in figure 2 as [Hl3QoSA] .
  • the request for a certain coded QoS level is sent from LEMF on HIl to ADMF and forwarded from ADMF on Xl_3 to MF3.
  • a circuit switched call has been set up between subscriber A and B and speech SA is transported via the Media Gateway MGW in the ICE.
  • the method comprises the following steps:
  • a request 1 to activate interception of subscriber A is sent from the LEMF to the MSC Server via the ADMF.
  • the request 1 comprises a target identity related to subscriber A.
  • the below information will be transferred via the MGW from the MSC Server to the Delivery Function DF3.
  • This signaling info are transferred to DF3 by MSC Server.
  • the X3 interface consists of a signaling part (MSC server transfers to DF3 the target and correlation info of the interception case) and of payload part (transferred to DF3 via MGW) .
  • the following information will be transferred:
  • MSISDN - target identity
  • IMSI IMSI or IMEI
  • the above control information is needed to allow DF3 in correlating the received CC payload to the proper warrants and making accordingly the HI3 ISDN calls to LEMF.
  • the bearer (a pure bearer copy of the transmitted and received content of communication of the target subscriber) is sent from the MGW to DF3 that transcodes it in .the HI3 call towards LEMF.
  • a signal 2 comprising a specification of requested level of coded Quality of Services QoS is sent from LEMF to MF3 via the ADMF.
  • the requested level is the level representing maximum sustainable QoS level on the Handover Interface.
  • the requested level of QoS is lower than the original level of QoS. While speech sent with originally coded QoS appears with "perfect" speech quality, speech with lower QoS is distorted and may appear with a quality that is "less than perfect” even though usable for monitoring purposes .
  • the speech 3 coded with original level of QoS [X3QoSA] is received to the Delivery Function DF3 and transcoded in the DF3 to the requested level of QoS [Hl3QoSA] .
  • speech is explicitly referred to.
  • transcoding examples would be the conversion of PCM payload into Full Rate/Half Rate/Enhanced Full Rate AMR coded content .
  • the payload transcoding function would result in making
  • IMS IP Multimedia Subystems
  • IMS IP Multimedia Subystems
  • Figure 3 discloses in a second embodiment the previous explained LI configuration attached to an IP Multimedia Subsystem IMS.
  • IMS is the technology defined by the Third Generation Partnership Project 3GPP to provide IP Multimedia services over mobile communication networks (3GPP TS 22.228, TS 23.228, TS 24.229, TS 29.228, TS 29.229, TS 29.328 and TS 29.329 Release 5 and Release 6) .
  • the IMS makes use of the Session Initiation Protocol SIP to set up and control calls or sessions between user terminals (or user terminals and application servers) .
  • the Session Description Protocol SDP carried by SIP signaling, is used to describe and negotiate the media components of the session.
  • the target identity for multi-media is the SIP URL at the CSCF. Whilst SIP was created as a user-to-user protocol, IMS allows operators and service providers to control user access to services and to charge users accordingly. IP Multimedia services provide a dynamic combination of voice, video, messaging, data, etc. within the same session.
  • FIG. 3 schematically shows the IMS structure used in the second embodiment of the invention.
  • the IMS in the example comprises Call/Session Control Functions CSCF-A and CSCF-B.
  • the CSCFs are SIP servers and essential nodes in the IMS .
  • a CSCF processes SIP signaling in the IMS network.
  • the CSCF comprises different Call/Session Control Function types such as P-/I-/S-CSCF as defined in the standards but is for the sake of clarity shown in the schematic figure 3 as a single node.
  • the bearer domain in the example consists of an access network ACC 3SIW (such as PLMN and PSTN) and an UMTS Terrestrial Radio Access Networks UTRAN and a backbone network IP NW.
  • ACC 3SIW such as PLMN and PSTN
  • UMTS Terrestrial Radio Access Networks UTRAN and a backbone network IP NW.
  • a transmitting video terminal C is located in the ACC NW while a receiving terminal D is located in the UTRAN network.
  • Two video services Sl and S2 are transported from a terminal attached to C through the IP network via a Media Gateway MGW in the IMS domain, through a Packet Switched .network PS, to D in the UTRAN network.
  • a Gateway GPRS Support Node GGSN is located in the Packet Switched PS network.
  • the GGSN acts as Intercepting Control Element ICE.
  • the GGSN comprises a Packet Duplicator PD and the LEMF is attached to the PD via the Mediation/Delivery Function MF3/DF3.
  • the access method for delivering Packet Data GSN Intercept Product is based on duplication of Packets without modification at GGSN.
  • the duplicated packets with additional information in the header are sent to MF3/DF3 for further delivery to LEMF.
  • Figure 4 discloses a signal sequence diagram in which the method according to the second embodiment of the invention is shown. The method in figure 4 is to be read together with figure 3. The method comprises the following steps:
  • a request 11 for Lawful Interception activation is sent from LEMF via the ADMF to ICE.
  • the request comprises a target identity i.e. MSISDN - Mobile Station International ISDN Number related to subscriber C.
  • the request in this example also comprises identification of two specific video- streaming services to be observed, i.e. the services Sl and S2.
  • the request further comprises a requested Quality of Services QoS for the services Sl and S2 respectively.
  • the requested QoS in this example is Animated GIF for both Sl and S2.
  • the requested QoS for Sl is in the figure referred to as [HI3QoSl] .
  • the request 11 also comprises a buffring option which in this example is ⁇ buffering requested" for Sl and "no buffering request" for S2.
  • a QoS request 12 is sent from the ADMF to the Mediation Function MF3 in the Delivery Function DF3.
  • the request 12 comprises beyond the target identity, the identities of services Sl and S2 and the requested QoS for the services [HI3QoSl] &[HI3QOS1] , i.e. Animated GIF. Also the buffering options are sent in the request 12.
  • the service Sl is transported via the Packet Duplicator PD from C to D (see figure 3) .
  • the original QoS [X3QoSl] in this example is AVI-M-PEG.
  • MF3/DF3 needs to preliminary inspect the CC and consequently treat it as set on warrant basis .
  • the requested Quality of Services [Hl3QoSl] is lower than the original Quality of Services [X3QoSl] and Sl is consequently transcoded TCl in the MF3/DF3 into the requested [Hl3QoSl] i.e. Sl is transcoded from AVI-M-PEG to Animated GIF.
  • - Sl with original Quality of Services [X3QoSl] is buffered BUFFl, as set on warrant basis, in an MF3 database .
  • - Sl with requested Quality of Services [Hl3QoSl] is sent from MF3/DF3 to LEMF where it is observed by an agency .
  • the agency finds the [HI3QoSl] not to be sufficient for interception purposes (e.g. it is not possible to interpret the meaning of the video signal) .
  • a further request 13 is sent from LEMF to MF3/DF3.
  • the buffered Sl with original Quality of Services [X3QoSl] is hereby requested to be retrieved.
  • the buffered content will be removed DROPl from MF3/DF3.
  • the buffered CC still would have been removed after expiration of a specified time period.
  • the time period may be set in a default manner or set in the request 12 by the requesting agency.
  • the clock hereby starts when Sl [HI3QoSl] is sent from MF3/DF3 to LEMF and expires after the set time has lapsed.
  • the service S2 is transported via the Packet Duplicator PD from C to D.
  • the coded QoS for the signal S2 when transported from C to D is called the original QoS and is referred to as [X3QoS2] in the figures.
  • S2 is forwarded with the original coded [X3QoS2] from PD, i.e. from the Intercepting Control Element ICE, to the Delivery Function DF3.
  • a QoS check is performed in DF3 and [Hl3QoS2] is found to be lower than [X3QoS2] .
  • S2 is transcoded TC2 in the MF3/DF3 into the requested [HI3QOS2] i.e. S2 is transcoded from AVI-M-PEG to Animated GIF.
  • the association on warrant basis can be taking into account several HI3QoS specified on a service basis.
  • the buffered CC will be erased from the MF3 database at the expiry of the configured timer, or as an alternative if the LI agency explicitly orders the erasure, for example if CC at the lower QoS is considered sufficient for lawful investigation purposes.
  • Table 1 Video-to-Slideshow and Video-to-Video Transcoding
  • Video Transcoding could perform the following conversions :
  • audio transcoding e.g., only the audio of a video call, no images/clip in web pages or MMS
  • media filtering e.g., only the audio of a video call, no images/clip in web pages or MMS
  • replacement of media content by compressed file archives e.g., only the audio of a video call, no images/clip in web pages or MMS
  • the Content of Communication may be buffered in encrypted form.
  • the CC with lower QoS After sending the CC with lower QoS, it shall be ensured that the possible buffered contents are not altered by unauthorized entities. This can be done by commonly used techniques, like digital signatures.
  • the HI3 Content of Communication sent to the agency with a lower QoS can serve itself as prove of the buffered contents integrity.
  • the agency can use the same transcoding functionality to verify the integrity of the buffered contents .
  • a prove is obtained if the same contents are obtained with the lower QoS .
  • the idea is that the CC at lower QoS can serve as digital signature of the buffered CC at original QoS.
  • Agency shall retrieve the buffered CC, it could verify the integrity of such CC by applying on it the transcoding function and comparing the result with the CC at lower Qos . If they are equal, then the retrieved buffered CC is integral .
  • Receipt of low QoS Content of Communication reduces the storage amount needs in the situation where monitoring centre does not operate in real time.
  • a filtering mechanism at DF3 premises could be optionally offered to make storage needs significantly lower.
  • FIG. 5 discloses a flowchart in which some important steps are shown. The flowchart is to be read together with the earlier shown figures . The flowchart comprises the following steps :
  • a block 101 discloses this step in figure 5.
  • a QoS request 12 is received from LEMF to the MF3/DF3.
  • the request 12 comprises beyond the target identity and the identities of service Sl, a specification of the requested QoS [HI3QoSl] and also the buffering option "Buffering requested” .
  • a block 102 discloses this step in figure 5.
  • the service Sl is forwarded with the original coded Quality of Services [X3QoSl] from the Packet Duplicator PD in ICE, to the Delivery Function DF3.
  • a block 103 discloses this step in figure 5.
  • the requested Quality of Services [HI3QoSl] is lower than the original Quality of Services [X3QoSl] and Sl is transcoded TCl in the MF3/DF3 into the requested Quality of Services [HI3QoSl] .
  • a block 104 discloses this step in figure 5.
  • a block 105 discloses this step in figure 5.
  • a further request 13 is sent from LEMF to MF3/DF3.
  • the buffered Sl with original Quality of Services [X3QoSl] is requested to be retrieved.
  • a block 108 discloses this step in figure 5.
  • FIG. 6 An example of a system used to put the invention into practice is schematically shown in figure 6.
  • the block schematic constellation corresponds to the one disclosed in figures 2 and 3 but is by no means limited to these two examples .
  • the system disclosed in figure 6 is not necessarily related to monitoring or Lawful Interception and can be used in any data transportation configuration.
  • Figure 6 discloses a delivery function 22 attached to a transmitter
  • Traffic, having originally coded QoS is transmitted from 21 to 22.
  • the traffic will optionally arrive to a filter 24 that is used to filter undesired traffic.
  • the delivery function 22 comprises an input 29 to which a specification of requested QoS will arrive.
  • the traffic with originally coded QoS will be received by a comparator 25 used to compare original QoS value with requested QoS value. Traffic may optionally be sent to an Encryption Unit 26 and/or to storage 27 where traffic on request may be buffered.
  • a timer 30 will optionally after lapse, drop the buffered traffic. In dependence of the result from the comparator 25, traffic with original or requested Qos will be forwarded from the deliver function 22 to the receiver 28.
  • Enumerated items are shown in the figures as individual elements . In actual implementations of the invention however, they may be inseparable components of other electronic devices such as a digital computer. Thus, actions described above may be implemented in software that may be embodied in an article of manufacture that includes a program storage medium.
  • the program storage medium includes data signal embodied in one or more of a carrier wave, a computer disk (magnetic, or optical (e.g., CD or DVD, or both) , non-volatile memory, tape, a system memory, and a computer hard drive.
  • the invention is not limited to the above described and in the drawings shown embodiments but can be modified within the scope of the enclosed claims .
  • the systems and methods of the present invention may be implemented on any of the Third Generation Partnership Project (3GPP) , European Telecommunications Standards Institute (ETSI) , American National Standards Institute (ANSI) or other standard telecommunication network architecture.
  • 3GPP Third Generation Partnership Project
  • ETSI European Telecommunications Standards Institute
  • ANSI American National Standards Institute

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to methods and arrangements to enhance delivery capacity for traffic in a communication network, comprising the following steps: - Receiving to a Delivery Function DF3, traffic SA, Sl, S2 with originally coded Quality of - Services QoS X3QoSA, X3QoSl, X3QoS2. - Receiving to the Delivery Function, a specification of requested QoS. - Establishing that the originally coded QoS X3QoSA, X3QoSl, X3QoS2 is higher than the requested QoS HI3QoSA, HI3QOS1, Hl3QoS2. - transcoding the received traffic SA, Sl, S2 into requested QoS HI3QoSA, Hl3QoSl, Hl3QoS2. - Optionally, buffering traffic with originally coded Quality of Services QoS and at request, retrieving the buffered traffic.

Description

Method, Arrangement, Node and Artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested Quality of Service (QoS)
TECHNICAL FIELD
The present invention relates to methods and arrangements to enhance delivery capacity for traffic in a telecommunication network.
BACKGROUND
Optimized bandwidth consumption is a well known problem in communication networks of today. Various solutions to keep down bandwidth consumption exist. The problem with unevenly distributed data is identified in the International Patent Application PCT/IB02/03353. The problem is solved by a user selecting delivery from at least two delivery classes : "deliver NOW" in real time or a specified "time delay delivery" whereby the "time delay delivery" class allows the network to send content at a time when the network is least utilized. In the US application 2002/0172222 a system administrator requests packet filtering based upon selected active users or active applications. A bandwidth history database is compiled from bandwidth usage data associated with multiple entities within a data processing system. In response to a requested action within the data processing system, bandwidth usage for the requested action can be predicted with reference to the bandwidth history database in order to change bandwidth consumption behaviour. The above solutions present drawbacks such as preventing needed delivery of services to receiving users, at any time.
Also within the Lawful Interception concept high bandwidth consumption problems arise when high bandwidth consuming Content of Communication like, for instance, IP-TV or broadcasting data is to be delivered to a monitoring function .
Figure 1 belongs to prior art and discloses a solution for monitoring of Interception Related Information IRI and Content of Communication CC for the same target . The different parts used for interception belong to prior art and are disclosed in current Lawful Interception standards (see 3GPP TS 33.108 and 3GPP TS 33.107 - Release 7). A Law Enforcement Monitoring Facility LEMF is connected to three Mediation Functions respectively for ADMF, DF2 , DF3 i.e. an Administration Function ADMF and two Delivery Functions DF2 and DF3. The Administration Function and the Delivery Functions are each one connected to the LEMF via standardized handover interfaces HI1-HI3, and connected via interfaces Xl-X3 to an Intercepting Control Element ICE in a telecommunication system. Together with the delivery functions, the ADMF is used to hide from ICEs that there might be multiple activations by different Law Enforcement Agencies. The messages sent from LEMF to ADMF via HIl and from the ADMF to the network via the Xl interface comprise identities of a target that is to be monitored. The Delivery Function DF2 receives Intercept Related Information IRI from the network via the X2 interface. DF2 is used to distribute the IRI to relevant Law Enforcement Agencies via the HI2 interface. The Delivery Function DF3 receives Content of Communication CC, i.e. speech and data, on X3 from the ICE. Requests are also sent from the ADMF to a Mediation Function MF3 in the DF3 on a Handover Interface HI_3. The requests sent on HI_3 are used for activation of Content of
Communication, and to specify detailed handling options for intercepted CC. In Circuit Switching, DF3 is responsible for call control signaling and bearer transport for an intercepted product. Intercept Related Information IRI, received by DF2 is triggered by Events that in Circuit Switching domain are either call related or non-call related. In Packet Switching domain the events are session related or session unrelated.
The access method for the delivering of Packet Data GPRS Support Node GSN Intercept Product is based on duplication of packets without modification at 3G GSN. The duplicated packets with additional information are sent to DF3 for further delivery via a tunnel. In currently provided DF3 architecture in the lawful interception solution, when a LEMF is interested in receiving the service contents of the target subscriber, the LEMF must be able to receive and decode high bandwidth consuming Content of Communication for service like IP-TV or broadcasting, which may be as high as Gbits of information per second. This requires the LEMF to handle/consume high bandwidth also when media content is considered as non-meaningful for LI investigation purposes (e.g. encrypted attachments in MMS/SMS, bandwidth and processing capacity consuming multimedia contents) .
SUMMARY
The present invention relates to problems to limit bandwidth consumption and not overload the system while yet open up for full delivery of services if needed. A further problem is unnecessary high buffered traffic storage amount, for example when a receiving monitoring facility does not operate in real-time.
A purpose with the invention is to bandwidth optimize the use of the delivery interface by introducing an enhanced delivery mechanism.
The solution to the problem is to delimit the Quality of
Services QoS to a maximum sustainable level for the delivery interface and, optionally, if the delimited QoS is lower than the original QoS, buffer the original traffic for later usage and at request, retrieving the buffered traffic.
The solution to the problem more in detail is a method to enhance delivery capacity for traffic in a communication network, comprising:
- Receiving to a Delivery Function, the requested traffic with originally coded Quality of Services QoS.
- Receiving to the Delivery Function, a specification of requested QoS .
- establishing that the requested coded QoS is lower than originally the QoS;
- transcoding the received traffic from original to requested QoS .
- Optionally, buffering traffic with originally coded Quality of Services QoS and at request, retrieving the buffered traffic.
The further mentioned problem i.e. reduction of buffered storage amount e.g. when a traffic receiving monitoring facility does not operate in real time is solved by a filtering mechanism that makes storage needs of buffered traffic significantly lower. Yet a further problem is to ensure that possible buffered contents are not altered by unauthorized entities . This problem is solved for example by techniques like requirement of digital signatures to access stored data.
A purpose with the invention is to optimize usage of the delivery interface and prevent high bandwidth consumption unless necessary for monitoring aims. This purpose and others are achieved by methods, arrangements, nodes, systems and articles of manufacture. Examples of advantages of the invention are as follows:
Enrichment of the LI functionality with video and audio transcoding features in order to have an optimized use of the HI3 interface bandwidth . - Enrichment of the LI functionality with the media compression techniques for removing the media content considered as non-meaningful for LI investigation purposes for example, encrypted attachments in MMS/SMS, bandwidth and processing capacity consuming multimedia contents. - The LI standards require that the QoS towards the delivery function provided by the network must be of at least the level that the network provides to the target. This is fulfilled also with this solution, since the intercepted CC is buffered with the QoS offered by the network and available to be retrieved from the agency.
Possibility to provide the Video Transcoding features in conjunction with the LI functionality.
Promote the usage of specified Service-aware products as supporting functions in LI gateway. Due to the need to differentiate the QoS on service basis this product shall serve to single the different service contents from a unique data stream.
No influence on the interception domain, i.e. on the elements in the network. - Receipt of low Qos Content of Communication make storage needs significantly lower.
Best fitting of the Agency's expectations (set on warrant basis) in terms of the trade-off among the expected intelligibility of the interception (i.e., minimum desired QoS) and the capacity/bandiwidth endured load on the MC resources .
The invention will now be described more in detail with the aid of preferred embodiments in connection with the enclosed drawings . BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 belongs to prior art and discloses a block schematic illustration of interception configuration items attached to an Intercepting Control Element.
Figure 2 discloses a block schematic illustration of an Intercept Control element that is split into an MSC server and a Media Gateway wherein traffic is monitored from the media Gateway.
Figure 3 discloses a block schematic illustration of a monitoring configuration attached to IP Multimedia Subsystem IMS wherein a Gateway GPRS Support Node is acting as Intercept Control element .
Figure 4 discloses a signal sequence diagram representing a method wherein traffic in Packet Switched domain is monitored.
Figure 5 disclose a flow chart illustrating some essential method steps of the invention. ,
Figure 6 discloses a block schematic illustration of a system that can be used to put the invention into practise.
DETAILED DESCRIPTION
3GPP applies separation of signalling and media planes with the introduction of split architecture for the Mobile Switching Centre MSC. The MSC is split into an MSC server and a Media Gateway MGW. The split architecture was introduced in Release 4 of the 3GPP specifications. Media such as video and voice is handled in bearer domain and sent via the MGW while signalling is handled by the MSC Server.
Figure 2 discloses a delivery configuration to the Law Enforcement Monitoring Facility LEMF when monitoring a Circuit Switched call. The figure shows an Intercepting Control Element ICE that comprises an MSC Server and a Media Gateway MGW. In this example the ICE is connected to two Radio Base Station RBSl and RBS2 in a GSM Access Network wherein a mobile station A (subscriber) is radio linked to RBSl and a mobile station B is radio linked to RBS2. A voice session is set up between A and B. Signalling information used to set up the session is transported via the MSC Server between A and B. The signalling information is shown in the figure with divided lines. Traffic, such as speech SA in this example, is sent via the Media Gateway MGW. The earlier mentioned (see figure 1) Law Enforcement Monitoring Facility LEMF is attached to the Media Gateway via the Mediation Function MF3 in the delivery function DF3. If requested, a copy of the traffic will be sent from the MGW to the LEMF . The request is sent from LEMF to the MSC Server via the Xl interface. MSC server will setup the multiparty in the MGW for the duplication of Content of Communication CC on the X3 interface. To be noted is that speech from A to B and speech from B to A will be sent on separate stub-lines between the MF3 and the LEMF, and cause download of the Handover
Interface HI3. The traffic SA sent between A to B comprises a certain coded level of Quality of Services QoS, so called originally coded QoS. The originally coded QoS for the speech SA is referred to in figure 2 as [X3QoSA] . According to the invention an agency have the possibility to request a
Quality of Service representing a maximum sustainable level for the Handover Interface HI3 , a so called requested coded Quality of Services. The requested QoS level can be lower than the originally coded level of QoS. The requested QoS for the signal SA is referred to in figure 2 as [Hl3QoSA] . The request for a certain coded QoS level is sent from LEMF on HIl to ADMF and forwarded from ADMF on Xl_3 to MF3.
A method according to a first embodiment of the invention will now be explained together with figure 2. In this exemplified embodiment, a circuit switched call has been set up between subscriber A and B and speech SA is transported via the Media Gateway MGW in the ICE. The method comprises the following steps:
- A request 1 to activate interception of subscriber A is sent from the LEMF to the MSC Server via the ADMF. The request 1 comprises a target identity related to subscriber A.
After receiving the request, the below information will be transferred via the MGW from the MSC Server to the Delivery Function DF3. This signaling info are transferred to DF3 by MSC Server. In fact, as referred in 33.107 for the case of CS split architecture, the X3 interface consists of a signaling part (MSC server transfers to DF3 the target and correlation info of the interception case) and of payload part (transferred to DF3 via MGW) . The following information will be transferred:
- target identity (MSISDN, IMSI or IMEI) .
- The target location (if available) or the IAs in case of location dependent interception.
- Correlation number (IRK->CC) .
- Direction indication (Signal from target or signal to target)
The above control information is needed to allow DF3 in correlating the received CC payload to the proper warrants and making accordingly the HI3 ISDN calls to LEMF. On X3 , the bearer (a pure bearer copy of the transmitted and received content of communication of the target subscriber) is sent from the MGW to DF3 that transcodes it in .the HI3 call towards LEMF.
- A copy 3 of the speech SA with originally coded Quality of Services is sent from the MGW to the Delivery Function
DF3.
Up until now the method has followed Lawful Interception according to standards referred to in the background part of this application. The method according to invention comprises the following further steps:
- According to the invention, a signal 2 comprising a specification of requested level of coded Quality of Services QoS is sent from LEMF to MF3 via the ADMF. The requested level is the level representing maximum sustainable QoS level on the Handover Interface. In this example the requested level of QoS is lower than the original level of QoS. While speech sent with originally coded QoS appears with "perfect" speech quality, speech with lower QoS is distorted and may appear with a quality that is "less than perfect" even though usable for monitoring purposes .
- The speech 3 coded with original level of QoS [X3QoSA] is received to the Delivery Function DF3 and transcoded in the DF3 to the requested level of QoS [Hl3QoSA] . In this example speech is explicitly referred to. In such a case, transcoding examples would be the conversion of PCM payload into Full Rate/Half Rate/Enhanced Full Rate AMR coded content . On the other end and as a more effective example, when intercepting High Speed CS data calls, the payload transcoding function would result in making
"simple" CSD calls towards LEMF (so less CS channels to monitoring center compared to HSCSD calls) . - The transcoded speech 4 with the requested level of QoS [Hl3QoSA] is sent on the Handover Interface HI3 from MF3 to the LEMF . Aa agency will get access to the traffic from the LEMF.
Like in 3GPP, signalling and media paths are kept separated in IP Multimedia Subystems IMS. IMS however goes even further in this separation. The only nodes that need to handle both signalling and media are the IMS terminals; no network node needs to handle both. Figure 3 discloses in a second embodiment the previous explained LI configuration attached to an IP Multimedia Subsystem IMS. IMS is the technology defined by the Third Generation Partnership Project 3GPP to provide IP Multimedia services over mobile communication networks (3GPP TS 22.228, TS 23.228, TS 24.229, TS 29.228, TS 29.229, TS 29.328 and TS 29.329 Release 5 and Release 6) . The IMS makes use of the Session Initiation Protocol SIP to set up and control calls or sessions between user terminals (or user terminals and application servers) . The Session Description Protocol SDP, carried by SIP signaling, is used to describe and negotiate the media components of the session. The target identity for multi-media is the SIP URL at the CSCF. Whilst SIP was created as a user-to-user protocol, IMS allows operators and service providers to control user access to services and to charge users accordingly. IP Multimedia services provide a dynamic combination of voice, video, messaging, data, etc. within the same session.
Figure 3 schematically shows the IMS structure used in the second embodiment of the invention. The IMS in the example comprises Call/Session Control Functions CSCF-A and CSCF-B. The CSCFs are SIP servers and essential nodes in the IMS . A CSCF processes SIP signaling in the IMS network. The CSCF comprises different Call/Session Control Function types such as P-/I-/S-CSCF as defined in the standards but is for the sake of clarity shown in the schematic figure 3 as a single node. The bearer domain in the example consists of an access network ACC 3SIW (such as PLMN and PSTN) and an UMTS Terrestrial Radio Access Networks UTRAN and a backbone network IP NW. A transmitting video terminal C is located in the ACC NW while a receiving terminal D is located in the UTRAN network. Two video services Sl and S2 are transported from a terminal attached to C through the IP network via a Media Gateway MGW in the IMS domain, through a Packet Switched .network PS, to D in the UTRAN network. A Gateway GPRS Support Node GGSN is located in the Packet Switched PS network. The GGSN acts as Intercepting Control Element ICE. The GGSN comprises a Packet Duplicator PD and the LEMF is attached to the PD via the Mediation/Delivery Function MF3/DF3. The access method for delivering Packet Data GSN Intercept Product is based on duplication of Packets without modification at GGSN. The duplicated packets with additional information in the header are sent to MF3/DF3 for further delivery to LEMF.
Figure 4 discloses a signal sequence diagram in which the method according to the second embodiment of the invention is shown. The method in figure 4 is to be read together with figure 3. The method comprises the following steps:
- A request 11 for Lawful Interception activation is sent from LEMF via the ADMF to ICE. The request comprises a target identity i.e. MSISDN - Mobile Station International ISDN Number related to subscriber C. The request in this example also comprises identification of two specific video- streaming services to be observed, i.e. the services Sl and S2. The request further comprises a requested Quality of Services QoS for the services Sl and S2 respectively. The requested QoS in this example is Animated GIF for both Sl and S2. The requested QoS for Sl is in the figure referred to as [HI3QoSl] . The request 11 also comprises a buffring option which in this example is ^buffering requested" for Sl and "no buffering request" for S2.
- A QoS request 12 is sent from the ADMF to the Mediation Function MF3 in the Delivery Function DF3. The request 12 comprises beyond the target identity, the identities of services Sl and S2 and the requested QoS for the services [HI3QoSl] &[HI3QOS1] , i.e. Animated GIF. Also the buffering options are sent in the request 12.
- The service Sl is transported via the Packet Duplicator PD from C to D (see figure 3) . The original QoS [X3QoSl] in this example is AVI-M-PEG.
- Packets sent from C to D are duplicated without modification and the Service Sl is forwarded with the original coded [X3QoSl] from PD in the Intercepting Control Element ICE, to the Delivery Function DF3.
- A QoS check is performed in DF3. In case the QoS information for Sl is available in the header of the
Content of Communication CC, then such info is used by MF3/DF3 to apply the behavior set on warrant basis. Otherwise, MF3/DF3 needs to preliminary inspect the CC and consequently treat it as set on warrant basis .
- In this example the requested Quality of Services [Hl3QoSl] is lower than the original Quality of Services [X3QoSl] and Sl is consequently transcoded TCl in the MF3/DF3 into the requested [Hl3QoSl] i.e. Sl is transcoded from AVI-M-PEG to Animated GIF.
- Sl with original Quality of Services [X3QoSl] is buffered BUFFl, as set on warrant basis, in an MF3 database . - Sl with requested Quality of Services [Hl3QoSl] is sent from MF3/DF3 to LEMF where it is observed by an agency .
- In this example the agency finds the [HI3QoSl] not to be sufficient for interception purposes (e.g. it is not possible to interpret the meaning of the video signal) .
- A further request 13 is sent from LEMF to MF3/DF3. The buffered Sl with original Quality of Services [X3QoSl] is hereby requested to be retrieved.
- The buffered Sl with original Quality of Services [X3QoSl] is sent on the HI3 from MF3/DF3 to LEMF.
- If no other agency has required the CC for the same target, the buffered content will be removed DROPl from MF3/DF3. As an alternative, if the original QoS was not requested to be retrieved the buffered CC still would have been removed after expiration of a specified time period. The time period may be set in a default manner or set in the request 12 by the requesting agency. The clock hereby starts when Sl [HI3QoSl] is sent from MF3/DF3 to LEMF and expires after the set time has lapsed.
While Sl was requested to be buffered, S2 was requested not to be buffered. Figure 4 discloses the following further steps regarding the handling of S2 :
- The service S2 is transported via the Packet Duplicator PD from C to D. The coded QoS for the signal S2 when transported from C to D is called the original QoS and is referred to as [X3QoS2] in the figures. S2 is forwarded with the original coded [X3QoS2] from PD, i.e. from the Intercepting Control Element ICE, to the Delivery Function DF3. - A QoS check is performed in DF3 and [Hl3QoS2] is found to be lower than [X3QoS2] .
- S2 is transcoded TC2 in the MF3/DF3 into the requested [HI3QOS2] i.e. S2 is transcoded from AVI-M-PEG to Animated GIF.
- S2 with requested Quality of Services [Hl3QoS2] is sent from MF3/DF3 to LEMF without being buffered in MF3/DF3 and as a consequence, S2 is removed DR0P2 from MF3/DF3 after sending.
- If the agency finds the [HI3QoS2] to be un-sufficient for interception purposes, there will be no possibility to retrieve the original information. The advantage is that no storage consuming buffering has taken place .
The association on warrant basis can be taking into account several HI3QoS specified on a service basis.
I
As seen in the example above, the buffered CC will be erased from the MF3 database at the expiry of the configured timer, or as an alternative if the LI agency explicitly orders the erasure, for example if CC at the lower QoS is considered sufficient for lawful investigation purposes.
Other services involving video content (e.g., MMS messages with attached video clips) could be required with different "presentations" (QoS) . In general, for video services, the agency may require any of the possible conversion as reported in the following table :
Figure imgf000016_0001
Table 1 : Video-to-Slideshow and Video-to-Video Transcoding
This solution results in a video transcoding functionality integrated in the DF3/MF3. The Video Transcoding could perform the following conversions :
Video-to-video Video-to-slideshow - Video-to-image
Other possible usages: audio transcoding, media filtering (e.g., only the audio of a video call, no images/clip in web pages or MMS) , replacement of media content by compressed file archives .
To prevent unauthorized users the Content of Communication may be buffered in encrypted form. After sending the CC with lower QoS, it shall be ensured that the possible buffered contents are not altered by unauthorized entities. This can be done by commonly used techniques, like digital signatures. Besides, the HI3 Content of Communication sent to the agency with a lower QoS can serve itself as prove of the buffered contents integrity. The agency can use the same transcoding functionality to verify the integrity of the buffered contents . A prove is obtained if the same contents are obtained with the lower QoS . The idea is that the CC at lower QoS can serve as digital signature of the buffered CC at original QoS. When Agency shall retrieve the buffered CC, it could verify the integrity of such CC by applying on it the transcoding function and comparing the result with the CC at lower Qos . If they are equal, then the retrieved buffered CC is integral .
Receipt of low QoS Content of Communication reduces the storage amount needs in the situation where monitoring centre does not operate in real time. A filtering mechanism at DF3 premises could be optionally offered to make storage needs significantly lower.
Figure 5 discloses a flowchart in which some important steps are shown. The flowchart is to be read together with the earlier shown figures . The flowchart comprises the following steps :
- The request 11 for Lawful Interception activation comprising target identity and service identity Sl is sent from LEMF to ICE. A block 101 discloses this step in figure 5.
- A QoS request 12 is received from LEMF to the MF3/DF3. The request 12 comprises beyond the target identity and the identities of service Sl, a specification of the requested QoS [HI3QoSl] and also the buffering option "Buffering requested" . A block 102 discloses this step in figure 5. - The service Sl is forwarded with the original coded Quality of Services [X3QoSl] from the Packet Duplicator PD in ICE, to the Delivery Function DF3. A block 103 discloses this step in figure 5.
- The requested Quality of Services [HI3QoSl] is lower than the original Quality of Services [X3QoSl] and Sl is transcoded TCl in the MF3/DF3 into the requested Quality of Services [HI3QoSl] . A block 104 discloses this step in figure 5.
- Sl with original Quality of Services [X3QoSl] is buffered BUFFl in a MF3 database. A block 105 discloses this step in figure 5.
- Sl with requested Quality of Services [Hl3QoSl] is sent from MF3/DF3 to LEMF. A block 106 discloses this step in figure 5.
- The* agency finds the [HI3QoSl] to be not sufficient for interception purposes. A block 107 discloses this step in figure 5.
- A further request 13 is sent from LEMF to MF3/DF3. The buffered Sl with original Quality of Services [X3QoSl] is requested to be retrieved. A block 108 discloses this step in figure 5.
- The buffered Sl with original Quality of Services [X3QoSl] is sent on the HI3 from MF3/DF3 to LEMF. A block 109 discloses this step in figure 5.
An example of a system used to put the invention into practice is schematically shown in figure 6. The block schematic constellation corresponds to the one disclosed in figures 2 and 3 but is by no means limited to these two examples . The system disclosed in figure 6 is not necessarily related to monitoring or Lawful Interception and can be used in any data transportation configuration. Figure 6 discloses a delivery function 22 attached to a transmitter
21 and a receiver 28. Traffic, having originally coded QoS is transmitted from 21 to 22. The traffic will optionally arrive to a filter 24 that is used to filter undesired traffic. The delivery function 22 comprises an input 29 to which a specification of requested QoS will arrive. The traffic with originally coded QoS will be received by a comparator 25 used to compare original QoS value with requested QoS value. Traffic may optionally be sent to an Encryption Unit 26 and/or to storage 27 where traffic on request may be buffered. A timer 30 will optionally after lapse, drop the buffered traffic. In dependence of the result from the comparator 25, traffic with original or requested Qos will be forwarded from the deliver function 22 to the receiver 28. A processor unit 23 in delivery function
22 handles the control of traffic and entities within the DF.
Enumerated items are shown in the figures as individual elements . In actual implementations of the invention however, they may be inseparable components of other electronic devices such as a digital computer. Thus, actions described above may be implemented in software that may be embodied in an article of manufacture that includes a program storage medium. The program storage medium includes data signal embodied in one or more of a carrier wave, a computer disk (magnetic, or optical (e.g., CD or DVD, or both) , non-volatile memory, tape, a system memory, and a computer hard drive.
The invention is not limited to the above described and in the drawings shown embodiments but can be modified within the scope of the enclosed claims . The systems and methods of the present invention may be implemented on any of the Third Generation Partnership Project (3GPP) , European Telecommunications Standards Institute (ETSI) , American National Standards Institute (ANSI) or other standard telecommunication network architecture.

Claims

1. Method to enhance delivery capacity for traffic in a communication network, comprising the following steps:
- receiving to an access point (ICE) , a request to monitor traffic (SA, Sl, S2);
- receiving from the access point to a Delivery Function (DF3), the requested traffic (SA, Sl, S2) with originally coded Quality of Services QoS (X3QoSA, X3QoSl, X3QoS2); characterized by
- receiving to the Delivery Function, a specification of requested QoS (HI3QoSA, HI3QoSl, Hl3QoS2);
- establishing that the requested QoS (Hl3QoSA, Hl3QoSl, HI3QoS2) is lower than the originally coded QoS (X3QoSA, X3QoSl, X3QoS2);
- transcoding the received traffic (SA, Sl, S2) into requested QoS (HI3QoSA, HI3QoSl, Hl3QoS2*) .
2. Method according to claim 1 comprising the following further step:
- receiving to a Delivery Function (DF3), a request to buffer requested traffic (Sl) .
3. Method according to claim 1 or 2 comprising the following further step:
- buffering, in the Delivery Function (DF3), the received specified traffic (Sl) with the original coded QoS (X3QoSl) .
4. Method according to claim 1,2 or 3 comprising the following further step:
- forwarding to a receiving facility (LEMF) , the traffic (SA, Sl, S2) transcoded to the requested QoS (Hl3QoSA, HI3QoSl, HI3QOS2) .
5. Method according to claim 3 or 4 comprising the following further steps :
- lapse of a specified time interval;
- dropping out of the buffered traffic (Sl) .
6. Method according to claim 3 or 4 comprising the following further steps :
- receive to the Delivery Function (DF3), a request to drop out buffered traffic (Sl);
- dropping out the buffered traffic (Sl) .
7. Method according to any of the previous claims whereby the traffic is encrypted before buffering.
Method according to any of the previous claims whereby the received traffic is filtered at Delivery Function premises .
9. Method to enhance delivery capacity for traffic in a communication network, comprising the following steps:
- receiving to a Delivery Function (DF3), traffic (SA, Sl, S2) with originally coded Quality of Services QoS (X3QoSA, X3QoSl, X3QoS2); characterized by
- receiving to the Delivery Function, a specification of requested QoS (HI3QoSA, HI3QoSl, Hl3QoS2);
- establishing that the originally coded QoS (X3QoSA, X3QoSl, X3QoS2) is higher than the requested QoS (HI3QoSA, HI3QOS1, Hl3QoS2) ;
- transcoding the received traffic (SA, Sl, S2) into requested QoS (HI3QoSA, Hl3QoSl, Hl3QoS2) .
10. Arrangement used to enhance delivery capacity for traffic in a communication network, comprising:
- means for receiving to an access point (ICE) , a request to monitor traffic (SA, Sl, S2 ) ;
- means for receiving from the access point to a Delivery Function (DF3), the requested traffic (SA, Sl, S2) with originally coded Quality of Services QoS (X3QoSA, X3QoSl, X3QoS2); characterized by
- means for receiving to the Delivery Function, a specification of requested QoS (Hl3QoSA, HI3QoSl, HI3QOS2) ;
- means for establishing that the requested QoS (HI3QOSA, Hl3QoSl, HI3QoS2) is lower than the originally coded QoS (X3QoSA, X3QoSl, X3QoS2) ;
- means for transcoding the received traffic (SA, Sl, S2) into requested QoS (Hl3QoSA, Hl3QoSl, Hl3QoS2) .
11. Arrangement according to claim 10 further comprising:
- means for receiving to the Delivery Function (DF3), a request to buffer requested traffic (Sl) .
12. Arrangement according to claim 10 or 11 further comprising:
- means for buffering, in the Delivery Function (DF3), the received specified traffic (Sl) with the original coded QoS (X3QoSl) .
13. Arrangement according to claim 10,11 or 12 further comprising:
- means for forwarding to a receiving facility (LEMF) , the traffic (SA, Sl, S2) transcoded to the requested QoS (HI3QoSA, HI3QoSl, HI3QoS2) .
14. Arrangement according to claim 12 or 13 further comprising:
- means to detect lapse of a specified time interval;
- means for dropping out of the buffered traffic (Sl) .
15. Arrangement according to claim 12 or 13 further comprising:
- means for receiving to the Delivery Function (DF3), a request to drop out buffered traffic (Sl) ; - means for dropping out the buffered traffic (Sl) .
16. Arrangement according to any of the claims 10-15 comprising means to encrypt the traffic before buffering.
17. Arrangement according to any of the claims 10-16 comprising means to filter the received traffic.
18. Node in a communication network, comprising:
- means to receive requested traffic (SA, Sl, S2 ) with originally coded Quality of Services QoS (X3QoSA, X3QoSl, X3QoS2); characterized by
- means to receive, a specification of requested QoS (HI3QOSA, Hl3QoSl, Hl3QoS2);
- means to establishing that the originally coded QoS
(X3QoSA, X3QoSl, X3QoS2) is higher than the requested QoS (HI3QOSA, HI3QOS1, HI3QoS2) ;
- means for transcoding the received traffic (SA, Sl, S2) into requested QoS (HI3QoSA, HI3QoSl, HI3QoS2) .
19. Article of Manufacture comprising a program storage memory having computer readable program code embodied therein to enhance delivery capacity for traffic in a communication network, the program code comprising:
- computer readable program code able to receive traffic (SA, Sl, S2) with originally coded Quality of Services QoS (X3QoSA, X3QoSl, X3QoS2); characterized by - computer readable program code able to receive a specification of requested QoS (HI3QoSA, Hl3QoSl, HI3QOS2) ;
- computer readable program code able to establish that the originally coded QoS (X3QoSA, X3QoSl, X3QoS2) is higher than the requested QoS (Hl3QoSA, HI3QoSl, HI3QOS2) ;
- computer readable program code able to transcode the received traffic (SA, Sl, S2) into requested QoS (HI3QoSA, HI3QOS1, Hl3QoS2) .
PCT/SE2006/001508 2006-12-28 2006-12-28 Method, arrangement, node and artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos) WO2008082329A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP06835915.7A EP2098052B1 (en) 2006-12-28 2006-12-28 Method, arrangement, node and artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos)
US12/521,704 US8107480B2 (en) 2006-12-28 2006-12-28 Method, arrangement, node and article for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (QoS)
PCT/SE2006/001508 WO2008082329A1 (en) 2006-12-28 2006-12-28 Method, arrangement, node and artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SE2006/001508 WO2008082329A1 (en) 2006-12-28 2006-12-28 Method, arrangement, node and artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos)

Publications (1)

Publication Number Publication Date
WO2008082329A1 true WO2008082329A1 (en) 2008-07-10

Family

ID=39588854

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2006/001508 WO2008082329A1 (en) 2006-12-28 2006-12-28 Method, arrangement, node and artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos)

Country Status (3)

Country Link
US (1) US8107480B2 (en)
EP (1) EP2098052B1 (en)
WO (1) WO2008082329A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013147654A1 (en) * 2012-03-26 2013-10-03 Telefonaktiebolaget Lm Ericsson (Publ) Smart delivery of li data in emergency conditions
WO2015122816A1 (en) * 2014-02-14 2015-08-20 Telefonaktiebolaget L M Ericsson (Publ) Methods and nodes supporting lawful intercept
CN106850535A (en) * 2008-07-24 2017-06-13 爱立信电话股份有限公司 To the Lawful intercept of target in proxy mobile internet protocol network

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110026686A1 (en) * 2008-04-07 2011-02-03 Amedeo Imbimbo Use of unique references to facilitate correlation of data retention or lawful interception records
PL2329631T3 (en) * 2008-07-24 2018-02-28 Telefonaktiebolaget Lm Ericsson (Publ) Lawful interception for 2g/3g equipment interworking with evolved packet system
US8804661B2 (en) * 2009-05-21 2014-08-12 Htc Corporation Method of handling call in handover in wireless communication system and wireless communication device using the same
GB0915152D0 (en) * 2009-09-01 2009-10-07 Vodafone Plc LTE voice call handling
US9258231B2 (en) * 2010-09-08 2016-02-09 International Business Machines Corporation Bandwidth allocation management
CN103959714B (en) 2012-11-19 2017-06-20 华为技术有限公司 Configure method, monitor method, device and the entity of monitoring users data path
US9853888B2 (en) * 2013-07-15 2017-12-26 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangements for QoS-aware routing in a LI system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004010649A1 (en) * 2002-07-19 2004-01-29 Nokia Corporation Informing a lawful interception system of the serving system serving an intercepted target
US20040228362A1 (en) * 2003-05-16 2004-11-18 Toni Maki Multimedia component interception in a gateway GPRS support node (GGSN)
DE102004040479A1 (en) 2004-08-20 2006-03-09 Siemens Ag Method and device for user data acquisition of multimedia connections in a packet network
WO2006065190A1 (en) * 2004-12-16 2006-06-22 Telefonaktiebolaget Lm Ericsson (Publ) Advanced lawful interception of sms
WO2006096383A2 (en) 2005-03-08 2006-09-14 Audiocodes Usa, Inc. Method and apparatus for voice-over-ip call recording

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1248431B1 (en) * 2001-03-27 2007-10-31 Sony Deutschland GmbH Method for achieving end-to-end quality of service negotiation for distributed multimedia applications
US7636363B2 (en) * 2003-07-28 2009-12-22 International Business Machines Corporation Adaptive QoS system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004010649A1 (en) * 2002-07-19 2004-01-29 Nokia Corporation Informing a lawful interception system of the serving system serving an intercepted target
US20040228362A1 (en) * 2003-05-16 2004-11-18 Toni Maki Multimedia component interception in a gateway GPRS support node (GGSN)
DE102004040479A1 (en) 2004-08-20 2006-03-09 Siemens Ag Method and device for user data acquisition of multimedia connections in a packet network
WO2006065190A1 (en) * 2004-12-16 2006-06-22 Telefonaktiebolaget Lm Ericsson (Publ) Advanced lawful interception of sms
WO2006096383A2 (en) 2005-03-08 2006-09-14 Audiocodes Usa, Inc. Method and apparatus for voice-over-ip call recording

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Lawful Interception (LI); Handover interface for lawful interception of telecommunications traffic", ETSI TS 101671 V2.15.1, November 2006 (2006-11-01), XP014036225 *
See also references of EP2098052A4

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850535A (en) * 2008-07-24 2017-06-13 爱立信电话股份有限公司 To the Lawful intercept of target in proxy mobile internet protocol network
WO2013147654A1 (en) * 2012-03-26 2013-10-03 Telefonaktiebolaget Lm Ericsson (Publ) Smart delivery of li data in emergency conditions
US9461916B2 (en) 2012-03-26 2016-10-04 Telefonaktiebolaget Lm Ericsson (Publ) Smart delivery of LI data in emergency conditions
WO2015122816A1 (en) * 2014-02-14 2015-08-20 Telefonaktiebolaget L M Ericsson (Publ) Methods and nodes supporting lawful intercept
US11425173B2 (en) 2014-02-14 2022-08-23 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes supporting lawful intercept

Also Published As

Publication number Publication date
US8107480B2 (en) 2012-01-31
EP2098052A1 (en) 2009-09-09
EP2098052A4 (en) 2012-02-29
EP2098052B1 (en) 2018-11-28
US20100142389A1 (en) 2010-06-10

Similar Documents

Publication Publication Date Title
EP2098052B1 (en) Method, arrangement, node and artictle for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos)
EP1396113B1 (en) Method and system allowing lawful interception of connections such as voice-over-internet-protocol calls
EP2243286B1 (en) Lawful interception of non-local subscribers
US8400927B2 (en) Service based lawful interception
US7969968B2 (en) Lawful interception in wireline broadband networks
CN1969582B (en) Session establishment for real-time media communication service
US9253273B2 (en) User data automatic lookup in lawful interception
US20090047932A1 (en) Cell broadcast via encoded message to an embedded client
CA2720415C (en) One activity report for interception purposes
EP1976186A1 (en) A method for realizing the legal listening in the next generation network and a system thereof
US20090088139A1 (en) Method, network unit and system for providing subscriber information of a group call to an interception unit
US20180241782A1 (en) Methods and Devices for Detecting and Correlating Data Packet Flows in a Lawful Interception System
EP2920918B1 (en) Method for providing a law enforcement agency with sampled content of communications
EP1902580B1 (en) Quality of a realtime service
EP3323231B1 (en) Method and system for removing redundant received data flows of interception in ims domains
CN100396025C (en) Monitoring method, as well as device and system for collecting monitored data
EP1667414A2 (en) Lawful interception of compressed voice calls
CN101772195B (en) Establishing and joining method of IMS (information management system) trunking conference, distribution system and device
US20040253957A1 (en) Mobile terminal control of the establishment of multimedia sessions
CN100388662C (en) Method for preventing user with 3G ability from using transition right-identification mode
US9307401B2 (en) Method to detect calls on an AMR-WB capable network
CN110537353B (en) Method and node in lawful interception system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06835915

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2006835915

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 3843/DELNP/2009

Country of ref document: IN

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 12521704

Country of ref document: US