WO2010111843A1 - 合法监听的方法、系统及移动交换中心 - Google Patents

合法监听的方法、系统及移动交换中心 Download PDF

Info

Publication number
WO2010111843A1
WO2010111843A1 PCT/CN2009/071166 CN2009071166W WO2010111843A1 WO 2010111843 A1 WO2010111843 A1 WO 2010111843A1 CN 2009071166 W CN2009071166 W CN 2009071166W WO 2010111843 A1 WO2010111843 A1 WO 2010111843A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
bss
msc
local exchange
handover
Prior art date
Application number
PCT/CN2009/071166
Other languages
English (en)
French (fr)
Inventor
柳军
王之曦
朱星
秦钧
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP09842500A priority Critical patent/EP2426967A4/en
Priority to CN200980117319.XA priority patent/CN102405662B/zh
Priority to PCT/CN2009/071166 priority patent/WO2010111843A1/zh
Publication of WO2010111843A1 publication Critical patent/WO2010111843A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/304Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting circuit switched data communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/10Reselecting an access point controller

Definitions

  • the present invention relates to the field of mobile communication technologies, and in particular, to a method, system, and mobile switching center for lawful interception. Background technique
  • the mobile switching center (MSC) in the core network (CN) generally completes the connection of the voice channels of two communication terminals of one session, that is, the call is to be Establish a user plane link and a control plane link from the terminal to the MSC via a Base Station Sub-system (BSS).
  • BSS Base Station Sub-system
  • the above transmission network is an important part of a mobile communication network, especially a Global System for Mobile communication (GSM) network.
  • GSM Global System for Mobile communication
  • the local exchange of the user plane link in the BSS is an effective method for reducing the occupation of the transmission resource.
  • the local exchange performed in the BSS that is, the channel of the two communication terminals is looped back in the BSS.
  • the basic scheme of the local exchange is that the control plane link of the call is still connected to the MSC in the CN for control, and the user plane link of the call is directly looped inside the BSS.
  • Lawful interception refers to the activities of the national security department to monitor telecommunication services within the scope permitted by law. Any monitoring activity should be authorized by the relevant national authorities.
  • all operating mobile communication networks including GSM, Code Division Multiple Access (CDMA) and future Wideband Code Division Multiple Access (GW) Multiple Access (W-CDMA for short), etc., must enable the national security department to monitor the target user equipment and provide a listening interface for monitoring.
  • the monitoring system of the national security department accesses the mobile communication network through the interception interface to implement monitoring of the target user equipment, wherein the target user equipment refers to the communication terminal that is being monitored.
  • the services that can be monitored include: call service, fax service, asynchronous data service, short message service, and supplementary service.
  • the devices that require the interception access function include: Home Location Register (HLR), Mobile Switch Center (MSC), and Short Message Center (SMC).
  • HLR Home Location Register
  • MSC Mobile Switch Center
  • SMC Short Message Center
  • the interception of all calls is provided by the MSC to the listening system.
  • the embodiments of the present invention provide a method, a system, and a mobile switching center for lawful interception, so as to implement lawful interception of voice channels between terminals.
  • the embodiment of the invention provides a method for lawful interception, which includes:
  • the mobile switching center MSC is configured to perform lawful interception of the conversation path.
  • the embodiment of the present invention further provides a mobile switching center MSC for lawful interception, where the MSC is used to establish local exchange of the voice between the first terminal and the second terminal in the base station subsystem BSS or in the BSS. After establishing a local exchange of the voice channel between the first terminal and the second terminal, the BSS is notified to output a bypass to the mobile switching center MSC for performing lawful interception of the session.
  • the embodiment of the present invention further provides a lawful interception system, including: a mobile switching center MSC, a base station subsystem BSS, and a monitoring system, where The MSC is configured to establish a local exchange between the first terminal and the second terminal in the base station subsystem BSS, or establish a local exchange between the first terminal and the second terminal in the BSS, Said BSS output bypass to the mobile switching center MSC;
  • a lawful interception system including: a mobile switching center MSC, a base station subsystem BSS, and a monitoring system, where The MSC is configured to establish a local exchange between the first terminal and the second terminal in the base station subsystem BSS, or establish a local exchange between the first terminal and the second terminal in the BSS, Said BSS output bypass to the mobile switching center MSC;
  • the BSS is configured to perform a bypass operation, and the output is bypassed to the MSC to connect the established session between the terminals to the MSC;
  • the MSC is further configured to extract voice from the bypass connected to the MSC to the listening system; the monitoring system is configured to perform lawful interception of the conversation path by voices elicited from the MSC.
  • the method, system and mobile switching center of the lawful interception of the embodiment of the present invention can realize the bypass from the MSC for the monitoring system by continuing the call between the two terminals to the MSC from the BSS.
  • the method does not cause a voice interruption on the voice between the two terminals that have established the local exchange or can shorten the time of the voice interruption, so that the listener is not easily aware that the voice channel is being monitored.
  • FIG. 1 is a schematic structural diagram of a network for implementing lawful interception while establishing a switching of a user plane link in an MSC according to the present invention
  • FIG. 2 is a schematic structural diagram of a network that cannot implement lawful interception after a user plane link establishes a local exchange in a BSS according to the present invention
  • FIG. 3 is a signaling flowchart of an embodiment of a method for lawful interception according to the present invention.
  • FIG. 4 is a schematic diagram of a voice path of an embodiment of a method for lawful interception according to the present invention.
  • FIG. 5 is a signaling flowchart of another embodiment of a method for lawful interception according to the present invention.
  • FIG. 5 is another signaling flowchart of another embodiment of a method for lawful interception according to the present invention.
  • FIG. 6 is a signaling flowchart of still another embodiment of a method for lawful interception according to the present invention.
  • FIG. 7 is a signaling flowchart of still another embodiment of a method for lawful interception according to the present invention.
  • FIG. 8 is a schematic structural diagram of an MSC for lawful interception according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of another embodiment of an MSC for lawful interception according to the present invention.
  • FIG. 10 is a schematic structural diagram of still another embodiment of an MSC for lawful interception according to the present invention.
  • FIG. 11 is a schematic structural diagram of another embodiment of an MSC for lawful interception according to the present invention;
  • FIG. 13 is a schematic structural diagram of an embodiment of a system for lawful interception according to the present invention; detailed description
  • FIG. 1 is a schematic diagram of a network structure for implementing lawful interception while establishing a switching of a user plane link in an MSC according to the present invention.
  • the user plane link that is, the voice channel between the two terminals MS1 and MS2 is connected to the MSC and looped back in the MSC. As long as the bypass is taken from the MSC to the monitoring system, one terminal or two terminals can be realized.
  • FIG. 2 is a schematic diagram of a network structure in which the user plane link cannot perform lawful interception after establishing a local exchange in the BSS according to the present invention. As shown in FIG.
  • the user plane link that is, the channel between the two terminals MS1 and MS2 is looped back in the BSS;
  • the BSS mainly includes the BSC and the BTS, and the loopback in the BSS may be two in the same BSC.
  • the voice channel between the terminals is looped back in the BSC, or the voice channel between the two terminals in the same BTS (cluster) is looped back in the BTS (cluster).
  • the scenario shown in Figure 2 is performed in the BSC. return.
  • the voice channel between the two terminals MS1 and MS2 does not need to be connected to the MSC, which saves the resources of the A interface between the BSS and the MSC, but cannot establish the legal interception from the MSC at this time.
  • the following embodiments of the present invention will specifically describe a technical solution for performing lawful interception of inter-terminal voice channels in a scenario in which two terminals perform local exchange in a BSS. It should be noted that the local exchange of inter-terminal voice channels established in the BSS mentioned in the embodiment of the present invention does not distinguish between local exchange within the BSC or local exchange within the BTS.
  • the technical solution adopted by the embodiment of the present invention is to establish local exchange of inter-terminal voice channels in the BSS.
  • the BSS is notified to the bypass to the MSC for performing lawful interception of the voice channel between the terminals; the local exchange of the inter-terminal voice channel may also be established in the base station subsystem BSS.
  • the local exchange is cancelled, and the voice channel between the MSC and the MSC is established for the terminal, and the voice channel is looped back through the MSC and the bypass is taken out from the MSC as a voice channel for legal interception.
  • the local exchange of the inter-terminal voice channel is established in the BSS
  • the local exchange is cancelled, and the voice channel between the MSC and the MSC is established for the terminal, and the voice channel is looped back through the MSC and bypassed from the MSC.
  • the scheme for the output of the lawful interception as the session path is specifically as follows:
  • the MSC notifies the BSS to cancel the local exchange of the voice channel between the two terminals, and establishes that the user plane link of the two terminals on the A interface is connected to the MSC, so that the words between the two terminals are
  • the road is connected to the MSC and looped back in the MSC, so that the bypass can be taken out from the MSC as a dialogue path for the lawful interception output for the lawful interception of the voice channel between the monitoring system and the terminal.
  • the MSC can perform the direct interception, that is, the MSC cancels the bypass of the output to the monitoring system without the assistance of the BSS.
  • FIG. 3 is a signaling flowchart of an embodiment of a method for lawful interception according to the present invention. This embodiment is implemented in the following scenario: Two terminals in the same session, i.e., the voice channel between the first terminal and the second terminal, have established a local exchange within the BSS. As shown in Figure 3, the following steps are included:
  • Step 301 The MSC sends a command to the BSS to perform a bypass operation on the established local switched voice channel corresponding to the corresponding terminal that the monitoring system requires to listen to;
  • FIG. 4 is a schematic diagram of a voice path according to an embodiment of a method for lawful interception according to the present invention.
  • the monitoring system may require listening to the voice path of one terminal MS1 to another terminal MS2, or requesting to listen to the voice channel of MS2 to MS1, or the voice path in both directions is required to be monitored.
  • the MSC sends a pair to establish a local. Exchanging the command of the bypass operation to the BSS of the two channels or two channels between the two terminals exchanged;
  • Step 302 The BSS bypasses the output of the local switched voice channel to the MSC, and returns a bypass operation response message to the MSC.
  • the BSS bypasses the outbound output of the voice channel between the two terminals to the MSC and returns to complete the bypass operation. Answering the message to the MSC, the MSC can obtain the voice of the call between the two terminals;
  • Step 303 The MSC receives the completion bypass operation response message returned by the BSS, and sends a bypass connection to the MSC to perform lawful interception of the conversation path by the monitoring system.
  • the lawful interception method provided in this embodiment can output the voice from the MSC for the lawful interception of the interception system by bypassing the voice channel between the two terminals to the MSC from the BSS, and the method does not cause the local system to be established.
  • the interruption of the voice on the channel between the two terminals exchanged or the time during which the voice is interrupted can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • the voice channel bypass is outputted to the MSC by the BSS bypass operation, and the voice is output to the monitoring system by the MSC for lawful interception, when the monitoring system no longer needs to continue to be legal.
  • the MSC can notify the BSS to terminate the bypass output of the terminal voice, and the BSS releases the voice channel of the two terminals to the bypass output of the MSC, that is, as shown in FIG. 3, to terminate the legal interception, after step 303, the method can further include:
  • Step 304 The MSC sends a release bypass operation command to the BSS.
  • Step 305 After receiving the release bypass operation command, the BSS releases the bypass connected to the MSC, and returns a bypass release completion message to the MSC.
  • the process of releasing the bypass to the MSC can be applied in the following embodiments in which the bypass is established to continue the call between the two terminals to the MSC to implement the termination of the lawful interception.
  • the message between the MSC and the BSS is transmitted on a call-related dedicated Signalling Connection Control Part (SCCP) link.
  • SCCP Call-related dedicated Signalling Connection Control Part
  • FIG. 5A is a signaling flowchart of another embodiment of a method for lawful interception according to the present invention. This embodiment is implemented in the following scenario: the call between two terminals in the same session is in the same BSS and the code is consistent or code compatible, and the voice channel between the two terminals can be established locally in the BSS. Exchange but not yet established. As shown in FIG. 5A, the following steps are included:
  • Step 501 The MSC sends a local exchange command to establish a session between the first terminal and the second terminal to the BSS.
  • the MSC determines that the calling party terminal and the called party terminal can Establishing a local exchange, and after receiving the connection request message sent by the called party terminal, sending a command to establish a local exchange between the two terminals to the BSS;
  • Step 502 After completing the establishment of the local exchange, the BSS returns a complete local exchange response message to the MSC.
  • Step 503 After receiving the completion of the local exchange response message returned by the BSS, the MSC sends a command to the BSS to perform a bypass operation on the established local switched channel corresponding to the corresponding terminal that the monitoring system requests to listen to;
  • the command for performing the bypass operation optionally carries the endpoint resource information prepared by the MSC for bypassing;
  • Step 504 The BSS bypasses the output of the local switched voice channel to the MSC, and returns a bypass operation response message to the MSC.
  • the completion bypass operation response message optionally carries the endpoint resource information allocated by the BSS as a bypass;
  • Step 505 The MSC receives the completion bypass operation response message returned by the BSS, and sends a bypass connection to the MSC to perform lawful interception of the conversation path by the monitoring system.
  • step 505 after receiving the completion bypass operation response message returned by the BSS, the MSC sends a connection request message sent by the called party to the MSC to the calling party terminal; after the calling party terminal receives the connection request message, Returning a connection response message to the MSC; the MSC sends a connection response message sent by the calling party terminal it receives to the called party terminal. So far, the establishment of the call of the two terminals is completed, and the bypass operation for monitoring the system dialogue path for lawful interception is completed.
  • FIG. 5B is another signaling flow diagram of another embodiment of a method for lawful interception according to the present invention. As shown in FIG. 5B, the following steps are specifically included:
  • Step 501 ′ the MSC sends a local exchange and a pair to establish a session between the first terminal and the second terminal.
  • the voice channel in the local exchange performs a bypass operation command to the BSS;
  • the command for performing the bypass operation optionally carries the endpoint resource information prepared by the MSC for bypassing;
  • the MSC determines that the calling party terminal and the called party terminal can establish a local exchange, and after receiving the connection request message sent by the called party terminal, send a local exchange between the two terminals to the BSS. And a command to perform a bypass operation on the voice channel in the local exchange;
  • Step 502 ′ the BSS completes the establishment of the local exchange and bypasses the output of the established local switched voice channel to the MSC, and returns a complete local exchange and bypass operation response message to the MSC;
  • the completion of the local exchange and bypass operation response message optionally carries the endpoint resource information allocated by the BSS for bypass;
  • Step 503 ′ the MSC receives the complete local exchange and bypass operation response message returned by the BSS, and the bypass is connected to the MSC to be used for the interception system to perform lawful interception of the conversation path.
  • step 503 ′ after receiving the completion local exchange and bypass operation response message returned by the BSS, the MSC sends a connection request message sent by the called party to the MSC to the calling party terminal; the calling party terminal receives the connection. After the request message, the connection response message is returned to the MSC; the MSC sends the connection response message sent by the calling party terminal to the called party terminal. So far, the establishment of the call of the two terminals is completed, and the bypass operation for monitoring the system dialogue path for lawful interception is completed.
  • the message for establishing the local switching and the bypass operation in the embodiment may be combined and sent in one message, or may be sent to the BSS separately, and the combination of sending the message in one message may save the time delay of the operation. Speed up the establishment of legal interception, making it easier for the listener to perceive the interruption of the session.
  • the solution specifically described in the foregoing embodiment establishing a local exchange between the first terminal and the second terminal in the BSS simultaneously or in the BSS
  • the BSS outputting the bypass to the MSC for performing the lawful interception of the session is specifically as follows:
  • the BSS output is notified to the MSC for legal interception of the conversation path.
  • the processing of the handover related message is first performed between the MSC and the BSS, and then the processing of the bypass operation related message is performed while the local exchange related message is processed.
  • the second mode in the process of the first terminal performing the handover, the MSC establishes the local exchange of the voice channel between the first terminal and the second terminal in the BSS, and notifies the BSS to output the bypass to the MSC for the execution of the session. monitor.
  • the third mode after the first terminal performs handover, the MSC establishes a local exchange between the first terminal and the second terminal in the BSS, and then the MSC notifies the BSS to output the bypass to the MSC for performing the dialogue. Lawful interception.
  • the processing of the handover related message is first performed between the MSC and the BSS, and then the local exchange related message is processed, and finally the bypass operation related message is processed, and the related messages of each processing are independent.
  • the fourth mode in the process of the first terminal performing handover, the MSC establishes a local exchange between the first terminal and the second terminal in the BSS, and then the MSC notifies the BSS to output the bypass to the MSC for performing the dialogue. Legal interception of the road.
  • the related messages of the handover and the local exchange are merged between the MSC and the BSS for processing, and then the processing of the bypass operation related message is performed.
  • FIG. 6 is a signaling flowchart of still another embodiment of a method for lawful interception according to the present invention.
  • This embodiment is implemented in the following scenario:
  • the first terminal performs inter-BSS handover, that is, the first terminal can establish a local exchange with the second terminal in the BSS after the first terminal switches from the other BSS to the BSS, that is, the first terminal at this time
  • Both the second terminal and the second terminal are within the BSS, and the conditions for local exchange within the BSS are met between the two.
  • the MSC in the second manner of the foregoing manner, in the process of performing handover in the first terminal, the MSC establishes local exchange of the voice channel between the first terminal and the second terminal in the BSS, and notifies BSS output bypass to
  • the method for performing lawful interception on the MSC includes the following steps:
  • Step 601 The other BSS sends a handover request message to the MSC, requesting the MSC to cut the first terminal from another BSS.
  • Step 602 The MSC selects, from the cell list of the handover request message, the target cell that the first terminal is to switch to, determines that the target cell belongs to the BSS, and determines that the voice channel between the first terminal and the second terminal meets the local exchange establishment condition, and Determining that the first terminal and the second terminal are to establish a local exchange and a bypass output, the MSC sends a handover request message to the BSS, where the handover request message carries a local exchange that establishes a session between the first terminal and the second terminal, and notifies the BSS to perform An indication of the bypass operation; the handover request message optionally further carrying the endpoint resource information prepared by the MSC for bypassing;
  • the MSC receives the handover request message, and receives the request for the interception system to perform lawful interception on one of the two voice channels or two voice channels between the first terminal and the second terminal, and may send the bearer to the BSS to establish the first a local exchange of voice channels between the terminal and the second terminal and a handover request message informing the BSS to perform an indication of the bypass operation;
  • Step 603 The BSS returns a handover request response message to the MSC, where the handover request response message carries a local exchange that establishes a session between the first terminal and the second terminal, and a response that notifies the BSS of the indication of the bypass operation;
  • the handover request response message optionally further carries the endpoint resource information prepared by the BSS for bypassing;
  • Step 604 The MSC sends a handover command to another BSS.
  • Step 605 When the BSS detects that the handover of the first terminal has been completed, the local exchange of the session between the first terminal and the second terminal is established, and the session between the first terminal and the second terminal is connected to the MSC through the bypass. Also completed;
  • Step 606 The BSS sends a handover complete message to the MSC, where the handover complete message carries the result of establishing the local exchange of the voice channel between the first terminal and the second terminal, and the result of the BSS performing the bypass operation.
  • the handover completion message optionally carries the endpoint resource information modified by the BSS as a bypass.
  • Step 607 The MSC sends a clear command for the first terminal to another BSS.
  • the MSC may finally determine that the call of the first terminal and the call of the second terminal do not establish a local call. Switching, and informing the BSS to directly connect the voice channel between the first terminal and the second terminal to the MSC, and the MSC performs loopback, so that the MSC leads the bypass to the monitoring system for lawful interception.
  • the method for lawful interception in this embodiment after the first terminal performs the inter-BSS handover, and after the other BSS switches to the BSS, after the first terminal and the second terminal in the BSS establish a session, the foregoing may be used.
  • the four ways to monitor the voice of the two terminals This method does not cause a voice interruption of the session of the two terminals establishing the local exchange or can greatly shorten the time of the interruption, so that the listener is not easily aware that his voice is being monitored.
  • the first terminal that has performed the session with the second terminal in the BSS and establishes the local exchange is switched from the BSS to another BSS, and the second terminal residing in the BSS does not satisfy the local exchange establishment condition, It can include the following steps:
  • Step 601 ′ when performing handover of the first terminal from the BSS to another BSS, the MSC notifies the BSS to cancel the local exchange;
  • Step 602 ′ the BSS cancels the local exchange while canceling the bypass established by the first terminal and the second terminal for connecting the voice channel to the MSC, and directly connecting the voice channel of the second terminal in the BSS to the MSC;
  • Step 603' the session of the first terminal to which the other BSS switches is also reconnected to the MSC. Specifically, after receiving the handover request message sent by the BSS, the MSC determines that the first terminal that is switched from the BSS and the second terminal that is still resident in the BSS cannot continue to maintain the local exchange, that is, the users of the first terminal and the second terminal. After the switchover is performed on the MSC, the MSC initiates the above-mentioned operation of releasing the local exchange between the first terminal and the second terminal.
  • the voice channel to which the local exchange is established in the BSS is released, and the voice channel to the MSC is re-established in another BSS; for the second terminal still in the BSS, only the bypass needs to be canceled, and the locally switched voice channel is directly connected to the MSC. Just fine.
  • the two terminals can be re-established to the MSC, so that the voice channels of the two terminals can be looped back in the MSC, so that if the monitoring system needs to perform lawful interception on the terminal, it can be directly extracted by the MSC. Voice for legal listening.
  • FIG. 7 is a signaling flowchart of still another embodiment of a method for lawful interception according to the present invention.
  • the embodiment is implemented in the following scenario: the first terminal performs handover in the BSS where the second terminal is located, and can establish local exchange with the second terminal in the same BSS, and the handover in the BSS may be the first terminal.
  • the switching from one BTS to another BTS in the same BSS is not differentiated in the embodiment of the present invention and is collectively referred to as intra-BSS handover.
  • the first terminal performs the handover, and the MSC establishes the local exchange of the voice between the first terminal and the second terminal in the BSS, and notifies the same.
  • the BSS output is bypassed to the MSC for performing lawful interception of the session path.
  • the lawful interception method specifically includes the following steps:
  • Step 701 The MSC sends an inquiry to the BSS to perform internal handover on the first terminal.
  • This step 701 is an optional step.
  • Step 702 The BSS sends an internal handover request message to the MSC.
  • Step 703 After receiving the internal handover request message sent by the BSS, the MSC sends an internal handover command to the BSS. If the MSC determines that the two terminals meet the local exchange establishment condition of the session after the handover, the internal handover command carries the first terminal and Local exchange of voice channels between the second terminals and an indication to notify the BSS to perform a bypass operation;
  • the internal handover command optionally carries the endpoint resource information prepared by the MSC for bypassing.
  • Step 704 The BSS completes establishment of the local exchange of the session between the first terminal and the second terminal, and the first terminal and the second terminal are configured.
  • the inter-office channel is connected to the MSC by the bypass, and returns a handover completion response message to the MSC.
  • the handover completion response message carries the establishment result of the local exchange between the first terminal and the second terminal and the result of the bypass operation performed by the BSS;
  • the handover completion response message optionally carries the endpoint resource information allocated by the BSS for the bypass.
  • the MSC may finally determine that the call of the first terminal and the call of the second terminal do not establish a local call.
  • the exchange that is, the internal handover command sent by the MSC to the BSS does not carry the local exchange that establishes the session between the first terminal and the second terminal, and notifies the BSS of the bypass operation, and still performs the ring on the MSC after the handover. Back, so that the MSC leads the bypass for monitoring.
  • the first terminal performs intra-BSS handover, and after the first terminal and the second terminal establish a voice channel, the voice channels of the two terminals can be monitored by using the above four methods.
  • This method does not cause a voice interruption of the session of the two terminals establishing the local exchange or can shorten the time of the interruption, so that the listener is not easily aware that his voice is being monitored.
  • Step 701 ′ When performing handover of the first terminal in the BSS, the MSC notifies the BSS to cancel the local exchange in the internal handover command;
  • Step 702 ′ the BSS cancels the local exchange while canceling the bypass established between the first terminal and the second terminal for connecting the voice channel to the MSC, and connecting the voice channel of the second terminal in the BSS to the MSC;
  • Step 703' the BSS connects the voice channel of the first terminal that performs the BSS handover to the MSC. Specifically, after receiving the internal handover request message sent by the BSS, the MSC determines that the local exchange between the first terminal and the second terminal in the BSS cannot be maintained, that is, the user plane link between the first terminal and the second terminal must be switched after the handover. The loopback is performed on the MSC, and the MSC initiates the above-mentioned operation of releasing the local exchange between the first terminal and the second terminal.
  • the two terminals can be re-established to the MSC, so that the voice channels of the two terminals are looped back in the MSC, so that if the monitoring system needs to legalize the terminal Listening, you can directly voice the voice from the MSC for lawful interception.
  • FIG. 8 is a schematic structural diagram of an MSC for lawful interception according to an embodiment of the present invention.
  • the MSC 8 is configured to establish a local exchange of the voice channel between the first terminal and the second terminal in the BSS 9, or to establish a local exchange between the voice channel between the first terminal and the second terminal in the BSS 9, and notify the The BSS9 output is bypassed to the MSC 8 for lawful interception of the session.
  • the MSC 8 may specifically include: a first sending module 81, a first receiving module 82, and a processing module 83.
  • the first sending module 81 is configured to send, to the BSS9, a local exchange command for establishing a session between the first terminal and the second terminal, and/or a command for performing a bypass operation on the session in the local exchange;
  • the first receiving module 82 is configured to: Receiving the establishment of the local exchange by the BSS 9 and/or bypassing the corresponding completed local exchange response message and/or completing the bypass operation response message returned after the local exchanged voice channel output is returned to the MSC 8;
  • the processing module 83 is configured to receive the After completing the local exchange and bypass operation response message or completing the bypass operation response message returned by the BSS, the bypass connection to the MSC is taken out for legal interception of the execution of the conversation path.
  • the MSC 8 may further include: a second sending module 84 and a second receiving module 85.
  • the second sending module 84 is configured to send a release bypass operation command to the BSS9;
  • the second receiving module 85 is configured to receive a bypass release complete message returned by the BSS9 after the bypass connected to the MSC8 is released according to the release bypass operation command. .
  • the messages sent and received by the first sending module and the first receiving module in the MSC provided in this embodiment may be sent in different messages in a time series relationship, or may be combined and sent in the same message simultaneously.
  • the messages sent and received by the first sending module and the first receiving module in the MSC provided in this embodiment may be sent in different messages in a time series relationship, or may be combined and sent in the same message simultaneously.
  • the MSC provided in this embodiment connects the voice channel between the two terminals to the MSC from the BSS through a bypass operation, so that the bypass can be bypassed from the MSC for lawful interception by the monitoring system, and the method does not cause the local device to be established.
  • the interruption of the voice on the channel between the two terminals exchanged or the time during which the voice is interrupted can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • FIG. 9 is a schematic structural diagram of another embodiment of an MSC for lawful interception according to the present invention. As shown in FIG. 9, if the first terminal switches from another BSS 91 to the BSS 92, it can be built with the second terminal in the BSS 92.
  • the MSC 8 may specifically include: a third receiving module 81', a selection determining module 82', and a third sending module 83'.
  • the third receiving module 8 is configured to receive a handover request message sent by another BSS 91, requesting the MSC 8 to switch the first terminal away from the other BSS 91, and receive a handover request response message returned by the BSS 92, where the handover request response message carries the first establishment a local exchange of the session between the terminal and the second terminal and a response notifying the BSS 92 of the indication of the bypass operation; receiving the handover completion message returned by the BSS 92 to complete the handover of the first terminal, the establishment of the local exchange, and the bypass operation, The handover completion message carries the result of the local exchange establishment and the result of the bypass operation.
  • the selection determination module 82 ' is configured to select the target cell to be switched by the first terminal from the cell list of the handover requirement message, and determine that the target cell belongs to the BSS92. And determining that the voice channel between the first terminal and the second terminal meets the local exchange establishment condition, and determining whether the first terminal and the second terminal need to establish a local exchange and a bypass output; the third sending module 83' is configured to the BSS92. Sending a handover request message, where the handover request message carries the first terminal and the second terminal And notifying the BS S92 local switching instruction bypass operations; send a handover command to the other BSS91.
  • the MSC provided in this embodiment describes a technical solution for implementing lawful interception of a monitoring system to a terminal when a first terminal establishes a local exchange with a second terminal in the BSS after switching from another BSS to the BSS, switching, local switching, and
  • the operation of the bypass may be performed in a time-series relationship in different messages, or may be sent in the same message at the same time.
  • the specific scheme description is described in the foregoing method for lawful interception. Let me repeat.
  • the MSC provided in this embodiment connects the voice channel between the two terminals to the MSC from the BSS through a bypass operation, so that the bypass can be bypassed from the MSC for lawful interception by the monitoring system, and the method does not cause the local device to be established.
  • the interruption of the voice on the channel between the two terminals exchanged or the time during which the voice is interrupted can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • FIG. 10 is a schematic structural diagram of still another embodiment of an MSC for lawful interception according to the present invention.
  • the MSC 8 may specifically include: a fourth receiving module 81" and a fourth sending Module 82".
  • the fourth receiving module 81 is configured to receive an internal handover request sent by the BSS 93.
  • the receiving BSS93 completes the handover of the first terminal, the establishment of the local exchange, and the handover completion response message returned after the bypass operation, where the handover completion response message carries the result of the local exchange establishment and the result of the bypass operation;
  • the module 82" is configured to send an internal handover command to the BSS 93 after receiving the internal handover request message received by the fourth receiving module 81.
  • the internal handover command carries a local exchange for establishing a session between the first terminal and the second terminal. And an instruction to notify the BSS 93 to perform a bypass operation.
  • the MSC provided in this embodiment describes a technical solution for implementing lawful interception of the interception system to the terminal when the first terminal can perform local exchange with the second terminal in the same BSS 93 after the handover in the BSS 93, switching, local switching, and bypassing.
  • the operation may be performed in a time-series relationship in different messages, or may be sent in the same message at the same time.
  • the MSC provided in this embodiment connects the voice channel between the two terminals to the MSC from the BSS through a bypass operation, so that the bypass can be bypassed from the MSC for lawful interception by the monitoring system, and the method does not cause the local device to be established.
  • the interruption of the voice on the channel between the two terminals exchanged or the time during which the voice is interrupted can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • FIG. 11 is a schematic structural diagram of still another embodiment of an MSC for lawful interception according to the present invention. If the first terminal that has been in session with the second terminal and the local exchange is established in the BSS 92' is switched from the BSS 92' to the other BSS 91', the second terminal residing in the BSS 92' does not satisfy the local exchange establishment condition.
  • the MSC 8 may further include: a first notification module 86 and a first session connection, in addition to the first sending module 81, the first receiving module 82, and the processing module 83 included in FIG. Module 87.
  • the first notification module 86 is configured to notify the BSS 92' to cancel the local exchange; the first session connection module 87 is configured to connect the disconnected first terminal and the second terminal to the MSC8, so as to connect the first terminal.
  • the channel between the second terminal and the second terminal is extracted for performing lawful interception of the conversation path.
  • the first notification module and the first session connection module can re-establish the channel of the two terminals to the MSC, so that the voice channels of the two terminals can be looped back in the MSC, so that if the monitoring system needs to perform lawful interception on the terminal,
  • the voice is derived by the MSC for lawful interception.
  • FIG. 12 is a schematic structural diagram of still another embodiment of an MSC for lawful interception according to the present invention.
  • the MSC 8 may further include: a second notification module 86' and a second session connection module 87' in addition to the first sending module 81, the first receiving module 82, and the processing module 83 included in FIG.
  • the second notification module 86' is configured to notify the BSS 93' to cancel the local exchange;
  • the second session connection module 87' is configured to connect the disconnected first terminal and the second terminal to the MSC8, so that the first The voice path between a terminal and the second terminal is extracted for performing lawful interception of the conversation path.
  • the second notification module and the second session connection module can re-establish the channel of the two terminals to the MSC, so that the voice channels of the two terminals can be looped back in the MSC, so that if the monitoring system needs to perform lawful interception on the terminal, The voice is derived by the MSC for lawful interception.
  • FIG. 13 is a schematic structural diagram of an embodiment of a system for lawful interception according to the present invention.
  • the system includes a mobile switching center MSC1, a base station subsystem BSS2, and a listening system 3.
  • the MSC1 is configured to notify the BSS2 output bypassing after establishing a local exchange of the voice channel between the first terminal and the second terminal in the BSS2 or after establishing a local exchange between the first terminal and the second terminal in the BSS2.
  • MSC1 MSC1
  • BSS2 is used for bypass operation, and the output is bypassed to MSC1 to extend the connection established between the terminals to MSC1
  • MSC1 is also used to extract voice from the connection to MSC1 to the interception system 3
  • 3 is used to perform lawful interception of the conversation path by voices elicited from MSC1.
  • the lawful interception system provided in this embodiment bypasses the call between the two terminals from the BSS to the MSC through the bypass operation, so that the bypass can be taken out from the MSC for the interception system to perform lawful interception, and the method does not cause
  • the establishment of a local exchange of voice interruptions between the two terminals or the interruption of the voice can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • the technical solution of the lawful interception method and system provided by the embodiments of the present invention can be applied to a communication system such as a Global System for Mobile Communications (GSM), a Code Division Multiple Access (CDMA) system, or a Wideband Code Division Multiple Access (WCDMA) system.
  • GSM Global System for Mobile Communications
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

合法监听的方法、 系统及移动交换中心 技术领域
本发明涉及移动通信技术领域, 特别涉及一种合法监听的方法、 系统及 移动交换中心。 背景技术
在现有的通信系统中, 一般是由核心网 ( Core Network, 简称 CN ) 中的 移动交换中心 (Mobile Switch Center, 简称 MSC ) 完成一个会话的两个通信 终端的话路的接续的, 即呼叫要建立从终端经基站子系统 (Base Station Sub-system, 简称 BSS )到 MSC的用户面链路和控制面链路。 上述的传输网 絡为一移动通信网絡, 特别是全球移动通信系统(Global System for Mobile communication, 简称 GSM ) 网絡中的一个重要组成部分。
目前很多国家和地区的运营商因为连接无线接入网 (主要包括 BSS )和 核心网的传输资源的瓶颈问题, 影响了无线网絡的部署、 运营和业务开展。 在上述场景中, 运营商一般会釆用微波、 卫星或者租用地面传输线路的方法 来解决传输资源的瓶颈问题, 釆用合理的技术方案可以降低对传输网絡带宽 的占用,可以帮助运营商有效的降低无线网絡建设和运营成本。其中,在 BSS 内进行用户面链路的本地交换就是一种有效的降低传输资源占用的方法, 该 在 BSS内进行的本地交换即两个通信终端的话路在 BSS内环回。 该本地交换 的基本方案就是, 呼叫的控制面链路仍然连接到 CN中的 MSC进行控制, 同 时, 将呼叫的用户面链路直接在 BSS内部进行环回。
合法监听是指在法律允许范围内, 国家安全部门监听电信业务的活动。 任何监听活动都应得到国家相关部门的授权。 根据国家安全部门的要求, 所 有运营的移动通信网絡,包括 GSM、码分多址通信系统( Code Division Multiple Access,简称 CDMA )以及未来的宽带码分多址通信系统 ( Wide Code Division Multiple Access, 简称 W-CDMA )等 , 必须使国家安全部门能够对目标用户 设备进行监听, 并提供实现监听的监听接口。 国家安全部门的监听系统通过 监听接口接入移动通信网絡, 实现对目标用户设备的监听, 其中目标用户设 备是指被监听的通信终端。
在现有的监听技术标准中, 可实行监听的业务有: 呼叫业务、 传真业务、 异步数据业务、 短消息业务和补充业务等。 在 GSM和 CDMA通信网絡中, 要求提供监听接入功能的设备包括: 归属位置寄存器 (HLR, Home Location Register )、移动交换中心( MSC , Mobile Switch Center )和短消息中心( SMC , Short Message Center )。对于呼叫业务来说,所有呼叫的话路的监听都由 MSC 提供给监听系统。
但是, 在 BSS内进行用户面链路的本地交换时, 话路并不经过 MSC, 因 此在 BSS内的本地交换无法和合法监听业务同时实施。 发明内容
本发明实施例提供一种合法监听的方法、 系统及移动交换中心, 以实现 对终端间话路的合法监听。
本发明实施例提供了一种合法监听的方法, 包括:
在基站子系统 BSS内建立第一终端和第二终端间话路的本地交换的同时 或在 BSS内建立第一终端和第二终端间话路的本地交换后, 通知所述 BSS输 出旁路到移动交换中心 MSC上以供执行对话路的合法监听。
本发明实施例还提供了一种用于合法监听的移动交换中心 MSC, 所述 MSC用于在基站子系统 BSS内建立第一终端和第二终端间话路的本地交换的 同时或在 BSS 内建立第一终端和第二终端间话路的本地交换后, 通知所述 BSS输出旁路到移动交换中心 MSC上以供执行对话路的合法监听。
本发明实施例还提供了一种合法监听的系统, 包括: 移动交换中心 MSC、 基站子系统 BSS以及监听系统, 其中 所述 MSC,用于在基站子系统 BSS内建立第一终端和第二终端间话路的 本地交换的同时或在 BSS内建立第一终端和第二终端间话路的本地交换后, 通知所述 BSS输出旁路到移动交换中心 MSC上;
所述 BSS, 用于进行旁路操作, 输出旁路到所述 MSC, 以将所述终端间 建立的话路接续到所述 MSC上;
所述 MSC还用于从接续到所述 MSC上的旁路引出话音至所述监听系统; 所述监听系统,用于通过从所述 MSC引出的话音执行对话路的合法监听。 由以上技术方案可知, 本发明实施例的合法监听的方法、 系统及移动交 换中心, 通过从 BSS将两个终端间话^ ί妻续到 MSC, 从而可以实现从 MSC 引出旁路以供监听系统进行合法监听, 该方法不会造成已经建立了本地交换 的两个终端间话路上的语音中断或可以使得语音中断的时间大大缩短, 使得 被监听者不容易察觉到其话路被监听。 附图说明
图 1为本发明用户面链路在 MSC内建立交换的同时实现合法监听的网絡 结构示意图;
图 2为本发明用户面链路在 BSS内建立本地交换之后不能实现合法监听 的网絡结构示意图;
图 3为本发明合法监听的方法一实施例的信令流程图;
图 4为本发明合法监听的方法一实施例的话路示意图;
图 5Α为本发明合法监听的方法另一实施例的信令流程图;
图 5Β为本发明合法监听的方法另一实施例的另一信令流程图;
图 6为本发明合法监听的方法再一实施例的信令流程图;
图 7为本发明合法监听的方法又一实施例的信令流程图;
图 8为本发明用于合法监听的 MSC—实施例的结构示意图;
图 9为本发明用于合法监听的 MSC另一实施例的结构示意图; 图 10为本发明用于合法监听的 MSC再一实施例的结构示意图; 图 11为本发明用于合法监听的 MSC又一实施例的结构示意图; 图 12为本发明用于合法监听的 MSC又一实施例的结构示意图; 图 13为本发明合法监听的系统实施例的结构示意图。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而 不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作 出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
图 1为本发明用户面链路在 MSC内建立交换的同时实现合法监听的网絡 结构示意图。如图 1所示,用户面链路即两个终端 MS1和 MS2间的话路连接 到 MSC并在 MSC中环回, 只要从 MSC引出旁路到监听系统, 即可实现对某 一个终端或两个终端的合法监听。 图 2为本发明用户面链路在 BSS内建立本 地交换之后不能实现合法监听的网絡结构示意图。 如图 2 所示, 用户面链路 即两个终端 MS1和 MS2间的话路在 BSS内进行环回; 该 BSS主要包括 BSC 和 BTS, 该 BSS内的环回可以是在同一 BSC内的两个终端间的话路在 BSC 内进行环回, 也可以是在同一 BTS (簇) 内的两个终端间的话路在 BTS (簇) 内进行环回, 图 2所示的场景为在 BSC内进行环回。 在图 2所述的本地交换 中, 两个终端 MS1和 MS2间的话路不需连接到 MSC, 节省了 BSS和 MSC 之间的 A接口的资源,但是此时无法建立从 MSC引出的合法监听的链路。本 发明的下述实施例将具体介绍两个终端在 BSS内执行本地交换的场景下, 如 何进行对终端间话路的合法监听的技术方案。 需要注意的是, 本发明实施例 提到的 BSS 内建立的终端间话路的本地交换没有对 BSC 内的本地交换或者 BTS内的本地交换做区分。
本发明实施例釆用的技术方案为在 BSS内建立终端间话路的本地交换的 同时或 BSS内建立终端间话路的本地交换后 , 通知 BSS输出旁路到 MSC上 以供执行对终端间的话路的合法监听; 也可以在基站子系统 BSS内建立终端 间话路的本地交换后, 解除该本地交换, 并为终端建立与 MSC间的话路, 该 话路经由 MSC环回并自 MSC引出旁路作为对话路进行合法监听的输出。
其中, 参考图 1和图 2, 在 BSS内建立终端间话路的本地交换后, 解除 该本地交换,并为终端建立与 MSC间的话路,该话路经由 MSC环回并自 MSC 引出旁路作为对话路进行合法监听的输出的方案具体为: MSC通知 BSS解除 两个终端间的话路的本地交换, 建立两个终端在 A接口上的用户面链路连接 至 MSC, 使得两个终端间的话路连接到 MSC并在 MSC中环回, 从而可以自 MSC引出旁路作为对话路进行合法监听的输出, 以供监听系统对终端间的话 路的合法监听。 此后, 若需要终止监听系统对终端间的话路的合法监听, 可 以直接由 MSC来执行, 即由 MSC取消输出至监听系统的旁路, 而无需 BSS 的协助。
图 3 为本发明合法监听的方法一实施例的信令流程图。 该实施例是在如 下场景下实现的: 同一会话中的两个终端即第一终端和第二终端之间的话路 已经在该 BSS内建立了本地交换。 如图 3所示, 包括如下步骤:
步骤 301、 MSC对应于监听系统要求监听的相应终端向 BSS发送对已建 立本地交换的话路执行旁路操作的命令;
图 4为本发明合法监听的方法一实施例的话路示意图。 如图 4所示, 监 听系统可以要求监听一个终端 MS1到另一个终端 MS2的话路、或者要求监听 MS2到 MS1 的话路、 或者两个方向的话路均要求监听, 此时, MSC发送对 建立了本地交换的两个终端间的两个话路或两个话路之一执行旁路操作的命 令至 BSS;
步骤 302、 BSS将已建立本地交换的话路输出旁路到 MSC后向 MSC返 回完成旁路操作应答消息;
BSS将两个终端间的话路的出向输出旁路到 MSC并返回完成旁路操作应 答消息至 MSC, MSC可以获取到两个终端间进行通话的话音;
步骤 303、 MSC接收到 BSS 返回的完成旁路操作应答消息, 将接续到 MSC上的旁路引出以供监听系统执行对话路的合法监听。
本实施例提供的合法监听的方法, 通过从 BSS将两个终端间的话路旁路 输出到 MSC, 从而可以实现从 MSC 引出话音以供监听系统进行合法监听, 该方法不会造成已经建立了本地交换的两个终端间的话路上的语音中断或可 以使得语音中断的时间大大缩短, 使得被监听者不容易察觉到其话路被监听。
另外, 在本地交换维持的过程中, 对于已经由 BSS进行旁路操作将话路 旁路输出到 MSC上, 并由 MSC将话音输出到监听系统进行合法监听, 当监 听系统不再需要继续进行合法监听时, MSC可以通知 BSS终止终端话音的旁 路输出, BSS释放两个终端的话路至 MSC的旁路输出, 即如图 3所示, 若要 终止合法监听, 在步骤 303之后还可以包括:
步骤 304、 MSC向 BSS发送释放旁路操作命令;
步骤 305、 BSS接收到释放旁路操作命令后, 将接续到 MSC上的旁路释 放, 并向 MSC返回旁路释放完成消息。
该释放接续到 MSC的旁路的流程在下述建立了旁路以将两个终端间的话 妻续到 MSC的实施例中均可以应用, 以实现对合法监听的终止操作。
本发明实施例中 MSC与 BSS间的消息在呼叫相关的专用信令连接控制协 议( Signalling Connection Control Part, 简称 SCCP )链接上传送。
图 5A为本发明合法监听的方法另一实施例的信令流程图。该实施例是在 如下场景下实现的: 同一会话中的两个终端之间的呼叫在同一个 BSS内且编 码一致或编码兼容, 且该两个终端之间的话路能够在该 BSS内建立本地交换 但还未建立。 如图 5A所示, 包括如下步骤:
步骤 501、 MSC发送建立第一终端和第二终端间话路的本地交换的命令 至 BSS;
在两个终端的呼叫建立过程中, MSC判断主叫方终端和被叫方终端可以 建立本地交换, 接收到被叫方终端发送的连接请求消息后, 向 BSS发送建立 两个终端间的本地交换的命令;
步骤 502、 BSS完成本地交换的建立后, 向 MSC返回完成本地交换应答 消息;
步骤 503、 MSC接收到 BSS返回的完成本地交换应答消息后, 对应于监 听系统要求监听的相应终端, 向 BSS发送对已建立本地交换的话路执行旁路 操作的命令;
该执行旁路操作的命令中可选地携带有 MSC 为旁路准备的端点资源信 息;
步骤 504、 BSS将已建立本地交换的话路输出旁路到 MSC后向 MSC返 回完成旁路操作应答消息;
该完成旁路操作应答消息中可选地携带有 BSS为旁路分配的端点资源信 息;
步骤 505、 MSC接收到 BSS 返回的完成旁路操作应答消息, 将接续到 MSC上的旁路引出以供监听系统执行对话路的合法监听。
该步骤 505中, MSC接收到 BSS返回的完成旁路操作应答消息后, 会向 主叫方终端发送被叫方发送至 MSC上的连接请求消息; 主叫方终端接收到该 连接请求消息后, 向 MSC返回连接应答消息; MSC将其接收到的主叫方终 端发送的连接应答消息发送至被叫方终端。 至此完成两个终端的呼叫的建立, 同时完成了用于监听系统对话路进行合法监听的旁路操作。
上述步骤 501〜步骤 505所述的合法监听的实现流程将本地交换建立的信 令消息与旁路操作的信令消息分别在不同的消息中进行发送, 下面描述的信 令流程可以将本地交换的建立的信令消息与旁路操作的信令消息放在同一个 消息中进行发送。 图 5B为本发明合法监听的方法另一实施例的另一信令流程 图。 如图 5B所示, 具体包括如下步骤:
步骤 501'、 MSC发送建立第一终端和第二终端间话路的本地交换以及对 本地交换中的话路执行旁路操作的命令至 BSS;
该执行旁路操作的命令中可选地携带有 MSC 为旁路准备的端点资源信 息;
在两个终端的呼叫建立过程中, MSC判断主叫方终端和被叫方终端可以 建立本地交换, 接收到被叫方终端发送的连接请求消息后, 向 BSS发送建立 两个终端间的本地交换以及对本地交换中的话路执行旁路操作的命令;
步骤 502'、 BSS 完成本地交换的建立以及将已建立本地交换的话路输出 旁路到 MSC , 向 MSC返回完成本地交换和旁路操作应答消息;
该完成本地交换和旁路操作应答消息中可选地携带有 BSS为旁路分配的 端点资源信息;
步骤 503'、 MSC接收到 BSS返回的完成本地交换和旁路操作应答消息, 将接续到 MSC上的旁路引出以供监听系统执行对话路的合法监听。
该步骤 503'中, MSC接收到 BSS返回的完成本地交换和旁路操作应答消 息后, 会向主叫方终端发送被叫方发送至 MSC上的连接请求消息; 主叫方终 端接收到该连接请求消息后, 向 MSC返回连接应答消息; MSC将其接收到 的主叫方终端发送的连接应答消息发送至被叫方终端。 至此完成两个终端的 呼叫的建立, 同时完成了用于监听系统对话路进行合法监听的旁路操作。
本实施例中的建立本地交换和旁路操作的消息可以合并在一条消息中下 发, 也可以分为两条消息分别发送至 BSS, 合并在一条消息中下发可以节省 操作的时间延时, 加快合法监听建立, 使得被监听者更加不容易感知到话路 中断。
若第一终端进行切换后能够与 BSS内的第二终端建立本地交换, 则上述 实施例中具体描述的方案: 在 BSS内建立第一终端和第二终端间话路的本地 交换的同时或在 BSS内建立第一终端和第二终端间话路的本地交换后, 通知 BSS输出旁路到 MSC上以供执行对话路的合法监听具体包括如下几种方式: 第一种方式: 第一终端进行切换后, MSC在 BSS内建立第一终端和第二 终端间话路的本地交换的同时,通知 BSS输出旁路到 MSC上以供执行对话路 的合法监听。
在该方式下,在 MSC和 BSS之间先进行切换相关消息的处理,然后在进 行本地交换相关消息的处理的同时进行旁路操作相关消息的处理。
第二种方式: 第一终端进行切换的过程中, MSC在 BSS内建立第一终端 和第二终端间话路的本地交换的同时,通知 BSS输出旁路到 MSC上以供执行 对话路的合法监听。
在该方式下,在 MSC和 BSS之间将切换、本地交换和旁路操作的相关消 息合并在一起进行处理。
第三种方式: 第一终端进行切换后,先由 MSC在 BSS内建立第一终端和 第二终端间话路的本地交换, 再由 MSC通知 BSS输出旁路到 MSC上以供执 行对话路的合法监听。
在该方式下,在 MSC和 BSS之间先进行切换相关消息的处理,再进行本 地交换相关消息的处理, 最后进行旁路操作相关消息的处理, 各个处理的相 关消息均是独立的。
第四种方式: 第一终端进行切换的过程中,先由 MSC在 BSS内建立第一 终端和第二终端间话路的本地交换, 再由 MSC通知 BSS输出旁路到 MSC上 以供执行对话路的合法监听。
在该方式下,在 MSC和 BSS之间将切换和本地交换的相关消息合并在一 起进行处理, 再进行旁路操作相关消息的处理。
图 6为本发明合法监听的方法再一实施例的信令流程图。 该实施例是在 如下场景下实现的: 第一终端进行 BSS间切换, 即第一终端从另一 BSS切换 到 BSS后能够与在 BSS内的第二终端建立本地交换, 即此时第一终端和第二 终端均在 BSS内,且两者之间满足在 BSS内的本地交换的条件。在该场景下, 如图 6所示,以上述第二种方式——第一终端进行切换的过程中, MSC在 BSS 内建立第一终端和第二终端间话路的本地交换的同时, 通知 BSS输出旁路到 MSC上以供执行对话路的合法监听——为例, 该合法监听的方法具体包括如 下步骤:
步骤 601、 另一 BSS向 MSC发送切换需求消息, 请求 MSC将第一终端 切离另一 BSS;
步骤 602、 MSC从切换需求消息的小区列表中选择第一终端要切换进入 的目标小区, 判断出目标小区属于 BSS , 且判断出第一终端和第二终端间的 话路满足本地交换建立条件, 并确定第一终端和第二终端要建立本地交换和 旁路输出,则 MSC向 BSS发送切换请求消息,该切换请求消息中携带建立第 一终端和第二终端间的话路的本地交换以及通知 BSS进行旁路操作的指示; 所述切换请求消息中还可选地携带有 MSC为旁路准备的端点资源信息;
MSC接收到切换需求消息, 以及接收到监听系统要对第一终端和第二终端之 间的两个话路或两个话路之一进行合法监听的请求, 则可以向 BSS发送携带 建立第一终端和第二终端间的话路的本地交换以及通知 BSS进行旁路操作的 指示的切换请求消息;
步骤 603、 BSS向 MSC返回切换请求响应消息, 切换请求响应消息中携 带有建立第一终端和第二终端间的话路的本地交换以及通知 BSS进行旁路操 作的指示的响应;
该切换请求响应消息中还可选地携带有 BSS 为旁路准备的端点资源信 息;
步骤 604、 MSC向另一 BSS发送切换命令;
步骤 605、 当 BSS检测到第一终端的切换已完成时, 第一终端和第二终 端间的话路的本地交换已建立并且将第一终端和第二终端间的话路通过旁路 接续到 MSC上也已完成;
步骤 606、 BSS向 MSC发送切换完成消息, 切换完成消息中携带有第一 终端和第二终端间的话路的本地交换的建立结果以及 BSS进行旁路操作的结 果; 该切换完成消息中还可选地携带有 BSS为旁路修改的端点资源信息; 步骤 607、 MSC向另一 BSS发送针对所述第一终端的清除命令; 步骤 608、 另一 BSS完成清除后, 向 MSC返回清除完成响应消息。
另外, 本实施例所述的场景下, 若要实现对第一终端和第二终端间的话 路进行合法监听, MSC也可以最终判决所述第一终端的呼叫和第二终端的呼 叫不建立本地交换, 并通知 BSS将第一终端和第二终端间的话路直接连接到 MSC, 由 MSC进行环回, 从而由 MSC引出旁路至监听系统进行合法监听即 可。
本实施例的合法监听的方法, 在第一终端进行 BSS间切换, 且由另一 BSS切换至 BSS后, 在该第一终端和在 BSS中的第二终端建立话路后, 可以 釆用上述的四种方式对两个终端的话路进行监听。 该方法不会造成建立本地 交换的两个终端的话路的语音中断或可以使得中断的时间大大缩短, 使得被 监听者不容易察觉到其话路被监听。
另外, 若将在 BSS内与第二终端进行会话且建立了本地交换的第一终端 从 BSS切换到另一 BSS后,与驻留在 BSS内的第二终端不满足本地交换建立 条件, 则还可以包括如下步骤:
步骤 601'、在进行第一终端从 BSS到另一 BSS的切换时, MSC通知 BSS 解除本地交换;
步骤 602'、 BSS解除本地交换的同时取消第一终端和第二终端的用于将 话路接续到所述 MSC时建立的旁路,并将 BSS内的第二终端的话路直接连接 至 MSC;
步骤 603'、另一 BSS将切换至其中的第一终端的话路也重新连接至 MSC。 具体地, MSC接收到 BSS发送的切换需求消息后, 确定从 BSS切换出 的第一终端与仍然驻留在 BSS中的第二终端不能继续维持本地交换, 即第一 终端与第二终端的用户面链路在切换后必须在 MSC上进行环回, 则 MSC会 发起上述解除第一终端和第二终端间的本地交换的操作。 对于第一终端, 要 将在 BSS中建立了本地交换的话路解除, 在另一 BSS中重新建立到 MSC的 话路; 对于仍然在 BSS中的第二终端, 仅需要取消旁路, 并将本地交换的话 路直接接续至 MSC即可。
通过上述步骤 601'〜步骤 603', 可以重新建立两个终端到 MSC的话路, 使得两个终端的话路可以在 MSC中环回,从而如果监听系统需要对终端进行 合法监听, 则可以直接由 MSC引出话音以供合法监听。
图 7 为本发明合法监听的方法又一实施例的信令流程图。 该实施例是在 如下场景下实现的: 第一终端在第二终端所在的 BSS内进行切换, 且能够与 同在 BSS内的第二终端建立本地交换, 该 BSS内的切换可能为第一终端从一 BTS切换至同一 BSS内的另一 BTS , 本发明实施例不作区分, 统称为 BSS内 切换。 在该场景下, 如图 7 所示, 以上述第二种方式一一第一终端进行切换 的过程中, MSC在 BSS内建立第一终端和第二终端间话路的本地交换的同时, 通知 BSS输出旁路到 MSC上以供执行对话路的合法监听——为例,该合法监 听的方法具体包括如下步骤:
步骤 701、 MSC向 BSS发送对第一终端进行内部切换的询问;
该步骤 701为可选步骤。
步骤 702、 BSS向 MSC发送内部切换请求消息;
步骤 703、 MSC接收到 BSS发送的内部切换请求消息后, 向 BSS发送内 部切换命令, 如果 MSC判断切换后两个终端满足话路的本地交换建立条件, 则内部切换命令中携带建立第一终端和第二终端间的话路的本地交换以及通 知 BSS进行旁路操作的指示;
该内部切换命令中还可选地携带有 MSC为旁路准备的端点资源信息; 步骤 704、 BSS完成第一终端和第二终端间的话路的本地交换的建立并且 将第一终端和第二终端间的话路通过旁路接续到 MSC上, 向 MSC返回切换 完成响应消息, 切换完成响应消息中携带有第一终端和第二终端间的本地交 换的建立结果以及 BSS进行旁路操作的结果; 该切换完成响应消息中还可选地携带有 BSS 为旁路分配的端点资源信 息。
另外, 本实施例所述的场景下, 若要实现对第一终端和第二终端间的话 路进行合法监听, MSC也可以最终判决所述第一终端的呼叫和第二终端的呼 叫不建立本地交换,即 MSC向 BSS发送的内部切换命令中不携带建立第一终 端和第二终端间的话路的本地交换和通知所述 BSS进行旁路操作的指示, 切 换后仍然将话路在 MSC进行环回, 从而由 MSC引出旁路进行监听。
本实施例的合法监听的方法, 在第一终端进行 BSS内切换, 且在该第一 终端和在第二终端建立话路后, 可以釆用上述的四种方式对两个终端的话路 进行监听。 该方法不会造成建立本地交换的两个终端的话路的语音中断或可 以使得中断的时间大大缩短, 使得被监听者不容易察觉到其话路被监听。
另外, 若将在 BSS内与第二终端进行会话且建立了本地交换的第一终端 进行 BSS内切换后, 与同在 BSS内的所述第二终端不再满足本地交换建立条 件, 则还可以包括如下步骤:
步骤 701'、 进行第一终端在 BSS内的切换时, MSC在内部切换命令中通 知 BSS解除本地交换;
步骤 702'、 BSS解除本地交换的同时取消第一终端和第二终端间用于将 话路接续到所述 MSC时建立的旁路, 并将 BSS 内的第二终端的话路连接至 MSC;
步骤 703'、 BSS将进行 BSS内切换的第一终端的话路连接至 MSC。 具体地, MSC接收到 BSS发送的内部切换请求消息后, 确定第一终端和 第二终端在 BSS内的本地交换不能继续维持, 即第一终端与第二终端的用户 面链路在切换后必须在 MSC上进行环回, 则 MSC会发起上述解除第一终端 和第二终端间的本地交换的操作。
通过上述步骤 701'〜步骤 703', 可以重新建立两个终端到 MSC的话路, 使得两个终端的话路在 MSC中环回,从而如果监听系统需要对终端进行合法 监听, 则可以直接由 MSC引出话音以供合法监听。
图 8为本发明用于合法监听的 MSC—实施例的结构示意图。如图 8所示, 该 MSC8用于在 BSS9内建立第一终端和第二终端间话路的本地交换的同时或 在 BSS9内建立第一终端和第二终端间话路的本地交换后, 通知 BSS9输出旁 路到 MSC8上以供执行对话路的合法监听。 其中该 MSC8具体可以包括: 第 一发送模块 81、 第一接收模块 82和处理模块 83。 其中, 第一发送模块 81用 于向 BSS9发送建立第一终端和第二终端间话路的本地交换命令和 /或对本地 交换中的话路执行旁路操作的命令; 第一接收模块 82用于接收 BSS9完成本 地交换的建立和 /或将已建立本地交换的话路输出旁路到 MSC8后返回的对应 的完成本地交换应答消息和 /或完成旁路操作应答消息;处理模块 83用于在接 收到 BSS返回的完成本地交换和旁路操作应答消息或完成旁路操作应答消息 后, 将接续到 MSC上的旁路引出以供执行对话路的合法监听。
另夕卜,该 MSC8还可以包括:第二发送模块 84和第二接收模块 85。其中, 第二发送模块 84用于向 BSS9发送释放旁路操作命令;第二接收模块 85用于 接收 BSS9根据释放旁路操作命令将接续到 MSC8上的旁路释放后返回的旁路 释放完成消息。
本实施例提供的 MSC中第一发送模块和第一接收模块中所发送和接收的 消息可以是分别在不同的消息中按时序关系进行发送, 也可以是合并在同一 条消息中同时发送, 其具体方案描述详见上述合法监听的方法实施例中所述, 在此不再赞述。
本实施例提供的 MSC, 通过旁路操作, 从 BSS将两个终端间的话路接续 到 MSC, 从而可以实现从 MSC 引出旁路以供监听系统进行合法监听, 该方 法不会造成已经建立了本地交换的两个终端间的话路上的语音中断或可以使 得语音中断的时间大大缩短, 使得被监听者不容易察觉到其话路被监听。
图 9为本发明用于合法监听的 MSC另一实施例的结构示意图。如图 9所 示,若第一终端从另一 BSS91切换到 BSS92时能够与 BSS92内的第二终端建 立本地交换, 则 MSC8具体可以包括: 第三接收模块 81'、 选择判断模块 82' 和第三发送模块 83'。 其中第三接收模块 8Γ用于接收另一 BSS91发送的切换 需求消息, 请求 MSC8将第一终端切离另一 BSS91 ; 接收 BSS92返回的切换 请求响应消息, 该切换请求响应消息中携带有建立第一终端和第二终端间的 话路的本地交换以及通知 BSS92进行旁路操作的指示的响应; 接收 BSS92完 成所述第一终端的切换、 本地交换的建立以及旁路操作后返回的切换完成消 息, 该切换完成消息中携带有本地交换的建立结果以及旁路操作的结果; 选 择判断模块 82'用于从切换需求消息的小区列表中选择第一终端要切换进入的 目标小区, 判断出目标小区属于 BSS92且判断出第一终端和第二终端间话路 满足本地交换建立条件, 并确定所述第一终端和第二终端是否需要建立本地 交换和旁路输出; 第三发送模块 83'用于向 BSS92发送切换请求消息, 该切换 请求消息中携带建立第一终端和第二终端间话路的本地交换以及通知 BS S92 进行旁路操作的指示; 向另一 BSS91发送切换命令。
本实施例提供的 MSC中描述了第一终端从另一 BSS切换到 BSS后能够 与在 BSS内的第二终端建立本地交换时实现监听系统对终端的合法监听的技 术方案, 切换、 本地交换和旁路的操作可以是分别在不同的消息中按时序关 系进行发送, 也可以是合并在同一条消息中同时发送, 其具体方案描述详见 上述合法监听的方法实施例中所述, 在此不再赘述。
本实施例提供的 MSC, 通过旁路操作, 从 BSS将两个终端间的话路接续 到 MSC, 从而可以实现从 MSC 引出旁路以供监听系统进行合法监听, 该方 法不会造成已经建立了本地交换的两个终端间的话路上的语音中断或可以使 得语音中断的时间大大缩短, 使得被监听者不容易察觉到其话路被监听。
图 10为本发明用于合法监听的 MSC再一实施例的结构示意图。 如图 10 所示, 若第一终端在第二终端所在的 BSS93内进行切换时能够与 BSS93内的 第二终端建立本地交换, 则该 MSC8具体可以包括: 第四接收模块 81"和第四 发送模块 82"。 其中第四接收模块 81 "用于接收 BSS93发送的内部切换请求消 息; 接收 BSS93完成第一终端的切换、 本地交换的建立以及旁路操作后返回 的切换完成响应消息, 该切换完成响应消息中携带有本地交换的建立结果以 及旁路操作的结果; 第四发送模块 82"用于在接收到第四接收模块 81"接收到 的内部切换请求消息后, 向 BSS93发送内部切换命令, 该内部切换命令中携 带建立第一终端和第二终端间话路的本地交换以及通知 BSS93进行旁路操作 的指示。
本实施例提供的 MSC中描述了第一终端进行 BSS93内切换后能够与同一 BSS93 内的第二终端建立本地交换时实现监听系统对终端的合法监听的技术 方案, 切换、 本地交换和旁路的操作可以是分别在不同的消息中按时序关系 进行发送, 也可以是合并在同一条消息中同时发送, 其具体方案描述详见上 述合法监听的方法实施例中所述, 在此不再赘述。
本实施例提供的 MSC, 通过旁路操作, 从 BSS将两个终端间的话路接续 到 MSC, 从而可以实现从 MSC 引出旁路以供监听系统进行合法监听, 该方 法不会造成已经建立了本地交换的两个终端间的话路上的语音中断或可以使 得语音中断的时间大大缩短, 使得被监听者不容易察觉到其话路被监听。
另外, 在本发明实施例中, 还包括两种终端进行切换后不能满足本地交 换条件的情况。
图 11为本发明用于合法监听的 MSC又一实施例的结构示意图。 若将在 BSS92'内与第二终端进行会话且建立了本地交换的第一终端从 BSS92'切换到 另一 BSS91'后, 与驻留在 BSS92'内的第二终端不满足本地交换建立条件, 则 如图 11所示,该 MSC8除了包括上述图 8中所包括的第一发送模块 81、第一 接收模块 82和处理模块 83外, 还可以包括: 第一通知模块 86和第一话路连 接模块 87。 其中第一通知模块 86用于通知 BSS92'解除本地交换; 第一话路 连接模块 87 用于将解除本地交换后的第一终端和第二终端间的话路连接到 MSC8上,以便将第一终端和第二终端间的话路引出以供执行对话路的合法监 听。 通过第一通知模块和第一话路连接模块, 可以重新建立两个终端到 MSC 的话路, 使得两个终端的话路可以在 MSC中环回, 从而如果监听系统需要对 终端进行合法监听, 则可以直接由 MSC引出话音以供合法监听。
图 12 为本发明用于合法监听的 MSC 又一实施例的结构示意图。 将在 BSS93'内与第二终端进行会话且建立了本地交换的第一终端进行 BSS93'内切 换后,与同在 BSS93'内的第二终端不满足本地交换建立条件,则如图 12所示, 该 MSC8除了包括上述图 8中所包括的第一发送模块 81、 第一接收模块 82 和处理模块 83外, 还可以包括: 第二通知模块 86'和第二话路连接模块 87'。 其中第二通知模块 86'用于通知 BSS93'解除本地交换; 第二话路连接模块 87' 用于将解除本地交换后的第一终端和第二终端间的话路连接到 MSC8上, 以 便将第一终端和第二终端间的话路引出以供执行对话路的合法监听。
通过第二通知模块和第二话路连接模块, 可以重新建立两个终端到 MSC 的话路, 使得两个终端的话路可以在 MSC中环回, 从而如果监听系统需要对 终端进行合法监听, 则可以直接由 MSC引出话音以供合法监听。
图 13为本发明合法监听的系统实施例的结构示意图。 如图 13所示, 该 系统包括移动交换中心 MSC1、基站子系统 BSS2以及监听系统 3。其中, MSC1 用于在 BSS2内建立第一终端和第二终端间话路的本地交换的同时或在 BSS2 内建立第一终端和第二终端间话路的本地交换后, 通知 BSS2 输出旁路到 MSC1上; BSS2用于进行旁路操作, 输出旁路到 MSC1 , 以将终端间建立的 话^ 续到 MSC1上; MSC1还用于从接续到 MSC1上的旁路引出话音至监 听系统 3; 监听系统 3用于通过从 MSC1引出的话音执行对话路的合法监听。
本实施例提供的合法监听的系统, 通过旁路操作, 从 BSS将两个终端间 的话^ 续到 MSC, 从而可以实现从 MSC 引出旁路以供监听系统进行合法 监听, 该方法不会造成已经建立了本地交换的两个终端间的话路上的语音中 断或可以使得语音中断的时间大大缩短, 使得被监听者不容易察觉到其话路 被监听。 本发明实施例提供的合法监听的方法和系统的技术方案可以应用在全球 移动通信系统(GSM ) 、 码分多址通信系统(CDMA )或宽带码分多址通信 系统(WCDMA )等通信系统。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流 程, 是可以通过计算机程序来指令相关的硬件来完成, 所述的程序可存储于 一计算机可获取存储介质中, 该程序在执行时, 可包括如上述各方法的实施 例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体( Read-Only Memory, ROM )或随机存^ "i己忆体 ( Random Access Memory, RAM )等。
最后应说明的是: 以上实施例仅用以说明本发明的技术方案, 而非对其 限制; 尽管参照前述实施例对本发明进行了详细的说明, 本领域的普通技术 人员应当理解: 其依然可以对前述各实施例所记载的技术方案进行修改, 或 者对其中部分技术特征进行等同替换; 而这些修改或者替换, 并不使相应技 术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims

权 利 要 求 书
1、 一种合法监听的方法, 其特征在于, 包括:
在基站子系统 BSS内建立第一终端和第二终端间话路的本地交换的同时 或在 BSS内建立第一终端和第二终端间话路的本地交换后, 通知所述 BSS输 出旁路到移动交换中心 MSC上以供执行对话路的合法监听。
2、 根据权利要求 1 所述的合法监听的方法, 其特征在于, 所述在 BSS 内建立第一终端和第二终端间话路的本地交换的同时, 通知所述 BSS输出旁 路到 MSC上以供执行对话路的合法监听具体包括:
所述 MSC发送建立第一终端和第二终端间话路的本地交换以及对所述本 地交换中的话路执行旁路操作的命令至所述 BSS;
所述 MSC接收所述 BSS完成所述本地交换的建立以及将已建立所述本地 交换的话路输出旁路到所述 MSC 后返回的完成本地交换和旁路操作应答消 息;
所述 MSC接收到所述完成本地交换和旁路操作应答消息后,将接续到所 述 MSC上的旁路引出以供执行对话路的合法监听。
3、 根据权利要求 1 所述的合法监听的方法, 其特征在于, 所述在 BSS 内建立第一终端和第二终端间话路的本地交换后, 通知所述 BSS输出旁路到 MSC上以供执行对话路的合法监听具体包括:
所述 MSC发送建立第一终端和第二终端间话路的本地交换的命令至所述 BSS;
所述 MSC接收所述 BSS完成所述本地交换的建立后返回的完成本地交换 应答消息;
所述 MSC接收到所述完成本地交换应答消息后,发送对已建立所述本地 交换的话路执行旁路操作的命令至所述 BSS;
所述 MSC接收所述 BSS将已建立所述本地交换的话路输出旁路到所述
MSC后返回的完成旁路操作应答消息; 所述 MSC接收到所述完成旁路操作应答消息, 将接续到所述 MSC上的 旁路引出以供执行对话路的合法监听。
4、 根据权利要求 1、 2或 3所述的合法监听的方法, 其特征在于, 所述 执行对话路的合法监听之后还包括:
所述 MSC向所述 BSS发送释放旁路操作命令;
所述 MSC接收所述 BSS根据所述释放旁路操作命令将接续到所述 MSC 上的所述旁路释放后返回的旁路释放完成消息。
5、 根据权利要求 1所述的合法监听的方法,其特征在于,若所述第一终 端进行切换后能够与所述 BSS内的第二终端建立本地交换, 则所述在 BSS内 建立第一终端和第二终端间话路的本地交换的同时或在 BSS内建立第一终端 和第二终端间话路的本地交换后,通知所述 BSS输出旁路到 MSC上以供执行 对话路的合法监听具体包括:
所述第一终端进行切换后,所述 MSC在所述 BSS内建立所述第一终端和 第二终端间话路的本地交换的同时,通知所述 BSS输出旁路到所述 MSC上以 供执行对话路的合法监听; 或者
所述第一终端进行切换的过程中,所述 MSC在所述 BSS内建立所述第一 终端和第二终端间话路的本地交换的同时, 通知所述 BSS 输出旁路到所述 MSC上以供执行对话路的合法监听; 或者
所述第一终端进行切换后,先由所述 MSC在所述 BSS内建立所述第一终 端和第二终端间话路的本地交换, 再由所述 MSC通知所述 BSS输出旁路到 MSC上以供执行对话路的合法监听; 或者
所述第一终端进行切换的过程中,先由所述 MSC在所述 BSS内建立所述 第一终端和第二终端间话路的本地交换,再由所述 MSC通知所述 BSS输出旁 路到 MSC上以供执行对话路的合法监听。
6、 根据权利要求 5所述的合法监听的方法,其特征在于,所述第一终端 进行的切换包括 BSS间切换和 BSS内切换, 所述 BSS间切换为所述第一终端从另一 BSS切换到所述第二终端所在的 所述 BSS;
所述 BSS内切换为所述第一终端在所述 BSS内进行切换, 所述第一终端 和第二终端在同一所述 BSS内。
7、 根据权利要求 6所述的合法监听的方法,其特征在于, 当所述第一终 端进行 BSS间切换时, 所述第一终端进行切换的过程中, 所述 MSC在所述 BSS内建立所述第一终端和第二终端间话路的本地交换的同时,通知所述 BSS 输出旁路到所述 MSC上以供执行对话路的合法监听具体包括:
所述 MSC接收到所述另一 BSS发送的切换需求消息后, 向所述 BSS发 送切换请求消息, 所述切换请求消息中携带建立第一终端和第二终端间话路 的本地交换以及通知所述 BSS进行旁路操作的指示;
所述 MSC接收到所述 BSS返回的切换请求响应消息后,向所述另一 BSS 发送切换命令, 所述切换请求响应消息中携带有建立第一终端和第二终端间 话路的本地交换以及通知所述 BSS进行旁路操作的指示的响应;
所述 MSC接收所述 BSS完成所述第一终端的切换、本地交换的建立以及 旁路操作后返回的切换完成消息, 所述切换完成消息中携带有所述本地交换 的建立结果以及所述旁路操作的结果。
8、 根据权利要求 6所述的合法监听的方法,其特征在于, 当所述第一终 端进行 BSS 内切换时, 所述第一终端进行切换的过程中, 所述 MSC在所述 BSS内建立所述第一终端和第二终端间话路的本地交换的同时,通知所述 BSS 输出旁路到所述 MSC上以供执行对话路的合法监听具体包括:
所述 MSC接收到所述 BSS发送的内部切换请求消息后, 向所述 BSS发 送内部切换命令, 所述内部切换命令中携带建立第一终端和第二终端间话路 的本地交换以及通知所述 BSS进行旁路操作的指示;
所述 MSC接收所述 BSS完成所述第一终端的切换、本地交换的建立以及 盘路操作后返回的切换完成响应消息, 所述切换完成响应消息中携带有所述 本地交换的建立结果以及所述旁路操作的结果。
9、 根据权利要求 1所述的合法监听的方法,其特征在于,若所述第一终 端进行切换后不满足与所述 BSS内的第二终端建立本地交换的条件, 则还包 括:
所述 MSC通知所述 BSS解除所述本地交换;
所述 MSC将解除所述本地交换后的所述第一终端和第二终端间的话路连 接到所述 MSC上。
10、 一种用于合法监听的移动交换中心 MSC, 其特征在于, 所述 MSC 用于在基站子系统 BSS内建立第一终端和第二终端间话路的本地交换的同时 或在 BSS内建立第一终端和第二终端间话路的本地交换后, 通知所述 BSS输 出旁路到所述 MSC上以供执行对话路的合法监听。
11、 根据权利要求 10所述的用于合法监听的 MSC, 其特征在于, 所述 MSC具体包括:
第一发送模块, 用于向所述 BSS发送建立第一终端和第二终端间话路的 本地交换命令和 /或对所述本地交换中的话路执行旁路操作的命令;
第一接收模块, 用于接收所述 BSS完成所述本地交换的建立和 /或将已建 立所述本地交换的话路输出旁路到所述 MSC后返回的对应的完成本地交换应 答消息和 /或完成旁路操作应答消息;
处理模块,用于将接续到所述 MSC上的旁路引出以供执行对话路的合法 监听。
12、 根据权利要求 10或 11所述的用于合法监听的 MSC, 其特征在于, 所述 MSC还包括:
第二发送模块, 用于向所述 BSS发送释放旁路操作命令;
第二接收模块, 用于接收所述 BSS根据所述释放旁路操作命令将接续到 所述 MSC上的所述旁路释放后返回的旁路释放完成消息。
13、 根据权利要求 10所述的用于合法监听的 MSC,其特征在于,若所述 第一终端从另一 BSS切换到所述 BSS时能够与所述 BSS内的第二终端建立本 地交换, 则所述 MSC具体包括:
第三接收模块, 用于接收所述另一 BSS发送的切换需求消息; 接收所述 BSS 返回的切换请求响应消息, 所述切换请求响应消息中携带有建立第一终 端和第二终端间话路的本地交换以及通知所述 BSS进行旁路操作的指示的响 应; 接收所述 BSS完成所述第一终端的切换、 本地交换的建立以及旁路操作 后返回的切换完成消息, 所述切换完成消息中携带有所述本地交换的建立结 果以及所述旁路操作的结果;
选择判断模块, 用于从所述切换需求消息的小区列表中选择所述第一终 端要切换进入的目标小区, 判断出所述目标小区属于所述 BSS且判断出所述 第一终端和第二终端间话路满足本地交换建立条件, 并确定所述第一终端和 第二终端是否需要建立本地交换和旁路输出;
第三发送模块, 用于向所述 BSS发送切换请求消息, 所述切换请求消息 中携带建立第一终端和第二终端间话路的本地交换以及通知所述 BSS进行旁 路操作的指示; 向所述另一 BSS发送切换命令。
14、 根据权利要求 10所述的用于合法监听的 MSC,其特征在于,若所述 第一终端在所述第二终端所在的 BSS内进行切换时能够与所述 BSS内的第二 终端建立本地交换, 则所述 MSC具体包括:
第四接收模块, 用于接收所述 BSS发送的内部切换请求消息; 接收所述 BSS 完成所述第一终端的切换、 本地交换的建立以及旁路操作后返回的切换 完成响应消息, 所述切换完成响应消息中携带有所述本地交换的建立结果以 及所述旁路操作的结果;
第四发送模块, 用于在接收到所述第四接收模块接收到的所述内部切换 请求消息后, 向所述 BSS发送内部切换命令, 所述内部切换命令中携带建立 第一终端和第二终端间话路的本地交换以及通知所述 BSS进行旁路操作的指 示。
15、 根据权利要求 11所述的用于合法监听的 MSC,其特征在于,若所述 第一终端进行切换后不满足与所述 BSS内的第二终端建立本地交换的条件, 则所述 MSC还包括:
通知模块, 用于通知所述 BSS解除所述本地交换;
话路连接模块, 用于将解除所述本地交换后的所述第一终端和第二终端 间的话路连接到所述 MSC上。
16、 一种合法监听的系统, 其特征在于, 包括: 移动交换中心 MSC、 基 站子系统 BSS以及监听系统, 其中
所述 MSC,用于在基站子系统 BSS内建立第一终端和第二终端间话路的 本地交换的同时或在 BSS内建立第一终端和第二终端间话路的本地交换后, 通知所述 BSS输出旁路到 MSC上;
所述 BSS, 用于进行旁路操作, 输出旁路到所述 MSC, 以将所述终端间 建立的话路接续到所述 MSC上;
所述 MSC还用于从接续到所述 MSC上的旁路引出话音至所述监听系统; 所述监听系统,用于通过从所述 MSC引出的话音执行对话路的合法监听。
PCT/CN2009/071166 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心 WO2010111843A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP09842500A EP2426967A4 (en) 2009-04-03 2009-04-03 PROCEDURE, SYSTEM AND MOBILE DISTRIBUTION AGENCY FOR LEGAL HEARING
CN200980117319.XA CN102405662B (zh) 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心
PCT/CN2009/071166 WO2010111843A1 (zh) 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/071166 WO2010111843A1 (zh) 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心

Publications (1)

Publication Number Publication Date
WO2010111843A1 true WO2010111843A1 (zh) 2010-10-07

Family

ID=42827475

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/071166 WO2010111843A1 (zh) 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心

Country Status (3)

Country Link
EP (1) EP2426967A4 (zh)
CN (1) CN102405662B (zh)
WO (1) WO2010111843A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104080132B (zh) * 2013-03-25 2018-06-19 中国移动通信集团公司 一种数据处理方法和设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674706A (zh) * 2004-03-24 2005-09-28 华为技术有限公司 一种实现快速组呼呼叫的方法
CN1802001A (zh) * 2004-12-31 2006-07-12 华为技术有限公司 一种移动通信系统中组呼信道资源的管理方法
CN101350742A (zh) * 2007-07-20 2009-01-21 中兴通讯股份有限公司 一种实现下一代网络语音监听的方法和系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1691675B (zh) * 2004-04-20 2012-03-21 华为技术有限公司 一种自动上报目标用户设备位置信息的方法
CN100384297C (zh) * 2005-01-07 2008-04-23 华为技术有限公司 一种移动网接网方法
ES2286768T3 (es) * 2005-03-07 2007-12-01 Alcatel Lucent Interceptacion legal en redes.
EP1883195A1 (en) * 2006-07-28 2008-01-30 Nokia Siemens Networks Gmbh & Co. Kg Tunnel switching mechanism inside a SGSN for OTA (one tunnel approach) - TTA (Two tunnel approach) switching used for legal interception
CN101141816B (zh) * 2007-10-08 2010-06-02 中兴通讯股份有限公司 一种主控msc获取服务msc下移动终端位置的方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674706A (zh) * 2004-03-24 2005-09-28 华为技术有限公司 一种实现快速组呼呼叫的方法
CN1802001A (zh) * 2004-12-31 2006-07-12 华为技术有限公司 一种移动通信系统中组呼信道资源的管理方法
CN101350742A (zh) * 2007-07-20 2009-01-21 中兴通讯股份有限公司 一种实现下一代网络语音监听的方法和系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2426967A4 *

Also Published As

Publication number Publication date
CN102405662A (zh) 2012-04-04
EP2426967A1 (en) 2012-03-07
CN102405662B (zh) 2014-06-11
EP2426967A4 (en) 2012-03-07

Similar Documents

Publication Publication Date Title
JP4708473B2 (ja) 通信システム、移動機、着信制御方法
CN101448287B (zh) 一种激活状态下用户设备跨接入网切换的实现方法
JP2004502378A (ja) 通信システムにおける無線アクセス・ベアラーの再構成方法
JP2003530767A (ja) インターネット・プロトコル移動通信ネットワークの技術分野で呼設定を行うための手法
JP4701289B2 (ja) 非同期移動通信網から同期移動通信網へのハンドオーバー方法
JP5547337B2 (ja) 回線交換フォールバック(csfb)を中止する方法、移動管理装置、ビジターロケーションレジスタ及びcsfb通信システム
JP2011505718A (ja) 移動無線ネットワークにおいて回路交換コールを確立する方法及び移動無線ネットワーク
WO2009065321A1 (fr) Procédé, système et dispositif pour traiter le service d'un domaine à commutation de circuits
EP2156687B1 (en) Call handling in a mobile communications network
WO2009067912A1 (fr) Procédé et dispositif de commutation pour mettre en œuvre une commutation
KR101012004B1 (ko) 이동통신 시스템에서 핵심망과 제어국 사이의 자원 절약을 위한 장치 및 방법
CN102497396B (zh) 通信方法、基站、基站控制器和移动交换中心
WO2011017894A1 (zh) 一种本地呼叫本地交换的实现方法和系统
WO2011113207A1 (zh) 用于业务交换的方法以及设备
WO2011057578A1 (zh) 一种本地呼叫本地交换的实现方法
JP5254242B2 (ja) トランキングシステムにおける呼出方法及びその装置
KR100641326B1 (ko) 차세대 이동통신망에서의 호처리 방법
WO2010111843A1 (zh) 合法监听的方法、系统及移动交换中心
WO2008148313A1 (fr) Procédé de transfert, station mobile et dispositif de commutation
CN102244928A (zh) 一种语音呼叫被呼、起呼建立方法、装置及系统
WO2010091612A1 (zh) 建立本地交换的方法、核心网设备及基站子系统
CN101860926B (zh) 一种切入过程中呼叫建立方法和系统
CN100442938C (zh) 寻呼双模终端的方法
KR100976935B1 (ko) 비동기망과 동기망이 혼재된 이동통신망에서의 핸드오버방법
KR20090124283A (ko) 통신시스템에서 호 충돌을 방지하는 방법 및 장치

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980117319.X

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09842500

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 4287/KOLNP/2011

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2009842500

Country of ref document: EP

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: PI0925038

Country of ref document: BR

ENP Entry into the national phase

Ref document number: PI0925038

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20111003