WO2010142175A1 - Method, system and network element manager for law enforcement monitoring in internet protocol multimedia subsystem - Google Patents

Method, system and network element manager for law enforcement monitoring in internet protocol multimedia subsystem Download PDF

Info

Publication number
WO2010142175A1
WO2010142175A1 PCT/CN2010/072414 CN2010072414W WO2010142175A1 WO 2010142175 A1 WO2010142175 A1 WO 2010142175A1 CN 2010072414 W CN2010072414 W CN 2010072414W WO 2010142175 A1 WO2010142175 A1 WO 2010142175A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
legal
follow
system
Prior art date
Application number
PCT/CN2010/072414
Other languages
French (fr)
Chinese (zh)
Inventor
刘小军
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CN200910203774.3 priority Critical
Priority to CN 200910203774 priority patent/CN101583129A/en
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010142175A1 publication Critical patent/WO2010142175A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1013Network architectures, gateways, control or user entities
    • H04L65/1016IMS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Abstract

A method, system and network element manager for law enforcement monitoring in an Internet Protocol Multimedia Subsystem (IMS) network are disclosed in the present invention. The method includes: a Law Enforcement Monitoring Facility (LEMF) distributes the control information of a target subscriber to the network element manager of the IMS network; the network element manager maps the control information to tracing commands and then distributes them; when receiving the reported tracing data, the network element manager converts the tracing data into monitoring data and reports the monitoring data to the LEMF. The present invention implements the monitoring function by using the network element manager, and has lower requirements for network elements of the existing network, which are only required to support the tracing function, and the reconstruction of the network is easy.

Description

 Method and system of legal supervision in P Multi-media

Wood field

 This relates to the field of communications, and in particular to the law enforcement methods and methods in the P-Multimedia System.

Background

 P medaCo e ewokS bsysem, is the next generation of the third generation of partners (dGe eaoesp ec, 3GPP), its special feature is (Sesso a Pooco, P) Hugh, connected, each And each control function carrying capacity is divided into calls, each and each

 Special and various integration capabilities. The main functions of the game include call control (C Sesso Co o F c o , C CF) for users, control and other functions, centrally managing users.

Each user ( ome S bsc be Seve, ) provides each of the various control functions ( pp ca o Se Ve, A ). Also in

, , , , , . . The middle and the near is related to the interconnection control (e co ec o Bode Co o F co , with BCF) about the positioning function (S bsc po ocao F co , F) and other functions. Among them, the C CF angular component agent C CF ( oxy-C CF, PC CF) C CF ( e oga gC CF, -CC ) and the respective C CF ( ev gC CF, -C CF), etc. Different functions can be combined physically. The PC CF in the previous location of the user is connected, the -C CF is connected to the user-C CF, and the functions are completed. It is connected, the user is solid or can take the same and each. P is the basic control system, which is the multi-media communication framework established by the engineering (ee E g ee gTaskFo ce, TF). P is used to control, repair and terminate the control of multimedia , and multi-media cooperation, together in the control and rest. The regulatory needs of legal efforts are the functions of the unified system. At present, the third-generation partners and continents (Eopee Teecomm ca osad ds se, T) are legally formulated, but only the C CF is required to use the P-message to make information, and the user has no information. The information of the user and the user can be more complete, and the user's needs are more satisfied. 1 is a schematic diagram of the existing user in the PC CF and the connection function (ccessBode G ewayF co, A-BG). As shown in Figure 1, the C CF controls the configuration of the A-BGF user, and whether the C CF needs to analyze the user. If necessary, the private interface is connected to A-BGF, or the private interface is supported by GPR (aewayGR Spopoode, GG).

The scheme shown in 1 includes legal (awE o ceme oog Fac y, F), and controls all events. Contains the interaction of the interface ( a dove e ace, ), where interface 1 ( a dove e ace o 1, ) is primarily responsible for management and information, and interface 2 ( a dove e ace o 2, 2) is primarily responsible for the compromise For message and event messages, interface 3 (a dove e ace o 3, 13) is primarily responsible for the compromise of the user's information. In, the function needs to interact with or exchange information with the interface. The middle A and so on include internal functions (eae cep o F co , F) and functions ( e veyF co , F) , in which the F3 user has 13 interfaces, the F2 is 2, and the management function (dm sao F co , AF) Responsible for F interaction, complete management configuration. content

 The wood to be solved by the firm lies in the need to provide legal methods and systems to reduce the legality. In order to solve the problem, the law provides a legal method in the P-community system, including the legal analysis of the user's information to the P-media system.

 Upon receipt of the follow-up, you will be sent to the legal.

 In the steps of mapping the information and following the command, the method of the commander P multi-media will be included in the method of the user, and the user will be followed up.

 In the steps of mapping the information and following the command, the function method of the commander P multimedia will be included in the function of the user, and the function will analyze the user's follow-up.

 , including the user information and/or event information and the order of the information to be legally included, including the information of the rest of the Hugh user to be legal, and or the signalling event information to be followed Make the information legal.

 The user is included, including the user or the user, the user, and the user before or after the call.

, , access function (A-BGF) , functions, including the following or multi-agent call control, each call control and each. To solve the problem, the law provides the legal system in the P-multi-media system, including the legal and the

 Legally, the user's information will be analyzed and received.

 Receiving legal information, will

The information mapping and the command downhole as well as the receipt of the follow-up will be legally specific.

 , legal system, nearly including P multi-media, including

 Will be followed by the commander and, as well as the user on the receiving

 Analysis of the user's access to P media, will analyze the user's follow up.

 , legal system, including the function of P multi-media system, among which

 Will be followed by the commander function, and the user of the receiving function

 The function analyzes the user to connect with the multi-media system, and will analyze the user's follow-up.

 The information about the special information about the information and the information about the information will be legalized.

To solve the Shangmu, this provides P-multi-media, including legal, including Legally receiving legal information, mapping the information to the order and the follow-up, will be legally specific.

 , , legally includes the first child and the second child , where

 The first child receives the legal information, maps the information and commands the order.

 The second child receives the follow-up and will legally follow the special fold.

 The first sub-subsequent will command the P-communication system's meta and/or functions.

 The second child will close the information of the special escrow users to the legal, and or will follow up the signaling event information and the order information.

Compared with the existing wood, the event information and the order information and the user information of the user satisfy the 3GPP/T, and overcome the defects of the existing wood. The technology of this invention does not need to be private, and does not require users to take it off.

 More sheep legal function. The technical scheme of the present invention has been effectively reduced.

 The combination of functions reduces the solution and the sheep, making it easier to communicate and better meet the needs of law enforcement.

1 is the existing user in the wood

 2 is the legal composition of this

3 is the flow chart of the legal method in this book. The preferred mode of the present invention is as follows:

First, 3GPP and T do not have PC CF to A-BGF or GG interface, private interface interoperability, and PC CF, PC CF itself does not need users to rest, and PC CF requires users to use the existing wood solution. Hugh's break, the fruit surface has a change, deletion or repair, etc., PC CF needs to pass the A-BGF phase to enhance the combination of PC CF and A-BGF function. The following will be combined with the method of detailing and explaining the wood, the wood effect can be fully understood. 2 is the legal composition of the present. 2, the system mainly includes legal F 0, (eme a age, ) 220, A-BGF230 and function PC CF240 SC CF 250 A 260, where F 0, will analyze the user information to 220 220, map the information With the command and the following, the follow-up F2 0 will include the user information and/or event information and the order information, 220 can be followed by the command friend A-BGF 230, which can be used to function PC CF240 SC CF220 and A 260 or more, the A-BGF230 and the function PC CF240 SC CF250 and A 260 on the analysis of the user's follow-up signaling event information and the order information to F 210, will be followed by the Hugh user Up to 10 220 may include a legal office, legally receive F 0 information, map information to the order downhole, and up to Follow, will follow the F2 0 legal can include the first child and the second child, the first child

 Receiving the information of F, and mapping the information to the second sub-received command of the order, and the next F2 0 first will be followed by the command.

A-BGF230 and / or function P- 40 - 20 and A 260 or more.

 The second sub-near can close the information of the Hugh user to F 0, and the signalling event information and order information to be followed by F2 0

 A-BGF230 and function P- 40 S- 2 and A 260, receive the user's information mapping with the command, and, the user is connected, will follow up to 220

The following is a description of the system shown in the legal method 2 shown in FIG.

 3 is the flow of the legal method in this book. In this compromise, the user's information is sent to (eme a age), the map is followed by the command ( ac ) A-BGF, and the user is connected.

 Whether the A-BGF user is followed, the follow-up is followed, and then the compromise is made, and the information mapping can be closely followed by the command function function sheep, P-C CF-C CF and A. Analysis of user access, whether the function of the sheep user, and the follow-up information and rest, then special compromise

As shown in 3, the third method of the legal method mainly includes the following steps. Step 3 2, the compromise interface will analyze the user's information to step 3 4, map the information to the command, and the command will be separated from the command.

A-BGF - C CF SC CF and A (step 304a, step 304b, step 3 4c, and step 304d, respectively). Step 3 6, user □) call, A-BGF -C CF -C CF and A are sent to step 308. A-BGF-C CF SC CF and A match the local follower, and the user followed, step up to step 310, with the user's signaling information and event information,

2 The interface sends the user's signaling information and event information to the compromise step 312, the P information, the A SC CF -C CF and the A-BGF step 4, the A SC CF -C CF and the A-BGF up step 5316 , with the user's signaling information and event information, through the interface 2 to the compromise step 318, the final P information, A-BG-CC SC CF and A to step 320, A SC CF -C CF and A- The BGF goes up to step 322, with the user's signaling information and event information, through the interface 2 to the compromise step 324, and the message, A SC CF - C CF and A-BGF are sent to step 326, A SC CF - C CF and A-BGF go up to step 5328, with the user's signaling information and event information, through the interface 2 to the compromise step 330, the 200 O final message, 200 O the final message A SC CF - C CF and A-BGF are sent to step 332. If A-BGF supports rest, then A-BGF will follow (this is adjourned) J (step 332a).

The user's user is off, and the user 13 is taken to the compromise (step 332). If the A-BGF does not support the education, the user does not have the information. The A-BGF supports the rest step 334, the household AC. The message, A-BGF-C CF-C CF and A send the AC message to step 336, A SC CF - C CF and A-BGF go up to step 5338, and the user's signaling information and event information are passed. The interface is on the fold. In the case of the case, only A-BGF, -C CF, SC CF and A support 3GPP functions are required, and no support function is required. A-BGF-C CF, SC CF, and A will teach all the user's call orders and each other than the user's signaling. It should be noted that, in the analysis, the user may be a user, may be a user, may be a user, and may be a user before the call. In the unified group, the concentration is concentrated, and the management is hundreds or even more. The use of the function, the requirements are low, just use the support and function, you can make sheep. Compared with the existing wood, the event information and the order information and the user information of the user satisfy the 3GPP/T, and overcome the defects of the existing wood. The Ming technology technology program does not require the private use of the order, and does not require the user to take a break, making the sheep more legitimate function, especially the user's rest, the sheep's information content, the more sheep, the more complete user information. The Ming-Technology solution has effectively reduced the combination of functions, reduced the solution, and more easily interoperable, better meeting and law enforcement needs.

This combination is specific, but in the field of Mudong, it can be repaired without the spirit or the circumstances. of

The use of this method provides a legal method and system in the P-communication system, and the event information and the order information, as well as the user's rest, & 3GPP/T, overcome the defects of the existing wood. The technology solution of this invention does not need to be private, and does not require the user to take a break, making the sheep more legitimate. The technology solution of the present invention has effectively reduced the combination of functions, reduced the scheme, and created sheep, which is easier to communicate with each other, and better meets the requirements of law enforcement.

Claims

Requirements 1, the legal method in the P-community system, including the legal analysis of the user's information to the P-media system, the information mapping and the command downhole
 Upon receipt of the follow-up, you will be sent to the legal.
2. The method of requirement 1, where the mapping of the information is followed by the step of the command
The method that will be followed by the commander P's multi-media system includes the user's access to the multi-media system, and will analyze the user's follow-up.
 3, the method of request 1 or 2, where the mapping of the information is followed by the step of the command
The function method of the multi-media system with the commander P will be included in the user's connection with the user, and the function will analyze the user's follow-up.
 4. The method of claim 1, where
 Including user information and/or event information and order information
The information of the Hughes users in the follow-up will be legalized, and the information and event information of the following will be legalized.
5. A method of requiring any of the items 1 to 4, wherein The user is included, including or among the following users, users, users, and users before and after the call.
6. A method of requiring any of 2, wherein
 , connection function ( A-BGF )
7. The method of claim 3, wherein
 Function, lower or multi-agent call control, each call control, and each.
8. The legal system in the P-community system includes legal and legal, and each legally analyzes the user's information and receives it.
 Receiving legal information, will
The information mapping and the command downhole as well as the receipt of the follow-up will be legally specific.
 9. The legal system of requirement 8 includes nearly P multi-media sub-systems, among which
 Will be followed by the commander and, as well as the user on the receiving
 Analysis of the user's access to P media, will analyze the user's follow up.
 10. Requires the legal system of 8 or 9 and includes the functions of the P-multi-media system.
Nearly with the command friend function, as well as the user of the receiving function The function analysis user connects to the P multi-media system, and will analyze the user's follow-up.
 11. The legal system of Requirement 8, in which the Hughes users who are in the near future will be rested with legal information, and the information and event information of the signaling special events will be legalized.
 12, P multi-media rest, the United States, including legal, which legally receive legal information, the information mapping and command downhole, and the receipt of the follow-up, will be special legal.
 13. The requirements of 12, legally include the first child and the second child, of which
 The first child receives the legal information, maps the information and commands the order.
 The second child receives the follow-up and will be legally specific.
 14. Requirements 12, of which
 The first sub-command will follow the command and the P-community system's meta and/or functions.
 15. Requirements 12, of which
 The second child will be close to the rest of the information, and will be able to legalize the information and the information.
PCT/CN2010/072414 2009-06-12 2010-05-04 Method, system and network element manager for law enforcement monitoring in internet protocol multimedia subsystem WO2010142175A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN200910203774.3 2009-06-12
CN 200910203774 CN101583129A (en) 2009-06-12 2009-06-12 Legal interception system and method in IP multi-media subsystem network

Publications (1)

Publication Number Publication Date
WO2010142175A1 true WO2010142175A1 (en) 2010-12-16

Family

ID=41365031

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2010/072384 WO2010142172A1 (en) 2009-06-12 2010-04-30 System and method for lawful interception in ip multimedia subsystem network
PCT/CN2010/072414 WO2010142175A1 (en) 2009-06-12 2010-05-04 Method, system and network element manager for law enforcement monitoring in internet protocol multimedia subsystem

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/072384 WO2010142172A1 (en) 2009-06-12 2010-04-30 System and method for lawful interception in ip multimedia subsystem network

Country Status (2)

Country Link
CN (1) CN101583129A (en)
WO (2) WO2010142172A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101583129A (en) * 2009-06-12 2009-11-18 中兴通讯股份有限公司 Legal interception system and method in IP multi-media subsystem network
CN102487521B (en) * 2010-12-03 2016-06-08 中兴通讯股份有限公司 Media content monitor method and device in IP Multimedia System
CN102843337B (en) * 2011-06-20 2017-07-14 中兴通讯股份有限公司 Media content monitor method and device in IP multimedia subsystem
WO2015183299A1 (en) 2014-05-30 2015-12-03 Hewlett-Packard Development Company, L.P. Positional input on displays

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983950A (en) * 2005-12-13 2007-06-20 华为技术有限公司 Method for monitoring multi-medium sub-system domain
CN101035036A (en) * 2007-04-19 2007-09-12 中兴通讯股份有限公司 Legal monitoring system and method
WO2007113068A1 (en) * 2006-03-30 2007-10-11 Nokia Siemens Networks Gmbh & Co. Kg Method for lawful interception in the case of call forwarding in a packet-oriented telecommunications network
US20090097420A1 (en) * 2007-10-15 2009-04-16 Industrial Technology Research Institute Method and system for lawful interception of value-added service in ip multimedia subsystem
CN101583129A (en) * 2009-06-12 2009-11-18 中兴通讯股份有限公司 Legal interception system and method in IP multi-media subsystem network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212356B (en) * 2006-12-31 2011-05-18 华为技术有限公司 Session border controller, communication system and listening method
CN101247431B (en) * 2008-03-14 2010-12-08 中兴通讯股份有限公司 Method and system for implementing IP multimedia subsystem monitoring
CN101420432B (en) * 2008-12-01 2012-10-17 华为技术有限公司 Implementing method, system and apparatus for IMS listening

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983950A (en) * 2005-12-13 2007-06-20 华为技术有限公司 Method for monitoring multi-medium sub-system domain
WO2007113068A1 (en) * 2006-03-30 2007-10-11 Nokia Siemens Networks Gmbh & Co. Kg Method for lawful interception in the case of call forwarding in a packet-oriented telecommunications network
CN101035036A (en) * 2007-04-19 2007-09-12 中兴通讯股份有限公司 Legal monitoring system and method
US20090097420A1 (en) * 2007-10-15 2009-04-16 Industrial Technology Research Institute Method and system for lawful interception of value-added service in ip multimedia subsystem
CN101583129A (en) * 2009-06-12 2009-11-18 中兴通讯股份有限公司 Legal interception system and method in IP multi-media subsystem network

Also Published As

Publication number Publication date
WO2010142172A1 (en) 2010-12-16
CN101583129A (en) 2009-11-18

Similar Documents

Publication Publication Date Title
US20110307455A1 (en) Contact information merger and duplicate resolution
US8275843B2 (en) Collaborative conference experience improvement
Woodcock et al. Features of CML: A formal modelling language for systems of systems
CN102710554B (en) The service state detection method of distributed information system and distributed information system
CA2839534C (en) Systems, apparatus, and methods for collaborative and distributed emergency multimedia data management
CN101616428B (en) Mobile data service monitoring analysis system and implementation method thereof
CN102571686B (en) Method for realizing cloud conference system
CN102130896B (en) Method and system for correlating network applications
CN102158612A (en) Cloud computing technology-based virtual call center system and operating method thereof
Gomillion Building telephony systems with asterisk
JP2016072987A (en) Dynamic media negotiation in secure media-based conferencing
CN105306861B (en) A kind of Web-based instruction recorded broadcast method and system
CN101317363B (en) Media stream replacement method and system in terminal conversation course
WO2007027317A3 (en) System and method of managing telephone calls within a voice over internet protocol telephone system
CN103442042B (en) Incremental data synchronization method and system
EP2884719B1 (en) Information processing method, and priority information sending method and device
CN100466552C (en) NGN system and end to end tracing method and device applied in this system
CN104580137A (en) Application programming interface enabling communication features for different communication protocols
KR20100089865A (en) Process for establishing a social network with an adapted network architecture comprising a reasoning server
CN102891877B (en) Realize the Online Processing System and method of terminal applies
CN101404696A (en) Visible service flow tracing method and system, service flow processing system
JP6168534B2 (en) Multimodal communication prioritization in wireless networks
CN104756485B (en) Communication system and computer readable medium
CN102857891B (en) Domain selection method and domain selection system for called party and HSS(home subscriber server) in domain selection system
US9424509B2 (en) System for application personalization for a mobile device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10785688

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct app. not ent. europ. phase

Ref document number: 10785688

Country of ref document: EP

Kind code of ref document: A1