WO2009052713A1 - Dispositif, procédé et système pour limiter l'autorité d'interception - Google Patents

Dispositif, procédé et système pour limiter l'autorité d'interception Download PDF

Info

Publication number
WO2009052713A1
WO2009052713A1 PCT/CN2008/071938 CN2008071938W WO2009052713A1 WO 2009052713 A1 WO2009052713 A1 WO 2009052713A1 CN 2008071938 W CN2008071938 W CN 2008071938W WO 2009052713 A1 WO2009052713 A1 WO 2009052713A1
Authority
WO
WIPO (PCT)
Prior art keywords
listening
information
monitored user
monitored
user
Prior art date
Application number
PCT/CN2008/071938
Other languages
English (en)
Chinese (zh)
Inventor
Xinbao Liu
Sihai Ye
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2009052713A1 publication Critical patent/WO2009052713A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/14Special services or facilities with services dependent on location

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, apparatus, and system for limiting listening rights. Background technique
  • Lawful interception is a security agency that monitors the communication events and communication content of a specific user. When the security authority needs to listen to a specific user, the monitoring center sends a listening command to the communication device through the legal listening gateway.
  • the term "communication equipment” as used herein refers to a control device with monitoring capability in a communication network, such as a mobile switching center of a GSM (Global System for Mobile communications) network or an HLR (Home Location Register), PSTN. (Public Switched Telephone Network) A switch of the network, which is generally referred to as a network element in the field of monitoring technology.
  • a network element When a network element detects a communication event of a specific user, it reports to the interception center through the legal interception gateway, or copies a specific user's communication content, and then passes the legal interception gateway to the monitoring center. During this process, the normal communication service of the user is not affected.
  • the integration and performance of communication equipment has increased, and the capacity of communication equipment has been continuously expanded, so that the service of one network element can cover multiple areas (multiple countries or multiple administrative areas within a country).
  • the inventors of the present invention found in the prior art that if the network element is covered by the service In a plurality of areas, as long as the monitoring center is connected to the network element, communication events and communication contents of other areas of the network element service area may still be monitored by the monitoring center, but the actual listening center permission range is limited to the network element. Part of the service area, so in the prior art, the listening permission of the monitoring center cannot be well restricted.
  • the security authority's listening permission range includes area 1, not including area 2, and area 1 and area 2 are all served by network element A, and network element A is connected to the monitoring center set to the security authority through a legal listening gateway.
  • the communication event and the communication content may be monitored by the monitoring center of the security authority. Therefore, the prior art cannot satisfy the law that the security authority cannot monitor the area outside the scope of its own authority. Summary of the invention
  • the purpose of the embodiments of the present invention is to provide a method, apparatus, and system for limiting the listening rights, so as to ensure that the monitoring center can only perform monitoring according to its own permission range.
  • the embodiment of the invention discloses a method for limiting the listening permission, which comprises:
  • the monitoring restriction device determines, according to the location information of the monitored user, whether the current location of the monitored user belongs to the listening permission range of the monitoring center;
  • the intercepted listening information of the monitored user is reported
  • the monitored information of the monitored user is not reported.
  • the embodiment of the invention further discloses an apparatus for limiting the listening authority, comprising:
  • a location information unit configured to acquire location information of the monitored user, and send the obtained location information of the monitored user to the determining unit;
  • the permission information unit is configured to obtain the permission information of the monitoring center, and the right of the listening center to be obtained
  • the limit information is sent to the judgment unit
  • a determining unit configured to receive location information of the monitored user from the location information unit, receive the permission information of the monitoring center from the rights information unit, and determine, according to the location information of the monitored user and the permission information of the monitoring center, whether the current location of the user is The listening center belongs to the listening center, and if the current location of the monitored user belongs to the listening center listening permission range, the monitored listening information of the monitored user is reported, if the current location of the monitored user does not belong to the monitoring center. Within the scope of the listening permission, the monitored information of the monitored user is not reported.
  • the embodiment of the invention further discloses a system for limiting the listening authority, comprising:
  • the network element, the lawful interception gateway, and the monitoring center wherein the network element or the legal listening center includes a device for restricting the listening permission, and the device includes:
  • a location information unit configured to acquire location information of the monitored user, and send the obtained location information of the monitored user to the determining unit;
  • the privilege information unit is configured to obtain the privilege information of the monitoring center, and send the obtained privilege information of the monitoring center to the determining unit;
  • a determining unit configured to receive location information of the monitored user from the location information unit, receive the permission information of the monitoring center from the rights information unit, and determine, according to the location information of the monitored user and the permission information of the monitoring center, whether the current location of the user is The listening center belongs to the listening center, and if the current location of the monitored user belongs to the listening center listening permission range, the monitored listening information of the monitored user is reported, if the current location of the monitored user does not belong to the monitoring center. Within the scope of the listening permission, the monitored information of the monitored user is not reported.
  • the technical solution of the embodiment of the present invention obtains and compares the user location information and the monitoring center permission range information, and reports the monitored information of the user when the user location belongs to the monitoring center permission range, and the user location does not belong to the monitoring center permission range. When the user is not reported, the monitored signal is monitored. Information, to prevent security agencies from listening to areas outside their own scope of authority.
  • FIG. 1 is a schematic diagram of a network for restricting monitoring rights according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a method for restricting monitoring permission according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a method for restricting monitoring permission according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a method for restricting monitoring permission according to another embodiment of the present invention.
  • FIG. 5 is a structural diagram of a device for restricting monitoring rights according to an embodiment of the present invention.
  • FIG. 6 is a structural diagram of a system for restricting a listening authority according to an embodiment of the present invention.
  • FIG. 7 is a structural diagram of another system for limiting the listening authority according to an embodiment of the present invention. detailed description
  • FIG. 1 is a network diagram of a monitoring network according to an embodiment of the present invention.
  • the monitoring center 104 listens to the monitored user 101 through the monitoring network 105.
  • the monitoring network 105 includes a network element 102 and a legal listening gateway 103, and the network element 102. Both the lawful interception gateway 103 can limit the listening rights.
  • Step 201 detecting that a communication event occurs by the monitored user;
  • the lawful interception gateway or network element detects that a monitored user has a communication event, such as a call, a short message, and a location update.
  • Step 202 Determine whether the user location belongs to the scope of the monitoring permission
  • the lawful interception gateway or the network element determines whether the user location belongs to the listening center listening permission range, and if yes, proceeds to step 203; if not, proceeds to step 204.
  • Step 203 Report the monitored information of the monitored user.
  • the reported monitoring information may include a related signaling message of a user communication event, such as a signaling message of a call setup process, and may also include specific content of the user communication, such as voice, short message content, etc.
  • the scope of the monitoring information belongs to the prior art content, and will not be described in detail herein.
  • Step 204 The monitored information of the monitored user is not reported.
  • the lawful interception gateway or network element ignores or discards the monitored information of the monitored monitored user.
  • the GSM network is taken as an example to illustrate a specific method for the lawful interception gateway to implement the restricted listening permission.
  • the network element is a Mobile Switching Center (MSC)
  • MSC Mobile Switching Center
  • X interface the interface between the lawful interception center and the network element.
  • the method includes:
  • Step 301 The interception center sends a monitoring command to the legal listening gateway.
  • Step 302 The lawful interception gateway sends the interception command to the network element.
  • Step 303 The network element detects that a communication event occurs by the monitored user.
  • Step 304 The network element reports the intercepted user interception information to the legal listening gateway.
  • Step 305 The legal interception gateway acquires the interception center authority information.
  • the legal listening gateway acquires the monitoring center authority information
  • the legal listening gateway can only obtain the listening center permission information once.
  • Step 306 The location information of the user on the network element
  • the user When the user's location is initially determined, or the user's location changes, such as a user's location update, the user switches, and the user logs back in to the other location and the network element reports the user location information.
  • the user location is fixed, or the user location does not change, and the network element can report only the user location information once;
  • Mobility Management MM provides user location information management;
  • the network element can obtain related location information when the user registers. For example, the network element can obtain the accessed IP address when the user registers, and obtain the location information of the user according to the IP address, or the network element also The physical location information of the user can be obtained from the mapping relationship between the user IP address and the location configured on the P-CSCF.
  • step 304 the monitored monitored user listening information reported by the network element to the legal listening gateway already contains the user location information, optimally, this step can be skipped.
  • Step 307 The lawful interception gateway acquires user location information.
  • Step 308 The lawful interception gateway determines whether the user location belongs to the scope of the interception authority
  • the legal interception gateway determines whether to monitor the monitored information of the monitored user to the monitoring center according to the location information of the monitored user and the listening permission range of the monitoring center: If the user location does not belong to the listening center listening permission range, step 309 is performed. The user location is within the listening permission range of the monitoring center, and step 310 is performed.
  • Step 309 The lawful interception gateway does not monitor the monitored information of the monitored user.
  • Step 310 Legally listen to the intercepted information of the monitored user on the gateway.
  • the data configuration of the corresponding network element itself has recorded the initial location information of the user.
  • the NE can report the user's location information according to its own data configuration.
  • step 308 the lawful interception gateway determines whether the user location belongs to the interception scope of the interception center
  • step 305 is completed (the lawful interception gateway acquires the interception center authority information)
  • step 307 legal The monitoring gateway obtains the user location information
  • the purpose of limiting the listening permission of the monitoring center can be achieved. Therefore, in the process of implementing the present invention, those skilled in the art The member may not be bound by the specific sequence of steps of the embodiment.
  • the legal listening gateway compares the location information of the monitored user with the monitoring permission range of the monitoring center. If the location information of the monitored user does not belong to the monitoring permission range of the monitoring center, the corresponding monitoring is not reported to the monitoring center.
  • the intercepted user's listening information thereby limiting the listening permission, ensures that the listening center without permission does not receive the monitored information of the monitored user.
  • the GSM network is taken as an example to describe a specific method for the network element to implement the restricted listening permission.
  • the network element is a mobile switching center MSC, and the interface between the lawful interception center and the network element is an X interface.
  • the method includes:
  • Step 401 The interception center sends a monitoring command to the legal listening gateway.
  • Step 402 The lawful interception gateway sends the interception command to the network element.
  • Step 403 The network element detects that a communication event occurs by the monitored user.
  • Step 404 The lawful interception gateway acquires the information of the interception center authority
  • the legal listening gateway acquires the monitoring center authority information
  • the legal listening gateway can only obtain the listening center permission information once.
  • Step 405 The lawful interception gateway sends the interception center authority information to the network element.
  • the lawful interception gateway sends the interception center authority information to the network element by extending the X interface, such as the list of areas that the interception center has permission to listen to.
  • the network element receives the permission information of the monitoring center.
  • Step 406 The network element acquires the permission information of the monitoring center.
  • Step 407 The network element acquires user location information.
  • the network element can report the user location information only once;
  • mobility management provides user location information management.
  • the network element can obtain related location information when the user registers. For example, the network element can obtain the accessed IP address when the user registers, and obtain the location information of the user according to the IP address, or the network element also The physical location information of the user can be obtained from the mapping relationship between the user IP address and the location configured on the P-CSCF.
  • Step 408 The network element determines whether the user location belongs to the scope of the interception authority.
  • the network element determines whether to listen to the monitored information of the monitored user on the legal listening center according to the location information of the monitored user and the listening permission range of the monitoring center: If the user location does not belong to the listening center listening permission range, go to step 409. If the user location belongs to the listening center listening permission range, go to step 410.
  • Step 409 The network element does not monitor the monitored information of the monitored user.
  • Step 410 The monitored information of the monitored user is monitored on the network element.
  • the method further includes: the lawful interception network element reports the monitored information of the monitored user.
  • the data configuration of the corresponding network element itself has recorded the initial location information of the user.
  • the NE can report the user's location information according to its own data configuration.
  • the sequence between the steps is strictly defined.
  • the step 406 is completed before the network element acquires the monitoring center in step 408 (the network element determines whether the user location belongs to the scope of the listening authority).
  • Privilege information the network element obtains user location information
  • step 407 the network element obtains user location information
  • the network element compares the location information of the monitored user with the listening permission range of the monitoring center. If the location information of the monitored user does not belong to the listening permission range of the monitoring center, the network monitoring device does not monitor the corresponding listening gateway.
  • the listening information of the monitored user thereby limiting the listening permission, ensures that the listening center without permission does not receive the monitoring information of the monitored user that the user listens to.
  • Fig. 5 shows a block diagram of the apparatus of the embodiment of the present invention.
  • the monitoring device 504 can be a legal listening center or a network element, including:
  • the location information unit 501 is configured to obtain location information of the monitored user, and provide the obtained location information of the monitored user to the determining unit 502.
  • the location information unit 501 obtains the location information of the monitored user. If the monitoring device 504 is a legal listening center, the location information unit 501 obtains the location information of the monitored user from the network element reporting information.
  • the determining unit 502 is configured to determine whether to report the monitored information of the monitored monitored user.
  • the judging unit 502 receives the location information of the monitored user from the location information unit 501, and receives the authority information of the interception center from the rights information unit 503.
  • the judging unit 502 judges whether to monitor the monitored information of the monitored user according to the location information of the monitored user and the permission information of the monitoring center provided by the authority information unit 503 provided by the location information unit 501. If the user location belongs to the listening center listening permission range, the monitored information of the monitored user is reported; otherwise, the monitored information of the monitored user is not monitored.
  • the permission information unit 503 is configured to obtain permission information of the monitoring center.
  • the rights information unit 503 acquires the rights information of the monitoring center; If the listening device 504 is a network element, the rights information unit 503 obtains the rights information from the command of the extended X interface.
  • the authority information unit 503 supplies the obtained authority information of the monitoring center to the determination unit 502.
  • a network element has a function of acquiring user location information.
  • a location information unit of a network element can obtain location information from a mobility management function.
  • a location information element of a network element can be obtained from The local data configuration obtains the location information.
  • the location information of the user may be obtained according to the IP address accessed by the user and the corresponding relationship between the IP address and the location.
  • the lawful interception gateway has the function of acquiring the information of the interception center authority.
  • the authority information unit of the lawful interception gateway can obtain the interception center authority information from the local data configuration.
  • FIG. 6 shows a schematic diagram of a system for restricting the listening authority according to an embodiment of the present invention.
  • the system 601 for restricting the listening permission by the network element includes:
  • 602 an network element
  • the network element 602 includes:
  • the location information unit 605 is configured to obtain location information of the monitored user, and provide the obtained location information of the monitored user to the determining unit 606.
  • the determining unit 606 is configured to determine whether to report the monitored information of the monitored monitored user.
  • the determining unit 606 determines whether to report the monitored information of the monitored monitored user according to the location information of the monitored user and the permission information of the monitoring center provided by the rights information unit 607 provided by the location information unit 605. If the user location belongs to the listening center listening permission range, the reported monitoring is monitored. The user's listening information; otherwise, it does not listen to the monitored information of the monitored user.
  • the permission information unit 607 is configured to obtain permission information of the monitoring center.
  • the authority information unit 607 acquires the authority information from the command of the extension X interface.
  • the authority information unit 607 provides the obtained authority information of the monitoring center to the judgment unit 606.
  • FIG. 7 shows a schematic diagram of a monitoring system according to an embodiment of the present invention.
  • the system 701 for restricting the listening permission by the legal listening gateway includes:
  • the lawful interception gateway 703 includes:
  • the location information unit 705 is configured to obtain the location information of the monitored user from the message reported by the network element, and provide the obtained location information of the monitored user to the determining unit 706.
  • the determining unit 706 is configured to determine whether to report the monitored information of the monitored monitored user.
  • the determining unit 706 determines whether to monitor the monitored information of the monitored user according to the location information of the monitored user and the permission information of the monitoring center provided by the rights information unit 707 provided by the location information unit 705. If the user location belongs to the listening center listening permission range, the monitored information of the monitored user is reported; otherwise, the monitored information of the monitored user is not monitored.
  • the permission information unit 707 is configured to obtain the permission information of the monitoring center, and provide the obtained permission information of the monitoring center to the determining unit 706.
  • the embodiments of the present invention provide two schemes for restricting the listening permission: the lawful intercepting gateway limits the listening authority of the monitoring center and the network element limits the listening authority of the monitoring center.
  • the monitoring permission of the monitoring center can be restricted without being restricted by the above two schemes. As long as there is a node recording the monitoring center authority information and the user location information on the information path related to the monitoring system, it can be judged whether it is up. Reporting the monitored information of the monitored user, this node can even be a new independent node.
  • the technical solution disclosed in the embodiment of the present invention obtains and compares the user location information and the monitoring center permission range information, and when the user location belongs to the monitoring center permission range, reports the monitored information of the user, when the user location does not belong to the monitoring center permission. In the range, the monitored information of the user is not reported, and the security authority is prevented from listening to areas outside the scope of its own authority.

Abstract

La présente invention concerne un procédé, un dispositif et un système permettant de limiter l'autorité d'interception. L'interception licite correspond à l'interception réalisée par les organes de sécurité sur des utilisateurs de communication déterminés. Pour éviter que les organes de sécurité n'abusent de l'autorité, la législation édicte que l'organe de sécurité ne peut pas réaliser d'interception sur la cible hors de sa portée de compétence. Lorsque la portée de service de l'élément réseau ou la passerelle d'interception licite est plus étendue, l'organe de sécurité peut surveiller la zone à l'égard de laquelle il n'a aucune autorité de surveillance. Ainsi, lorsque la zone que l'organe de sécurité n'est pas habilité à surveiller est impliquée, il est nécessaire de limiter l'autorité d'interception de l'organe de sécurité. Le procédé permettant de limiter l'autorité d'interception comprend : l'obtention des informations de localisation de l'utilisateur surveillé et des informations de portée d'autorité de l'organe de sécurité ; la comparaison de la localisation de l'utilisateur surveillé et de la portée d'autorité de l'organe de sécurité ; lorsque la localisation de l'utilisateur surveillé se trouve dans la portée d'autorité de l'organe de sécurité, et seulement dans ce cas, les informations d'interception de l'utilisateur surveillé sont rapportées.
PCT/CN2008/071938 2007-10-22 2008-08-09 Dispositif, procédé et système pour limiter l'autorité d'interception WO2009052713A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200710124064.2 2007-10-22
CNA2007101240642A CN101150826A (zh) 2007-10-22 2007-10-22 限制监听权限的方法、装置和系统

Publications (1)

Publication Number Publication Date
WO2009052713A1 true WO2009052713A1 (fr) 2009-04-30

Family

ID=39251102

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/071938 WO2009052713A1 (fr) 2007-10-22 2008-08-09 Dispositif, procédé et système pour limiter l'autorité d'interception

Country Status (2)

Country Link
CN (1) CN101150826A (fr)
WO (1) WO2009052713A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101720088A (zh) * 2009-12-28 2010-06-02 中兴通讯股份有限公司 手机通话过程中防窃听的方法和手机

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150826A (zh) * 2007-10-22 2008-03-26 华为技术有限公司 限制监听权限的方法、装置和系统
CN102026175A (zh) * 2009-09-23 2011-04-20 中兴通讯股份有限公司 一种监听系统中的移动用户定位方法及系统
US8818049B2 (en) * 2011-05-18 2014-08-26 Google Inc. Retrieving contact information based on image recognition searches
CN102223455B (zh) * 2011-07-22 2013-09-25 迈普通信技术股份有限公司 Voip电话监听系统及监听方法
CN106131352B (zh) * 2016-08-29 2019-04-12 哈尔滨海能达科技有限公司 一种呼叫监听方法、装置、相关设备及系统
CN107257546A (zh) * 2017-06-19 2017-10-17 哈尔滨海能达科技有限公司 一种用于集群系统的区域自动监听方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1262835A (zh) * 1998-02-02 2000-08-09 摩托罗拉公司 基于位置的监听方法和装置
CN1535067A (zh) * 2003-03-28 2004-10-06 华为技术有限公司 一种基于小区位置的监听方法
CN1684529A (zh) * 2004-04-12 2005-10-19 华为技术有限公司 一种基于通用移动通信系统的监听方法
CN101035036A (zh) * 2007-04-19 2007-09-12 中兴通讯股份有限公司 合法监听系统和方法
CN101150826A (zh) * 2007-10-22 2008-03-26 华为技术有限公司 限制监听权限的方法、装置和系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1262835A (zh) * 1998-02-02 2000-08-09 摩托罗拉公司 基于位置的监听方法和装置
CN1535067A (zh) * 2003-03-28 2004-10-06 华为技术有限公司 一种基于小区位置的监听方法
CN1684529A (zh) * 2004-04-12 2005-10-19 华为技术有限公司 一种基于通用移动通信系统的监听方法
CN101035036A (zh) * 2007-04-19 2007-09-12 中兴通讯股份有限公司 合法监听系统和方法
CN101150826A (zh) * 2007-10-22 2008-03-26 华为技术有限公司 限制监听权限的方法、装置和系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101720088A (zh) * 2009-12-28 2010-06-02 中兴通讯股份有限公司 手机通话过程中防窃听的方法和手机

Also Published As

Publication number Publication date
CN101150826A (zh) 2008-03-26

Similar Documents

Publication Publication Date Title
JP3981118B2 (ja) インターセプトされた目標にサービス提供するサービスシステムを合法インターセプトシステムに通知する方法
WO2009052713A1 (fr) Dispositif, procédé et système pour limiter l'autorité d'interception
CN101816199B (zh) 附连至与例如ims的安全核心网络通信的毫微微小区的移动单元的认证方法
CN100484274C (zh) 分组模式语音通信
US9042388B2 (en) Lawful interception for 2G/3G equipment interworking with evolved packet system
WO2014032570A1 (fr) Procédé, équipement d'utilisateur et plate-forme de gestion à distance, pour la commutation du réseau d'un opérateur
TW200803431A (en) Method and apparatus for supporting an emergency call in a wireless metropolitan area network
JP2003524336A (ja) 送信データの量をチェックする方法
WO2013144669A1 (fr) Système et procédé d'interception licite dans une continuité d'appel vocal pour réseaux de télécommunications
TWI473487B (zh) 管理位置資訊之方法及相關之通用接取網路控制器、行動交換中心及服務通用封包無線系統服務節點
WO2001091374A1 (fr) Procede et appareil d'interception de paquets dans un reseau oriente paquets
WO2008154845A1 (fr) Procédé et système d'interception légale et dispositif réseau
US20140073295A1 (en) Interception of databases
CN106850535A (zh) 对代理移动因特网协议网络中目标的合法侦听
US8644153B2 (en) Infrastructure for mediation device to mediation device communication
JP2007521530A (ja) 通信ネットワークにおける監視
US20080090555A1 (en) Managing Faults and Filters in Providing Foreign Services
KR101043185B1 (ko) 차세대 통신망에서의 감청시스템 및 방법
EP1772036B1 (fr) Fourniture d'informations de localisation en informations relatives a l'interception (iri)
JP2011035911A (ja) 移動通信システムにおける位置サービスの処理方法およびその装置
WO2009006846A1 (fr) Procédé, appareil servant à suivre des appels et contrôleur de réseau radio
WO2009089777A1 (fr) Procédé, appareil de mise à jour de la zone d'emplacement lors de la commutation de réseau
KR100881423B1 (ko) 이동통신망에서 전자감시 시스템, 그에 따른 방법 및 그에따른 장치
KR20090090940A (ko) Ⅰp 멀티미디어 서브시스템에서의 감청 제공 시스템 및제어방법
WO2014048238A1 (fr) Procédé et dispositif de détection de cellules invalides, procédé et dispositif de commande de commutation de terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08783931

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08783931

Country of ref document: EP

Kind code of ref document: A1