WO2010142175A1 - Procédé, système et gestionnaire d'éléments de réseau permettant une surveillance policière dans un sous-système multimédia à protocole internet - Google Patents

Procédé, système et gestionnaire d'éléments de réseau permettant une surveillance policière dans un sous-système multimédia à protocole internet Download PDF

Info

Publication number
WO2010142175A1
WO2010142175A1 PCT/CN2010/072414 CN2010072414W WO2010142175A1 WO 2010142175 A1 WO2010142175 A1 WO 2010142175A1 CN 2010072414 W CN2010072414 W CN 2010072414W WO 2010142175 A1 WO2010142175 A1 WO 2010142175A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
legal
follow
function
Prior art date
Application number
PCT/CN2010/072414
Other languages
English (en)
Chinese (zh)
Inventor
刘小军
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010142175A1 publication Critical patent/WO2010142175A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Definitions

  • This relates to the field of communications, and in particular to the law enforcement methods and methods in the P-Multimedia System.
  • P medaCo e ewokS bsysem is the next generation of the third generation of partners (dGe eaoesp ec, 3GPP), its special feature is (Sesso a Pooco, P) Hugh, connected, each And each control function carrying capacity is divided into calls, each and each
  • the main functions of the game include call control (C Sesso Co o F c o , C CF) for users, control and other functions, centrally managing users.
  • call control C Sesso Co o F c o , C CF
  • Each user ( ome S bsc be Seve, ) provides each of the various control functions ( pp ca o Se Ve, A ). Also in
  • the middle and the near is related to the interconnection control (e co ec o Bode Co o F co , with BCF) about the positioning function (S bsc po ocao F co , F) and other functions.
  • the C CF angular component agent C CF oxy-C CF, PC CF
  • C CF e oga gC CF, -CC
  • the respective C CF ev gC CF, -C CF
  • P is the basic control system, which is the multi-media communication framework established by the engineering (ee E g ee gTaskFo ce, TF). P is used to control, repair and terminate the control of multimedia , and multi-media cooperation, together in the control and rest.
  • the regulatory needs of legal efforts are the functions of the unified system.
  • the third-generation partners and continents (Eopee Teecomm ca osad ds se, T) are legally formulated, but only the C CF is required to use the P-message to make information, and the user has no information. The information of the user and the user can be more complete, and the user's needs are more satisfied.
  • FIG. 1 is a schematic diagram of the existing user in the PC CF and the connection function (ccessBode G ewayF co, A-BG).
  • the C CF controls the configuration of the A-BGF user, and whether the C CF needs to analyze the user. If necessary, the private interface is connected to A-BGF, or the private interface is supported by GPR (aewayGR Spopoode, GG).
  • the scheme shown in 1 includes legal (awE o ceme oog Fac y, F), and controls all events. Contains the interaction of the interface ( a dove e ace, ), where interface 1 ( a dove e ace o 1, ) is primarily responsible for management and information, and interface 2 ( a dove e ace o 2, 2) is primarily responsible for the compromise For message and event messages, interface 3 (a dove e ace o 3, 13) is primarily responsible for the compromise of the user's information. In, the function needs to interact with or exchange information with the interface.
  • the middle A and so on include internal functions (eae cep o F co , F) and functions ( e veyF co , F) , in which the F3 user has 13 interfaces, the F2 is 2, and the management function (dm sao F co , AF) Responsible for F interaction, complete management configuration.
  • the wood to be solved by the firm lies in the need to provide legal methods and systems to reduce the legality.
  • the law provides a legal method in the P-community system, including the legal analysis of the user's information to the P-media system.
  • the method of the commander P multi-media will be included in the method of the user, and the user will be followed up.
  • the function method of the commander P multimedia will be included in the function of the user, and the function will analyze the user's follow-up.
  • the user is included, including the user or the user, the user, and the user before or after the call.
  • A-BGF access function
  • the function analyzes the user to connect with the multi-media system, and will analyze the user's follow-up.
  • the information about the special information about the information and the information about the information will be legalized.
  • the first child receives the legal information, maps the information and commands the order.
  • the second child receives the follow-up and will legally follow the special fold.
  • the first sub-subsequent will command the P-communication system's meta and/or functions.
  • the second child will close the information of the special escrow users to the legal, and or will follow up the signaling event information and the order information.
  • the event information and the order information and the user information of the user satisfy the 3GPP/T, and overcome the defects of the existing wood.
  • the technology of this invention does not need to be private, and does not require users to take it off.
  • 3GPP and T do not have PC CF to A-BGF or GG interface, private interface interoperability, and PC CF, PC CF itself does not need users to rest, and PC CF requires users to use the existing wood solution. Hugh's break, the fruit surface has a change, deletion or repair, etc., PC CF needs to pass the A-BGF phase to enhance the combination of PC CF and A-BGF function.
  • the following will be combined with the method of detailing and explaining the wood, the wood effect can be fully understood. 2 is the legal composition of the present.
  • the system mainly includes legal F 0, (eme a age, ) 220, A-BGF230 and function PC CF240 SC CF 250 A 260, where F 0, will analyze the user information to 220 220, map the information With the command and the following, the follow-up F2 0 will include the user information and/or event information and the order information, 220 can be followed by the command friend A-BGF 230, which can be used to function PC CF240 SC CF220 and A 260 or more, the A-BGF230 and the function PC CF240 SC CF250 and A 260 on the analysis of the user's follow-up signaling event information and the order information to F 210, will be followed by the Hugh user Up to 10 220 may include a legal office, legally receive F 0 information, map information to the order downhole, and up to follow, will follow the F2 0 legal can include the first child and the second child, the first child
  • the second sub-near can close the information of the Hugh user to F 0, and the signalling event information and order information to be followed by F2 0
  • A-BGF230 and function P- 40 S- 2 and A 260 receive the user's information mapping with the command, and, the user is connected, will follow up to 220
  • the third method of the legal method mainly includes the following steps.
  • Step 3 2 the compromise interface will analyze the user's information to step 3 4, map the information to the command, and the command will be separated from the command.
  • A-BGF - C CF SC CF and A (step 304a, step 304b, step 3 4c, and step 304d, respectively).
  • Step 3 6 user ⁇ ) call, A-BGF -C CF -C CF and A are sent to step 308.
  • A-BGF-C CF SC CF and A match the local follower, and the user followed, step up to step 310, with the user's signaling information and event information,
  • the interface sends the user's signaling information and event information to the compromise step 312, the P information, the A SC CF -C CF and the A-BGF step 4, the A SC CF -C CF and the A-BGF up step 5316 , with the user's signaling information and event information, through the interface 2 to the compromise step 318, the final P information, A-BG-CC SC CF and A to step 320, A SC CF -C CF and A-
  • the BGF goes up to step 322, with the user's signaling information and event information, through the interface 2 to the compromise step 324, and the message, A SC CF - C CF and A-BGF are sent to step 326, A SC CF - C CF and A-BGF go up to step 5328, with the user's signaling information and event information, through the interface 2 to the compromise step 330, the 200 O final message, 200 O the final message A SC CF - C CF and A-BGF are sent to step 332.
  • the user's user is off, and the user 13 is taken to the compromise (step 332). If the A-BGF does not support the education, the user does not have the information.
  • the A-BGF supports the rest step 334, the household AC.
  • the message, A-BGF-C CF-C CF and A send the AC message to step 336, A SC CF - C CF and A-BGF go up to step 5338, and the user's signaling information and event information are passed.
  • the interface is on the fold. In the case of the case, only A-BGF, -C CF, SC CF and A support 3GPP functions are required, and no support function is required.
  • A-BGF-C CF, SC CF, and A will teach all the user's call orders and each other than the user's signaling.
  • the user may be a user, may be a user, may be a user, and may be a user before the call.
  • the concentration is concentrated, and the management is hundreds or even more.
  • the use of the function, the requirements are low, just use the support and function, you can make sheep.
  • the event information and the order information and the user information of the user satisfy the 3GPP/T, and overcome the defects of the existing wood.
  • the Ming technology technology program does not require the private use of the order, and does not require the user to take a break, making the sheep more legitimate function, especially the user's rest, the sheep's information content, the more sheep, the more complete user information.
  • the Ming-Technology solution has effectively reduced the combination of functions, reduced the solution, and more easily interoperable, better meeting and law enforcement needs.
  • the use of this method provides a legal method and system in the P-communication system, and the event information and the order information, as well as the user's rest, & 3GPP/T, overcome the defects of the existing wood.
  • the technology solution of this invention does not need to be private, and does not require the user to take a break, making the sheep more legitimate.
  • the technology solution of the present invention has effectively reduced the combination of functions, reduced the scheme, and created sheep, which is easier to communicate with each other, and better meets the requirements of law enforcement.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un procédé, un système et un gestionnaire d'éléments de réseau permettant de mettre en oeuvre surveillance policière dans un réseau de sous-systèmes multimédia à protocole Internet (IMS). Le procédé comprend les étapes suivantes: une agence de surveillance policière (LEMF) distribue des données de contrôle relatives à un abonné cible au gestionnaire d'éléments de réseau du réseau IMS; le gestionnaire d'éléments de réseau fait correspondre les données de contrôle à des commandes de traçage et les distribue ensuite; à la réception des données de traçage rapportées, le gestionnaire d'éléments de réseau convertit les données de traçage en données de surveillance et rapporte les données de surveillance à la LEMF. L'invention met en œuvre la fonction de surveillance au moyen du gestionnaire d'éléments de réseau, et comporte des exigences inférieures à l'égard des éléments de réseau du réseau existant qui ne servent qu'à permettre la fonction de traçage, la reconstruction du réseau étant facile à mettre en oeuvre.
PCT/CN2010/072414 2009-06-12 2010-05-04 Procédé, système et gestionnaire d'éléments de réseau permettant une surveillance policière dans un sous-système multimédia à protocole internet WO2010142175A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 200910203774 CN101583129A (zh) 2009-06-12 2009-06-12 一种ip多媒体子系统网络中的合法监听系统及方法
CN200910203774.3 2009-06-12

Publications (1)

Publication Number Publication Date
WO2010142175A1 true WO2010142175A1 (fr) 2010-12-16

Family

ID=41365031

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/CN2010/072384 WO2010142172A1 (fr) 2009-06-12 2010-04-30 Système et procédé d'interception légale dans un réseau de sous-systèmes multimédia ip
PCT/CN2010/072414 WO2010142175A1 (fr) 2009-06-12 2010-05-04 Procédé, système et gestionnaire d'éléments de réseau permettant une surveillance policière dans un sous-système multimédia à protocole internet

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/072384 WO2010142172A1 (fr) 2009-06-12 2010-04-30 Système et procédé d'interception légale dans un réseau de sous-systèmes multimédia ip

Country Status (2)

Country Link
CN (1) CN101583129A (fr)
WO (2) WO2010142172A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111490962A (zh) * 2019-01-25 2020-08-04 华为技术有限公司 一种监听方法和网络设备

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101583129A (zh) * 2009-06-12 2009-11-18 中兴通讯股份有限公司 一种ip多媒体子系统网络中的合法监听系统及方法
CN102487521B (zh) * 2010-12-03 2016-06-08 中兴通讯股份有限公司 Ip多媒体子系统中媒体内容监听方法及装置
CN102843337B (zh) * 2011-06-20 2017-07-14 中兴通讯股份有限公司 Ip多媒体子系统中媒体内容监听方法及装置
CN106662936B (zh) 2014-05-30 2020-09-11 惠普发展公司,有限责任合伙企业 显示器上的位置输入
US11310287B2 (en) 2017-04-26 2022-04-19 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes in a lawful interception system
CN114629881A (zh) * 2020-12-14 2022-06-14 中兴通讯股份有限公司 一种sip网元多地址学习方法及装置、信令监测系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983950A (zh) * 2005-12-13 2007-06-20 华为技术有限公司 多媒体子系统域的业务监听方法
CN101035036A (zh) * 2007-04-19 2007-09-12 中兴通讯股份有限公司 合法监听系统和方法
WO2007113068A1 (fr) * 2006-03-30 2007-10-11 Nokia Siemens Networks Gmbh & Co. Kg Procede pour l'interception legale em cas de transfert d'appels dans un réseau de communication orienté par paquets
US20090097420A1 (en) * 2007-10-15 2009-04-16 Industrial Technology Research Institute Method and system for lawful interception of value-added service in ip multimedia subsystem
CN101583129A (zh) * 2009-06-12 2009-11-18 中兴通讯股份有限公司 一种ip多媒体子系统网络中的合法监听系统及方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212356B (zh) * 2006-12-31 2011-05-18 华为技术有限公司 会话边界控制器、通信系统及监听方法
CN101247431B (zh) * 2008-03-14 2010-12-08 中兴通讯股份有限公司 实现ip多媒体子系统监听的方法及系统
CN101420432B (zh) * 2008-12-01 2012-10-17 华为技术有限公司 一种ims监听的实现方法、系统及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983950A (zh) * 2005-12-13 2007-06-20 华为技术有限公司 多媒体子系统域的业务监听方法
WO2007113068A1 (fr) * 2006-03-30 2007-10-11 Nokia Siemens Networks Gmbh & Co. Kg Procede pour l'interception legale em cas de transfert d'appels dans un réseau de communication orienté par paquets
CN101035036A (zh) * 2007-04-19 2007-09-12 中兴通讯股份有限公司 合法监听系统和方法
US20090097420A1 (en) * 2007-10-15 2009-04-16 Industrial Technology Research Institute Method and system for lawful interception of value-added service in ip multimedia subsystem
CN101583129A (zh) * 2009-06-12 2009-11-18 中兴通讯股份有限公司 一种ip多媒体子系统网络中的合法监听系统及方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111490962A (zh) * 2019-01-25 2020-08-04 华为技术有限公司 一种监听方法和网络设备

Also Published As

Publication number Publication date
CN101583129A (zh) 2009-11-18
WO2010142172A1 (fr) 2010-12-16

Similar Documents

Publication Publication Date Title
WO2010142175A1 (fr) Procédé, système et gestionnaire d'éléments de réseau permettant une surveillance policière dans un sous-système multimédia à protocole internet
CN101335869B (zh) 一种基于Soft-MCU策略的视频会议系统
US9749196B2 (en) Method and device for conference reservation
AU2012271269B2 (en) Systems, apparatus, and methods for collaborative and distributed emergency multimedia data management
CN101030843B (zh) 多媒体会议控制模式的转换方法
CN108881797B (zh) 一种视联网的数据处理方法和装置
CN101184130A (zh) 非实时音频/视频协作的相关构架
JP2016072987A (ja) セキュアなメディアベース・カンファレンシングにおける動的なメディアネゴシエーション
CN101453346B (zh) Ims体系中的多点分层式会议的控制方法
JP2015029340A (ja) インテリジェント会議電話情報エージェント
JP5969675B2 (ja) セキュアなメディアベース・カンファレンシングにおける動的なカンファレンスセッションの再ルーティング
WO2010145148A1 (fr) Système de centre d'appel et procédé afférent de mise en œuvre de service d'appel
CN104753735A (zh) 一种拨测系统及方法
CN102469440B (zh) 用户数据迁移方法、系统和装置
CN103517228A (zh) 一种移动终端的联系人信息提示方法和系统以及移动终端
CN111147789B (zh) 一种音视频流录制的方法、装置、设备以及存储介质
CN110601891B (zh) 一种报警处理的方法以及相关装置
CN101552745A (zh) 一种实现nat的方法及装置
CN113438317B (zh) 一种网关数据处理的方法及装置
CN102083245A (zh) 一种智能终端,以及针对智能终端的协同服务方法和系统
CN102523236A (zh) 一种动态连接建立方法和设备
CN103200153B (zh) 一种ip多媒体子系统业务开通方法、设备及系统
CN102572136A (zh) 呼叫中心及其呼叫业务提供方法
JP6086965B2 (ja) セキュアなメディアベース・カンファレンシングにおける動的シグナリングおよびリソース割り当て
CN103595704A (zh) 一种面向voip的企业通信应用一键呼叫方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10785688

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10785688

Country of ref document: EP

Kind code of ref document: A1