WO2018157322A1 - 一种合法监听的方法、装置及系统 - Google Patents

一种合法监听的方法、装置及系统 Download PDF

Info

Publication number
WO2018157322A1
WO2018157322A1 PCT/CN2017/075279 CN2017075279W WO2018157322A1 WO 2018157322 A1 WO2018157322 A1 WO 2018157322A1 CN 2017075279 W CN2017075279 W CN 2017075279W WO 2018157322 A1 WO2018157322 A1 WO 2018157322A1
Authority
WO
WIPO (PCT)
Prior art keywords
gateway device
user equipment
indication
local
centralized
Prior art date
Application number
PCT/CN2017/075279
Other languages
English (en)
French (fr)
Inventor
曹龙雨
夏渊
孙晓东
周军平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2017/075279 priority Critical patent/WO2018157322A1/zh
Priority to EP17898952.1A priority patent/EP3582478A1/en
Priority to CN201780086987.5A priority patent/CN110326278B/zh
Publication of WO2018157322A1 publication Critical patent/WO2018157322A1/zh
Priority to US16/553,713 priority patent/US20190387397A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/18Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
    • H04M2207/185Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks wireless packet-switched
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0081Network operation, administration, maintenance, or provisioning
    • H04M7/0084Network monitoring; Error detection; Error recovery; Network testing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/36Reselection control by user or terminal equipment

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a method, device, and system for lawful interception.
  • the Serving Gateway SGW
  • PGW Packet Data Network Gateway
  • MME Mobility Management Entity
  • the gateway can be deployed to a location closer to the user equipment (for example, a metropolitan area or a base station location) by means of a gateway downshift.
  • the down-transit gateway can directly send the local service data of the user equipment to the local server (Local APP, LAPP), thereby shortening the data transmission path of the user equipment and reducing the service access delay. Improve network transmission efficiency.
  • the gateway device deployed downward can directly offload the local service to the local application server. Therefore, if the user equipment to be monitored uses the function of local offload, the local service data of the user equipment is offloaded to the local application server at the gateway device that is moved down. At this time, the gateway device deployed in the province cannot be aware of the service data diverted from the gateway device deployed in the downward direction, and the service data of the offloaded traffic cannot be reported to the legal interception center for monitoring.
  • LIG Lawful Interception Gateway
  • the embodiment of the present invention provides a method, a device, and a system for lawful interception, which can solve the problem that the legal interception center cannot legally monitor the local offloaded service data of the user equipment.
  • the first aspect provides a method for lawful interception, including: the centralized gateway device receives the interception indication sent by the legal interception gateway device; and the centralized gateway device sends the closed offload indication to the remote gateway device.
  • the centralized gateway device receives the service data sent by the remote gateway device and reports it to the legal listening center.
  • the interception indication carries the identifier of the user equipment to be monitored, and the off-flow indication is used to notify the remote gateway device to disable the local offload function of the user equipment.
  • the local offloading service of the user equipment is sent to the centralized gateway device, because the remote gateway device disables the local offloading function of the user equipment during the lawful interception of the user equipment.
  • the centralized gateway device can report the local offloading service of the user equipment to the lawful interception center through the legal interception gateway, so that the legal interception center can monitor the local offload service of the user equipment.
  • the centralized gateway device sends a shutdown offload indication to the remote gateway device. It is also known that the local offloading function of the user equipment is enabled on the remote gateway device; when the local offloading function of the user equipment is enabled on the remote gateway device, the centralized gateway device sends the shutdown offloading indication to the remote gateway device. . Therefore, when the remote gateway device does not enable the local offloading function of the user equipment, the centralized gateway device does not send the shutdown offload indication to the remote gateway device after receiving the interception indication. In this way, unnecessary signaling can be reduced and network resources can be saved.
  • the centralized gateway device determines whether the context of the user equipment to be monitored includes the address of the local application server corresponding to the user equipment. If yes, it is determined that the remote gateway device has enabled the local offload function of the user equipment. Therefore, the centralized gateway device can determine whether the remote gateway device has enabled the local offload function of the user equipment by using the determining process.
  • the interception indication also carries the identifier of the service to be monitored, and the closed offload indication sent by the centralized gateway device to the remote gateway is further used to notify the remote gateway device to close the local service of the service of the user equipment. Diversion function. Therefore, it is possible to monitor specific services of a specific user equipment, reduce the amount of data transmission between gateway devices, and improve the efficiency of monitoring.
  • the centralized gateway device after the centralized gateway device sends the shutdown offload indication to the remote gateway device, if the centralized gateway device receives the stop listening indication sent by the legal interception gateway device, the centralized gateway device sends the open gateway device to the remote gateway device. And the off-flow indication is used to notify the centralized gateway device to stop the service data of the user equipment, and the off-flow indication is used to notify the remote gateway device to enable the local offload function of the user equipment. Therefore, after the lawful interception ends, the remote gateway device can re-enable the local offload function. In this way, the user equipment can quickly access the local offload service.
  • the centralized gateway device in the process of monitoring the user equipment, if the centralized gateway device learns that the user equipment switches the remote gateway device, the centralized gateway device does not activate the local offloading of the user equipment on the remote gateway device after the handover. Features. Therefore, it can be ensured that the user equipment is not interrupted due to the user equipment switching the remote gateway device in the process of legally monitoring the user equipment.
  • a second aspect of the present invention provides a method for lawful interception, which includes: after receiving a shutdown off-sending indication sent by a centralized gateway device, the remote gateway device sends the service data of the user equipment to the centralized gateway device.
  • the off-flow indication carries the identifier of the user to be monitored, and is used to notify the remote gateway device to disable the local offload function of the user equipment.
  • the service data includes local offload service data and non-local offload service data. Therefore, the centralized gateway device receives all the service data of the user equipment, and can upload all the service data of the user equipment to the legal listening center, so as to monitor the user equipment.
  • the off-flow indication device also carries the identifier of the service to be monitored, and the remote gateway device can disable the local offload function of the service of the user equipment.
  • the remote gateway device can disable the local offload function of the specific service of the user equipment.
  • the remote gateway device after the remote gateway device receives the shutdown offloading indication sent by the centralized gateway device, if the remote gateway device receives the open offloading indication sent by the centralized gateway device, the remote gateway device sends the localized application server to the local application server.
  • the user equipment locally diverts the service data and sends the non-local offload service data to the centralized gateway device.
  • the off-flow indication is used to notify the remote gateway device to enable the local offload function of the user equipment. Therefore, after the lawful interception ends, the remote gateway device can continue to enable the local offload function of the user equipment, so that the user equipment can quickly access the local offload service.
  • a centralized gateway device including: a receiving unit, configured to receive a legal listening network The interception indication sent by the device, the interception indication carries the identifier of the user equipment to be monitored, and the sending unit is configured to: after receiving the interception indication, send a shutdown off-flow indication to the remote gateway device, and close the off-flow indication to notify the remote gateway device The local offloading function of the user equipment is closed, and the receiving unit is further configured to receive the service data of the user equipment sent by the remote gateway device, and the sending unit is further configured to report the service data to the legal listening gateway device.
  • the centralized gateway device further includes: a processing unit, configured to learn, according to the context of the user equipment, a local offload function of the user equipment that is enabled on the remote gateway device.
  • the processing unit is further configured to determine whether the address of the local application server corresponding to the user equipment is included in the context of the user equipment; if included, determining that the local switching function of the user equipment is enabled on the remote gateway device .
  • the interception indication received by the receiving unit also carries the identifier of the service to be monitored, and the shutdown offloading indication sent by the sending unit is further used to notify the remote gateway device to disable the local offloading function of the to-be-listened service of the user equipment.
  • the processing unit is further configured to determine, according to a context of the user equipment, a remote gateway device that performs a local offload function for the user equipment.
  • the receiving unit is further configured to receive a stop listening indication sent by the legal intercepting gateway device, and the stop listening indication is used to notify the centralized gateway device to stop reporting the service data of the user equipment;
  • the sending unit is further configured to receive After receiving the stop listening indication, the unit sends an open off-flow indication to the remote gateway device, and the off-flow indication is used to notify the remote gateway device to enable the local offload function of the user equipment.
  • the processing unit is further configured to: during the process of monitoring the user equipment, when the user equipment is notified that the remote gateway device is switched, the local shunt function of the user equipment on the remote gateway device after the handover is not activated. .
  • the fourth aspect provides a remote gateway device, including: a receiving unit, configured to receive a closed offloading indication sent by the centralized gateway device, and close the offloading indication to carry the identifier of the user equipment to be intercepted, to notify the remote gateway
  • the device is configured to disable the local offloading function of the user equipment.
  • the sending unit is configured to send the service data of the user equipment to the centralized gateway device after receiving the off-flow indication, where the service data includes the local offload service data and the non-local offload service data.
  • the off-flow indication also carries the identifier of the to-be-listened service, and the off-flow indication is also used to notify the remote gateway device to disable the local offload function of the to-be-listed service of the user equipment; the sending unit is also used to concentrate The gateway device sends data of the to-be-listed service of the user equipment.
  • the receiving unit is further configured to receive an open offloading indication sent by the centralized gateway device, and the initiating offloading indication is used to notify the remote gateway device to enable the local offloading function of the user equipment; After receiving the off-flow indication, the local offload service data of the user equipment is sent to the local application server, and the non-local offload service data of the user equipment is sent to the centralized gateway device.
  • a fifth aspect provides a centralized gateway device, including: a processor and a communication interface, where the processor is configured to receive, by using the communication interface, a listening indication sent by a legal listening gateway device, where the monitoring indication carries a to-be-monitored An identifier of the user equipment, configured to send a shutdown offload indication to the remote gateway device by using the communication interface, where the shutdown offload indication is used to notify the remote gateway device to disable the local offload function of the user equipment; Receiving, by the communication interface, the remote gateway device Sending the service data of the user equipment, and reporting the service data to the legal interception gateway device.
  • the processor is further configured to learn, according to the context of the user equipment, that a local offload function of the user equipment is enabled on the remote gateway device.
  • the processor is further configured to determine whether an address of the local application server corresponding to the user equipment is included in a context of the user equipment; if yes, the centralized gateway device determines the The local offload function of the user equipment is enabled on the remote gateway device.
  • the interception indication further carries an identifier of the service to be monitored
  • the shutdown offloading indication is further used to notify the remote gateway device to disable the local offloading function of the to-be-listened service of the user equipment.
  • the processor is further configured to determine, according to a context of the user equipment, the remote gateway device that performs a local offload function for the user equipment.
  • the processor is further configured to receive, by using the communications interface, a stop listening indication sent by the legal intercepting gateway device, where the stop listening indication is used to notify the centralized gateway device to stop reporting.
  • the service data of the user equipment is further configured to send, by using the communication interface, an open offloading indication to the remote gateway device, where the open offloading indication is used to notify the remote gateway device to enable the local offloading function of the user equipment. .
  • the processor is further configured to: if the user equipment is switched to the remote gateway device during the process of monitoring the user equipment, the user on the remote gateway device after the handover is not activated.
  • the local shunt function of the device is further configured to: if the user equipment is switched to the remote gateway device during the process of monitoring the user equipment, the user on the remote gateway device after the handover is not activated. The local shunt function of the device.
  • a remote gateway device including: a processor and a communication interface, where: the processor is configured to receive, by using the communication interface, a shutdown offloading indication sent by a centralized gateway device, where the offloading indication is off And carrying the identifier of the user equipment to be monitored, the shutdown offloading indication is used to notify the remote gateway device to disable the local offloading function of the user equipment, and is further configured to send the service data of the user equipment to the centralized gateway device.
  • the service data includes local offload service data and non-local offload service data.
  • the closed offloading indication further carries an identifier of the to-be-listened service
  • the closed offloading indication is further used to notify the remote gateway device to close the local offloading of the to-be-listened service of the user equipment.
  • the processor is further configured to send data of the to-be-listened service of the user equipment to the centralized gateway device.
  • the processor is further configured to receive, by using the communications interface, an open offloading indication sent by the centralized gateway device, where the open offloading indication is used to notify the remote gateway device to enable And the local offloading service data of the user equipment is sent to the local application server by using the communication interface, and the non-distribution of the user equipment is sent to the centralized gateway device. Locally divert business data.
  • a system for lawful interception comprising a centralized gateway device having any of the features of the fifth aspect and a remote gateway device having any of the features of the sixth aspect.
  • a computer readable storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the methods described in the various aspects above.
  • a computer program product comprising instructions, when run on a computer, is provided The computer is caused to perform the methods described in the various aspects above.
  • FIG. 1 is a schematic diagram of an EPS network architecture according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of another EPS network architecture provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart 1 of a method for lawful interception according to an embodiment of the present disclosure
  • FIG. 4 is a schematic flowchart 2 of a method for lawful interception according to an embodiment of the present disclosure
  • FIG. 5 is a schematic flowchart 3 of a method for lawful interception according to an embodiment of the present disclosure
  • FIG. 6 is a schematic flowchart 4 of a method for lawful interception according to an embodiment of the present disclosure
  • FIG. 7 is a schematic flowchart 5 of a method for lawful interception according to an embodiment of the present disclosure
  • FIG. 8 is a schematic structural diagram 1 of a centralized gateway device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram 2 of a centralized gateway device according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram 1 of a remote gateway device according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram 3 of a centralized gateway device according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram 2 of a remote gateway device according to an embodiment of the present disclosure.
  • FIG. 13 is a schematic structural diagram 4 of a centralized gateway device according to an embodiment of the present disclosure.
  • FIG. 14 is a schematic structural diagram 3 of a remote gateway device according to an embodiment of the present disclosure.
  • FIG. 15 is a schematic structural diagram of a lawful interception system according to an embodiment of the present disclosure.
  • the network architecture and the service scenario described in the embodiments of the present application are for the purpose of more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute a limitation of the technical solutions provided by the embodiments of the present application.
  • the technical solutions provided by the embodiments of the present application are equally applicable to similar technical problems.
  • the technical solution of the embodiment of the present application can be applied to the scenario of the access mode defined by the 3rd Generation Partnership Project (3GPP), and can also be applied to the scenario of the access mode of the non-3GPP.
  • the embodiment of the present application is described by taking the EPS network architecture in the scenario of the 3GPP access mode as an example.
  • the technical solution of the embodiment of the present application can be used in an Evolved Packet System (EPS) network architecture in which the gateway moves down.
  • the gateway is moved down, that is, the gateway deployment location is moved downward, for example, deployed in a location closer to the user equipment.
  • the gateway can be deployed in a distributed manner with an evolved Node B (eNB), so that the UE can quickly access the local application server by using the downward-moving gateway, so that the UE can quickly access the service on the local application server.
  • eNB evolved Node B
  • FIG. 1 is a schematic diagram of an EPS network architecture of a gateway moving down according to an embodiment of the present disclosure, where the network architecture includes a remote gateway (RGW) and a centralized gateway (CGW).
  • the RGW is the remote gateway node that is deployed to move down. It is mainly responsible for the local service offload of user equipment.
  • the CGW is a centralized gateway node, and is mainly responsible for mobility management, session management functions, and external interface functions, such as accounting interfaces and lawful intercept interfaces.
  • the CGW controls and manages the RGW through the SX interface, and receives the user plane data sent by the RGW from the S1-U interface.
  • the SX interface and the S1-U interface can apply an interface protocol between the SGW and the PGW in the existing EPS network architecture, such as General Packet Radio Service (GPRS).
  • GPRS General Packet Radio Service
  • GTP GPRS Tunneling Protocol
  • other network elements and interfaces can apply the network elements and interfaces of the existing EPS network architecture.
  • the control plane signaling in the uplink direction starts from the UE through the Evolved Universal Terrestrial Radio Access Network (E-UTRAN), the MME, the CGW, the policy, and the charging.
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • the Policy and Charging Rules Function (PCRF) entity arrives at the Public Data Network (PDN).
  • PDN Public Data Network
  • the user plane data of the local offload service in the uplink direction passes through the E-UTRAN and the RGW and directly reaches the local application server.
  • the user plane data of the non-local offload service starts from the UE and reaches the PDN through the E-UTRAN, the RGW, and the CGW.
  • FIG. 2 is a schematic diagram of another EPS network architecture of a gateway moving down according to an embodiment of the present disclosure, where the network architecture includes an RGW and a CGW.
  • the MME selects the RGW for the user equipment, and the RGW is the remote gateway node that is deployed down, and integrates the SGW function in the existing EPS network architecture and some functions of the PGW (such as route forwarding to the local application server).
  • the CGW is a centralized gateway node and assumes some functions of the PGW. It is mainly responsible for mobility management, session management functions, and external interface functions, such as accounting interfaces and lawful intercept interfaces.
  • the CGW performs control plane signaling interaction with the RGW through the S5-C interface, and performs user plane data exchange with the RGW through the S5-U interface.
  • the interface protocol between the SGW and the PGW in the existing EPS network architecture can be applied to the S5-C interface and the S5-U interface, and the interface protocol between the SGW and the MME in the existing EPS network architecture can be applied to the S11 interface.
  • Other interface protocols or newly defined protocols may be applied, which are not limited in this embodiment.
  • other network elements and interfaces can apply the network elements and interfaces of the existing EPS network architecture. In the network architecture shown in FIG.
  • the control plane signaling in the uplink direction passes from the UE to the PDN after passing through the E-UTRAN, MME, RGW, CGW, and PCRF entities; the user plane data of the local offload service in the uplink direction starts from the UE.
  • E-UTRAN and RGW directly reach the local application server, the transmission path of the user plane data of the non-local offload service starts from the UE and reaches the PDN through the E-UTRAN, the RGW, and the CGW.
  • the lawful interception system further includes: a legal interception center and a LIG.
  • the lawful interception center mainly issues an indication to start or stop the monitoring, and performs lawful interception on the reported data.
  • the LIG mainly forwards the instructions of the legal interception center and reports the service data of the user equipment to the monitoring center.
  • the legal interception center is connected to the LIG, or the legal interception center and the LIG are deployed together, and the LIG accesses the EPS network through the CGW.
  • the application provider deploys different application servers according to different service requirements. For example, for services requiring low latency, such as video live broadcast, AR (Augmented Reality) games, etc., deployed at the location of the user device. A closer local application server. In this way, the service can be configured as a local offload service.
  • the user equipment accesses the service
  • the user device directly accesses the local application server through the remote gateway device to implement local offloading of the service.
  • the path for accessing the local offload service is shortened, and the transmission rate is increased, thereby facilitating the user experience.
  • services that do not require high latency such as emails and web browsing services, they are deployed on non-local application servers that are far away from the user equipment.
  • the service can be set to a non-local traffic distribution service.
  • the remote gateway device accesses the PDN through the centralized gateway device.
  • the legal interception center performs lawful interception on the user equipment
  • the local offload service of the user equipment cannot be obtained. Therefore, the local offload service data of the user equipment cannot be legally monitored.
  • the embodiment of the present application provides a lawful interception method, which can be applied to the network shown in FIG. 1 or FIG. 2, as shown in FIG. 3, Methods include:
  • the centralized gateway device receives the interception indication sent by the legal interception gateway device.
  • the interception indication carries the identifier of the user equipment to be monitored, and the centralized gateway device can determine the user equipment that needs to be monitored according to the identifier.
  • the lawful interception gateway when the legal interception center needs to perform lawful interception on the user equipment, the lawful interception gateway sends a monitoring indication to the centralized gateway device, and the centralized gateway device uploads the service data of the user equipment to the legal listening center through the legal interception gateway. The user equipment is monitored by the lawful interception center.
  • the centralized gateway device sends a shutdown offload indication to the remote gateway device.
  • the shutdown off-flow indication carries the identifier of the user to be monitored, and can be used to notify the remote gateway device to disable the local offload function of the user equipment to be monitored.
  • a message may be added to instruct the remote gateway device to enable or disable the offload function, or the Echo Request message in the prior art may be extended, for example, a new indicator cell is added to the Echo Request message to indicate
  • the remote gateway device turns the offload function on or off. Specifically, when the value of the new indicator cell is zero, the shunt function is enabled, otherwise the shunt function is disabled.
  • the embodiment of the present application does not limit the specific implementation of the off-flow indication or the off-flow indication.
  • the local offload service of the user equipment is directly offloaded to the local application server at the remote gateway device instead of passing through the centralized gateway device. . Therefore, the centralized gateway device cannot report the data of the local offload service of the user to be monitored, and the lawful interception center cannot monitor the data of the local offload service of the user equipment. Therefore, in order to be able to monitor the data of the local offload service of the user equipment, the centralized gateway device needs to send a shutdown offload indication to the remote gateway device, and the remote gateway device closes the local offload function according to the indication, and the remote gateway device selects the user.
  • the local offload service data of the device is sent to the PDN through the centralized gateway device.
  • the centralized gateway device can report the local offload data of the user equipment to the legal interception center, and the legal interception center can monitor the data of the local offload service of the user equipment.
  • the centralized gateway device needs to first determine a remote gateway device that serves the user equipment.
  • the centralized gateway device itself includes a far context. The identity of the end gateway device, so the remote gateway device can be determined directly from the context.
  • the centralized gateway device acquires the user equipment.
  • the context includes the identifier of the remote gateway device serving the user equipment, and the remote gateway device may be determined according to the context. The specific process can be seen later.
  • the remote gateway device sends the service data of the user equipment to the centralized gateway device.
  • the service data includes local offload service data and non-local offload service data.
  • the remote gateway device after receiving the shutdown offloading indication sent by the centralized gateway device, the remote gateway device turns off the local offloading function of the user equipment. After receiving the service data of the user equipment, the remote gateway device forwards all the service data to the centralized gateway device, so that the centralized gateway device reports the entire service data of the user to the legal listening center through the legal interception gateway, and the legal interception center can monitor All business data to the user device.
  • the centralized gateway device reports the service data of the user equipment to the legal interception gateway device.
  • the embodiment of the present application provides a lawful interception method.
  • the centralized gateway device After receiving the interception indication sent by the legal interception center, the centralized gateway device sends a shutdown offload indication to the remote gateway device to notify the remote gateway device to disable the local offload function.
  • the centralized gateway device reports the service data sent by the remote gateway device to the legal listening center.
  • the centralized gateway device can obtain the local device of the user equipment by shutting down the local traffic distribution function of the user equipment on the remote gateway device, as compared with the local traffic distribution service of the user equipment in the prior art. Divide business data. Therefore, the centralized gateway device can report the local offloaded service data of the user equipment to be monitored to the legal interception center, and the legal interception center can monitor the local offload service of the user equipment to be monitored.
  • the present application can be applied to the monitoring of all the service data of the user equipment to be monitored.
  • the interception indication sent by the legal interception center can carry only the identifier of the user equipment to be monitored, so as to implement the monitoring of the user equipment. All business data. Considering that in some scenarios, it may only be necessary to listen to specific service data of the user equipment.
  • the interception indication sent by the legal interception center to the centralized gateway device needs to carry the identifier of the to-be-listened service, in addition to the identifier of the user equipment to be monitored, and correspondingly, the centralized gateway device sends the off-flow indication to the remote gateway device.
  • the remote gateway device can also disable the local offloading function of the user equipment to be monitored according to the identifier of the user equipment to be monitored and the identifier of the service to be monitored. In this way, it is possible to monitor specific services of a specific user equipment, reduce the amount of data transmission between gateway devices, and improve the efficiency of monitoring.
  • the centralized gateway device before the centralized gateway device sends the off-flow indication to the remote gateway device, it is also required to know whether the remote gateway device has enabled the local offload function for the user equipment. Therefore, based on the method shown in FIG. 3, the present application The embodiment also provides a method for lawful interception. As shown in FIG. 4, before the step 102, the method further includes: the centralized gateway device learns, according to the context of the user equipment, that the local gateway function of the user equipment is enabled on the remote gateway device. Step, this step specifically includes:
  • the centralized gateway device determines whether an address of the local application server corresponding to the user equipment is included in a context of the user equipment.
  • the centralized gateway device determines that the remote gateway device is enabled. Local offload function of the user equipment.
  • the context includes an identifier of each service that the user equipment has a traffic off function.
  • the Uniform Resoure Locator (URL) corresponding to each service data with the traffic distribution function can be obtained one by one. And further determine whether these URLs contain the URL of the local application server. If yes, the centralized gateway device can determine that the user equipment has enabled local offloading on the remote gateway device.
  • URL Uniform Resoure Locator
  • the centralized gateway device before performing step 201, the centralized gateway device first determines whether a local offload policy is configured for the user equipment to be monitored. If the local device is configured with the local offloading policy, the remote gateway device has the capability of performing local offloading on the user equipment. Then, the foregoing step 201 and step 202 are used to learn whether the remote gateway device has enabled the local offload function. If the remote device gateway does not configure a local traffic distribution policy for the user equipment, the remote gateway device does not have the capability of locally distributing the user equipment.
  • the local offloading policy may be locally configured by the remote gateway device for the user equipment, or may be obtained from the PCRF by the centralized gateway device.
  • the local offloading policy can be used to indicate whether the user equipment can perform local offloading by setting a specific identifier.
  • the local offloading policy may also be included in the context of the user equipment.
  • the centralized gateway device may determine whether the remote gateway device has the function of enabling local offloading according to the context of the user equipment.
  • the implementation manner of the local traffic distribution policy is not limited in this embodiment of the present application.
  • the remote gateway device can save the local offloading policy of the user equipment after receiving the off-flow indication after the remote gateway device is enabled to re-enable the local offloading function of the user equipment. Therefore, on the basis of the method shown in FIG. 3, as shown in FIG. 5, the embodiment of the present application further provides a method for lawful interception. After the step 104, the method further includes:
  • the centralized gateway device If the centralized gateway device receives the stop listening indication sent by the legal interception gateway device, the centralized gateway device sends an open offload indication to the remote gateway device.
  • the stop listening indication is used to notify the centralized gateway device to stop reporting the service data of the user equipment
  • the open split indication is used to notify the remote gateway device to enable the local offload function of the user equipment.
  • step 301 The various processes in step 301 are illustrated in Figure 5 at 301a and 301b, respectively.
  • the remote gateway device receives the local offloading indication sent by the centralized gateway device, and sends the local offloaded service data of the user equipment to the local application server, and sends the user equipment to the centralized gateway device.
  • the non-local offloaded service data is not limited to the local offloading indication sent by the centralized gateway device.
  • the open offloading indication is used to notify the remote gateway device to enable the local offloading function of the user equipment.
  • the lawful interception gateway device sends a stop listening indication to the centralized gateway device.
  • the remote gateway device sends an open offload indication to the remote gateway device to enable the local offload function of the user equipment.
  • the remote gateway device receives the open offloading indication sent by the centralized gateway device, the local offloading function of the user equipment is re-enabled according to the pre-saved local offloading policy.
  • step 302 The various processes in step 302 are illustrated in Figure 5 at 302a and 302b, respectively. Where 302a and The 302b step does not limit the order.
  • the user equipment may be moved in the process of legally monitoring the user equipment, so that the MME switches the remote gateway device, so as to ensure that the user equipment is legal.
  • the process of the monitoring is not interrupted.
  • the embodiment of the present application further provides a method for lawful interception. After the step 103, the method further includes:
  • the centralized gateway device learns that the user equipment switches the remote gateway device.
  • the MME may select a new remote gateway device to serve the MME. At this time, the MME sends a handover message to the centralized gateway device, and the centralized gateway device switches according to the handover. The message can determine that the user equipment has switched the remote gateway device.
  • the centralized gateway device When it is determined that the user equipment switches the remote gateway device, the centralized gateway device does not activate the local offload function of the user equipment.
  • the user equipment after the MME selects a new remote gateway device for the user equipment, the user equipment re-applies the attach procedure and activates the local offload function on the switched remote gateway device.
  • the user equipment is a user equipment that is legally monitored. Therefore, after the user equipment completes the attach procedure on the switched remote gateway device, the centralized gateway device does not activate the local offload function of the user equipment. In this way, the centralized gateway device can obtain all the service data of the user equipment and report it to the lawful interception gateway.
  • the embodiment of the present application further provides a method for lawful interception, as shown in FIG. 7, the method includes:
  • the user equipment completes the attach process and activates the local offload function on the remote gateway device.
  • the user equipment obtains network service rights after completing the attach process and activates the local offload function.
  • the MME determines the remote gateway device that serves the user equipment according to the user equipment location information or the service information requested by the user equipment.
  • the centralized gateway device serving the user equipment is also determined according to the service information requested by the user equipment.
  • the MME sends the address information of the two to the related network element device, such as the PCRF device, by creating session request signaling.
  • the PCRF sends the local traffic distribution policy configured for the user equipment to the centralized gateway device.
  • the centralized gateway device forwards the local offloading policy to the remote gateway device, and at the same time, instructs the remote gateway to enable the local offload function and mark the information of the remote gateway device that the local offload function is enabled in the context of the user equipment. Then, the local offload service of the user equipment is offloaded to the local application server at the remote gateway device, and the non-local offload service is sent to the PDN network through the centralized gateway device.
  • the lawful interception gateway sends a monitoring indication to the centralized gateway device.
  • the centralized gateway device knows whether the local shunt function is enabled on the user equipment to be monitored.
  • the centralized gateway device sends a shutdown shunt indication to the remote gateway device.
  • the remote gateway device stops local offloading of the user equipment to be monitored.
  • the remote gateway device after the remote gateway device stops the local offloading of the user equipment to be monitored, the remote gateway device sends the local offload service of the user equipment to be monitored to the centralized gateway device, and is sent by the centralized gateway device to the PDN network.
  • the remote gateway device replies to the centralized gateway device with a confirmation message that the local offload function is disabled.
  • the acknowledgment message replied by the remote gateway device may be a new message, or may be extended by the Echo Response message in the prior art.
  • the centralized gateway device reports the service data of the user equipment to be monitored to the lawful interception gateway.
  • the centralized gateway device reports the service data of the user equipment to be monitored to the legal listening gateway.
  • the service data at this time includes the local traffic distribution service data and the non-local traffic distribution service data, and is sent by the legal interception gateway device to the legal listening center. To monitor the service data of the user equipment.
  • the centralized gateway device learns that the user equipment switches the remote gateway device, it may control that the remote gateway device does not activate the local offloading of the user equipment after the handover. Function to ensure that the process of lawful interception is not interrupted.
  • the legal interception gateway After the lawful interception ends, the legal interception gateway sends a stop listening indication to the centralized gateway device.
  • the centralized gateway device sends an open offload indication to the remote gateway device.
  • the remote gateway device performs local offloading of the user equipment.
  • the remote gateway device replies to the centralized gateway device with a confirmation message that the local offload function is enabled.
  • the acknowledgment message of the reply of the remote gateway device may be a new message, or may be extended by the Echo Response message in the prior art.
  • each network element such as a centralized gateway device and a remote gateway device, includes hardware structures and/or software modules corresponding to each function in order to implement the above functions.
  • a network element such as a centralized gateway device and a remote gateway device
  • the present invention can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
  • the embodiments of the present application may perform functional module division on the centralized gateway device and the remote gateway device according to the foregoing method.
  • each functional module may be divided according to each function, or two or more functions may be integrated into one processing.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present application is schematic, and is only a logical function division, and the actual implementation may have another division manner.
  • FIG. 8 is a schematic diagram showing a possible structure of the centralized gateway device involved in the foregoing embodiment.
  • the centralized gateway device 800 includes a receiving unit 801 and a sending unit 802.
  • the receiving unit 801 is configured to support the centralized gateway device to perform the process 101 in FIG. 3, the process 301a in FIG. 5;
  • the sending unit 802 is configured to support the centralized gateway device Processes 102 and 104 in FIG. 3, process 202 in FIG. 4, process 301b in FIG. 5, process 502 in FIG. 7, process 504 in FIG. 7, and processes 507-509 in FIG. All the related content of the steps involved in the foregoing method embodiments may be referred to the functional descriptions of the corresponding functional modules, and details are not described herein again.
  • the centralized gateway device 800 further includes a processing unit 901, and the processing unit 901 is configured to support the centralized gateway device to perform the processes 201 and 202 in FIG. 4, the processes 401 and 402 in FIG. 6, and FIG. Processes 501 and 503. All the related content of the steps involved in the foregoing method embodiments may be referred to the functional descriptions of the corresponding functional modules, and details are not described herein again.
  • FIG. 10 is a schematic structural diagram of a remote gateway device involved in the foregoing embodiment.
  • the remote gateway device 1000 includes: a receiving unit 1001 and a sending unit 1002.
  • the receiving unit 1001 is configured to support the remote gateway device to perform the process 302a in FIG.
  • the transmitting unit 1002 supports the remote gateway device to perform the process 103 in FIG. 3, the processes 302a and 302b in FIG. 5, the processes 505-506 in FIG. 7, and the processes 510-511 in FIG.
  • FIG. 11 shows a possible structural diagram of the centralized gateway device involved in the above embodiment.
  • the centralized gateway device 1100 includes a processing module 1101 and a communication module 1102.
  • the processing module 1101 is configured to control and manage the actions of the centralized gateway device.
  • the processing module 1101 is configured to support the centralized gateway device to perform the processes 101, 102, and 104 in FIG. 3, and the processes 201 and 202 in FIG. Process 301, processes 401, 402 in FIG. 6, processes 501, 503, 504, 507, 509 in FIG. 7, and/or other processes for the techniques described herein.
  • the communication module 1102 is for supporting communication between the centralized gateway device and other network entities, such as communication with the functional modules or network entities shown in FIG. 1 or 2.
  • the centralized gateway device may further include a storage module 1103 for storing program codes and data of the centralized gateway device.
  • FIG. 12 shows a possible structural diagram of the remote gateway device involved in the above embodiment.
  • the remote gateway device 1200 includes a processing module 1201 and a communication module 1202.
  • the processing module 1201 is configured to control and control the action of the remote gateway device.
  • the processing module 1201 is configured to support the remote gateway device to perform the process 103 in FIG. 3, the process 302 in FIG. 5, the process 505 in FIG. 506, 510, 511, and/or other processes for the techniques described herein.
  • the communication module 1202 is configured to support communication between the remote gateway device and other network entities, such as communication with the functional modules or network entities illustrated in FIG. 3, FIG. 4, FIG. 5, FIG. 6, or FIG.
  • the remote gateway device may further include a storage module 1203 for storing program codes and data of the remote gateway device.
  • the processing module 1101/1201 may be a processor or a controller, and may be, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application specific integrated circuit (Application). -Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication module 1102/1202 can be a transceiver, Transceiver circuit or communication interface.
  • the storage module 1103/1203 may be a memory.
  • the processing module 1101 is a processor
  • the communication module 1102 is a communication interface
  • the storage module 1103 is a memory
  • the centralized gateway device involved in the embodiment of the present application may be the centralized gateway device shown in FIG.
  • the remote gateway device involved in the embodiment of the present application may be the remote gateway device shown in FIG. 14 .
  • FIG. 13 is a schematic structural diagram of a centralized gateway device involved in the foregoing embodiment.
  • the centralized gateway device includes: a controller/processor 1302 for controlling and managing the actions of the centralized gateway device.
  • controller/processor 1302 is configured to support centralized gateway devices to perform processes 101, 102, and 104 in FIG. 3, processes 201 and 202 in FIG. 4, processes 301a and 301b in FIG. 5, process 401 in FIG. And 402, processes 501-504, 507-509 in Figure 7, and/or other processes for the techniques described in the embodiments of the present invention.
  • the memory 1301 is for storing program codes and data for centralizing the gateway device.
  • Communication interface 1303 is used to support communication between centralized gateway devices and other network entities.
  • communication interface 1303 is used to support communication between the centralized gateway device and the various network entities shown in FIG. 1 or 2.
  • FIG. 14 is a schematic structural diagram of a remote gateway device involved in the foregoing embodiment.
  • the remote gateway device includes: a controller/processor 1402 for controlling management of actions of the remote gateway device.
  • the controller/processor 1402 is configured to support the remote gateway device to perform the process 103 of FIG. 3, the process 302 of FIG. 5, the processes 505, 506, 510, 511 of FIG. 7, and/or for the purposes of this document. Other processes of the described techniques.
  • the memory 1401 is used to store program codes and data for the remote gateway device.
  • Communication interface 1403 is used to support communication of remote gateway devices with other network entities. For example, communication interface 1403 is used to support communication between remote gateway devices and various network entities shown in FIG. 1 or 2.
  • the steps of a method or algorithm described in connection with the present disclosure may be implemented in a hardware, or may be implemented by a processor executing software instructions.
  • the software instructions may be composed of corresponding software modules, which may be stored in a random access memory (RAM), a flash memory, a read only memory (ROM), an erasable programmable read only memory ( Erasable Programmable ROM (EPROM), electrically erasable programmable read only memory (EEPROM), registers, hard disk, removable hard disk, compact disk read only (CD-ROM) or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor to enable the processor to read information from, and write information to, the storage medium.
  • the storage medium can also be an integral part of the processor.
  • the processor and the storage medium can be located in an ASIC. Additionally, the ASIC can be located in a core network interface device.
  • the processor and the storage medium may also exist as discrete components in the core network interface device.
  • the embodiment of the present application further provides a lawful interception system, including the centralized gateway device 1501 as described above and the remote gateway device 1502 as described above.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请公开了一种合法监听的方法、装置及系统,涉及通信技术领域,能够解决合法监听中心无法合法监听用户设备的本地分流业务数据的问题。方法包括:集中网关设备接收合法监听网关设备发送的监听指示,所述监听指示携带待监听的用户设备的标识;所述集中网关设备向所述远端网关设备发送关闭分流指示,所述关闭分流指示用于通知所述远端网关设备关闭所述用户设备的本地分流功能,集中网关设备接收远端网关设备发送的用户设备的业务数据,并上报给合法监听中心。本申请适用于对用户设备进行合法监听的过程中。

Description

一种合法监听的方法、装置及系统 技术领域
本申请涉及通信技术领域,尤其涉及一种合法监听的方法、装置及系统。
背景技术
随着通信技术的发展,用户设备(User Equipment,UE)对通信网络的传输效率要求越来越高。在实际网络部署中,由于服务网关(Serving Gateway,SGW)、分组数据网络网关(Packet Data Network Gateway,PGW)和移动性管理实体(Mobility Management Entity,MME)通常部署在省干,部署位置较高,距离用户设备较远,导致用户设备通过无线移动网络访问业务时,数据传输路径较长,时延较大,用户体验差。为了解决上述问题,可以通过网关下移的方式将网关部署到距离用户设备较近的位置(例如:城域或者基站位置)。这样一来,如果本地部署了应用服务器,那么下移网关能够直接将用户设备的本地业务数据发送至本地服务器(Local APP,LAPP)上,从而缩短用户设备的数据传输路径,降低业务访问时延,提高网络传输效率。
为了保证网络的安全性,在网络中开展合法监听是一种常用的手段。在对用户设备进行合法监听时,通常是由部署在省干的网关设备经合法监听网关(Lawful Interception Gateway,LIG)设备向合法监听中心上报用户设备的业务数据。然而,在网关下移的网络架构中,下移部署的网关设备能够直接将本地业务分流至本地应用服务器。因此,如果待监听的用户设备使用了本地分流的功能,那么该用户设备的本地业务数据会在下移部署的网关设备处被分流至本地应用服务器。而此时,部署在省干的网关设备无法感知从下移部署的网关设备处分流的业务数据,也就无法将分流的业务数据经合法监听网关上报给合法监听中心进行监听。
发明内容
本申请实施例提供一种合法监听的方法、装置及系统,能够解决合法监听中心无法合法监听用户设备的本地分流业务数据的问题。
为达到上述目的,本申请的实施例采用如下技术方案:
第一方面,提供一种合法监听的方法,包括:集中网关设备接收合法监听网关设备发送的监听指示;集中网关设备向远端网关设备发送关闭分流指示。集中网关设备接收远端网关设备发送的业务数据并上报给合法监听中心。其中,监听指示携带待监听的用户设备的标识,关闭分流指示用于通知远端网关设备关闭用户设备的本地分流功能。基于本申请提供的合法监听方法,由于在对用户设备进行合法监听的过程中,远端网关设备关闭了用户设备的本地分流功能,使得用户设备的本地分流业务会发送给集中网关设备。这样,集中网关设备能将用户设备的本地分流业务通过合法监听网关上报给合法监听中心,从而合法监听中心能监听到用户设备的本地分流业务。
在一种可能的设计中,集中网关设备在向远端网关设备发送关闭分流指示之前, 还要获知远端网关设备上是否开启了用户设备的本地分流功能;当远端网关设备上开启了用户设备的本地分流功能时,集中网关设备向所述远端网关设备发送所述关闭分流指示。由此,当远端网关设备没有开启用户设备本地分流功能时,集中网关设备在接收到监听指示后,不用向远端网关设备发送关闭分流指示。这样,可以减少不必要的信令,节省网络资源。
在一种可能的设计中,集中网关设备判断待监听用户设备的上下文是否包括用户设备对应的本地应用服务器的地址。如果是,则确定远端网关设备开启了该用户设备的本地分流功能。由此,集中网关设备可以通过这种判断过程确定远端网关设备是否开启了用户设备的本地分流功能。
在一种可能的设计中,监听指示还携带了待监听业务的标识,那么集中网关设备向远端网关发送的关闭分流指示还用于通知远端网关设备关闭该用户设备的该项业务的本地分流功能。由此,可以实现对特定用户设备的特定业务进行监听,减轻网关设备间的数据传输量,提高监听的效率。
在一种可能的设计中,在集中网关设备向远端网关设备发送关闭分流指示之后,如果集中网关设备接收到合法监听网关设备发送的停止监听指示,则集中网关设备向远端网关设备发送开启分流指示,其中,停止监听指示用于通知集中网关设备停止上报用户设备的业务数据,开启分流指示用于通知远端网关设备开启用户设备的本地分流功能。由此,在合法监听结束后,远端网关设备可以重新开启本地分流功能。这样,用户设备可以快速访问本地分流业务。
在一种可能的设计中,在监听用户设备的过程中,如果集中网关设备获知用户设备切换了远端网关设备,则集中网关设备不激活切换后的远端网关设备上该用户设备的本地分流功能。由此,可以保证在合法监听用户设备的过程中,不会因用户设备切换了远端网关设备而被中断。
第二方面,提供一种合法监听的方法,包括:远端网关设备接收到集中网关设备发送的关闭分流指示后,向集中网关设备发送所述用户设备的业务数据。其中,关闭分流指示中携带了待监听用户的标识,用于通知远端网关设备关闭用户设备的本地分流功能。业务数据包括本地分流业务数据和非本地分流业务数据。由此,集中网关设备接收到用户设备的全部业务数据,能够将用户设备全部的业务数据上传给合法监听中心,以便监听用户设备。
在一种可能的设计中,关闭分流指示中还携带了待监听业务的标识,则远端网关设备可以关闭用户设备的该项业务的本地分流功能。由此,远端网关设备可以关闭用户设备的特定业务的本地分流功能。
在一种可能的设计中,在远端网关设备接收集中网关设备发送的关闭分流指示之后,如果远端网关设备接收到集中网关设备发送的开启分流指示,则远端网关设备向本地应用服务器发送用户设备的本地分流业务数据,并向集中网关设备发送非本地分流业务数据。其中,开启分流指示用于通知远端网关设备开启用户设备的本地分流功能。由此,在合法监听结束后,远端网关设备能够继续开启用户设备的本地分流功能,进而使得用户设备可以快速访问本地分流业务。
第三方面,提供了一种集中网关设备,包括:接收单元,用于接收合法监听网 关设备发送的监听指示,监听指示携带待监听的用户设备的标识;发送单元,用于在接收到监听指示后,向远端网关设备发送关闭分流指示,关闭分流指示用于通知远端网关设备关闭用户设备的本地分流功能,接收单元,还用于接收远端网关设备发送的用户设备的业务数据;发送单元,还用于向合法监听网关设备上报业务数据。
在一种可能的设计中,集中网关设备还包括:处理单元,用于根据用户设备的上下文获知远端网关设备上开启了用户设备的本地分流功能。
在一种可能的设计中,处理单元,还用于判断用户设备的上下文中是否包括用户设备对应的本地应用服务器的地址;如果包括,则确定远端网关设备上开启了用户设备的本地分流功能。
在一种可能的设计中,接收单元接收的监听指示还携带待监听业务的标识,发送单元发送的关闭分流指示还用于通知远端网关设备关闭用户设备的待监听业务的本地分流功能。
在一种可能的设计中,处理单元,还用于根据用户设备的上下文确定为用户设备执行本地分流功能的远端网关设备。
在一种可能的设计中,接收单元,还用于接收合法监听网关设备发送的停止监听指示,停止监听指示用于通知集中网关设备停止上报用户设备的业务数据;发送单元,还用于在接收单元接收到停止监听指示后,向远端网关设备发送开启分流指示,开启分流指示用于通知远端网关设备开启所述用户设备的本地分流功能。
在一种可能的设计中,处理单元,还用于在监听用户设备的过程中,当获知用户设备切换了远端网关设备时,不激活切换后的远端网关设备上用户设备的本地分流功能。
第四方面,提供了一种远端网关设备,包括:接收单元,用于接收集中网关设备发送的关闭分流指示,关闭分流指示携带待监听的用户设备的标识,用于通知所述远端网关设备关闭用户设备的本地分流功能;发送单元,用于在接收到关闭分流指示后,向集中网关设备发送用户设备的业务数据,业务数据包括本地分流业务数据和非本地分流业务数据。
在一种可能的设计中,关闭分流指示还携带待监听业务的标识,关闭分流指示还用于通知远端网关设备关闭用户设备的待监听业务的本地分流功能;发送单元,还用于向集中网关设备发送用户设备的待监听业务的数据。
在一种可能的设计中,所述接收单元,还用于接收到集中网关设备发送的开启分流指示,开启分流指示用于通知远端网关设备开启用户设备的本地分流功能;发送单元,还用于在接收到开启分流指示后,向本地应用服务器发送用户设备的本地分流业务数据,并向集中网关设备发送用户设备的非本地分流业务数据。
第五方面,提供了一种集中网关设备,包括:处理器和通信接口,所述处理器,用于通过所述通信接口接收合法监听网关设备发送的监听指示,所述监听指示携带待监听的用户设备的标识;还用于通过所述通信接口向远端网关设备发送关闭分流指示,所述关闭分流指示用于通知所述远端网关设备关闭所述用户设备的本地分流功能;还用于通过所述通信接口接收所述远端网关设备 发送的所述用户设备的业务数据,并向所述合法监听网关设备上报所述业务数据。
在一种可能的设计中,所述处理器,还用于根据所述用户设备的上下文获知所述远端网关设备上开启了所述用户设备的本地分流功能。
在一种可能的设计中,所述处理器,还用于判断所述用户设备的上下文中是否包括所述用户设备对应的本地应用服务器的地址;如果是,则所述集中网关设备确定所述远端网关设备上开启了所述用户设备的本地分流功能。
在一种可能的设计中,所述监听指示还携带待监听业务的标识,所述关闭分流指示还用于通知所述远端网关设备关闭所述用户设备的所述待监听业务的本地分流功能。
在一种可能的设计中,所述处理器,还用于根据所述用户设备的上下文确定为所述用户设备执行本地分流功能的所述远端网关设备。
在一种可能的设计中,所述处理器,还用于通过所述通信接口接收所述合法监听网关设备发送的停止监听指示,所述停止监听指示用于通知所述集中网关设备停止上报所述用户设备的业务数据;还用于通过所述通信接口向所述远端网关设备发送开启分流指示,所述开启分流指示用于通知所述远端网关设备开启所述用户设备的本地分流功能。
在一种可能的设计中,所述处理器,还用于在监听用户设备的过程中,如果获知所述用户设备切换了远端网关设备,不激活切换后的远端网关设备上所述用户设备的本地分流功能。
第六方面,提供了一种远端网关设备,包括:处理器和通信接口,其中:所述处理器,用于通过所述通信接口接收集中网关设备发送的关闭分流指示,所述关闭分流指示携带待监听的用户设备的标识,所述关闭分流指示用于通知所述远端网关设备关闭所述用户设备的本地分流功能;还用于向所述集中网关设备发送所述用户设备的业务数据,所述业务数据包括本地分流业务数据和非本地分流业务数据。
在一种可能的设计中,所述关闭分流指示还携带待监听业务的标识,所述关闭分流指示还用于通知所述远端网关设备关闭所述用户设备的所述待监听业务的本地分流功能;所述处理器,还用于向所述集中网关设备发送所述用户设备的所述待监听业务的数据。
在一种可能的设计中,所述处理器,还用于通过所述通信接口接收所述集中网关设备发送的开启分流指示,其中,所述开启分流指示用于通知所述远端网关设备开启所述用户设备的本地分流功能;还用于通过所述通信接口向本地应用服务器发送所述用户设备的所述本地分流业务数据,并向所述集中网关设备发送所述用户设备的所述非本地分流业务数据。
第七方面,提供了一种合法监听的系统,包括具有第五方面任一特征的集中网关设备和具有第六方面任一特征的远端网关设备。
第八方面,提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。
第九方面,提供了一种包含指令的计算机程序产品,当其在计算机上运行时, 使得计算机执行上述各方面所述的方法。
附图说明
图1为本申请实施例提供的一种EPS网络架构的示意图;
图2为本申请实施例提供的另一种EPS网络架构的示意图;
图3为本申请实施例提供的一种合法监听的方法的流程示意图一;
图4为本申请实施例提供的一种合法监听的方法的流程示意图二;
图5为本申请实施例提供的一种合法监听的方法的流程示意图三;
图6为本申请实施例提供的一种合法监听的方法的流程示意图四;
图7为本申请实施例提供的一种合法监听的方法的流程示意图五;
图8为本申请实施例提供的一种集中网关设备的结构示意图一;
图9为本申请实施例提供的一种集中网关设备的结构示意图二;
图10为本申请实施例提供的一种远端网关设备的结构示意图一;
图11为本申请实施例提供的一种集中网关设备的结构示意图三;
图12为本申请实施例提供的一种远端网关设备的结构示意图二;
图13为本申请实施例提供的一种集中网关设备的结构示意图四;
图14为本申请实施例提供的一种远端网关设备的结构示意图三;
图15为本申请实施例提供的一种合法监听系统的结构示意图。
具体实施方式
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请实施例的技术方案可以适用于第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)定义的接入方式的场景,也可以适用于非3GPP的接入方式的场景。本申请实施例以3GPP接入方式的场景下的EPS网络架构为例进行描述。
本申请实施例的技术方案可用于网关下移的演进分组系统(Evolved Packet System,EPS)网络架构中,网关下移是指将网关部署位置下移,如部署在距离用户设备较近的位置,例如可以将网关分布式地和演进节点B(evolved NodeB,eNB)部署在一起,这样UE通过下移的网关能够快速地接入本地应用服务器,使得UE能够快速访问到本地应用服务器上的业务。
图1为本申请实施例提供的一种网关下移的EPS网络架构的示意图,其中,该网络架构中包括远端网关(Remote Gateway,RGW)和集中网关(Centralized Gateway,CGW)。RGW是下移部署的远端网关节点,主要负责用户设备的本地业务分流。CGW为集中网关节点,主要负责移动性管理,会话管理功能以及对外的接口功能,如计费接口、合法监听接口等。CGW通过SX接口对RGW进行控制管理,从S1-U接口接收RGW发送的用户面数据。其中,SX接口和S1-U接口可以应用现有的EPS网络架构中SGW和PGW之间的接口协议,例如通用分组无线业务(General Packet Radio Service,GPRS) 隧道协议(GPRS Tunneling Protocol,GTP),也可以应用其它接口协议或新定义的协议,本申请实施例不做限定。在该网络架构中,除引入的CGW和RGW以及二者之间的SX接口和S1-U接口外,其他网元和接口可以应用现有的EPS网络架构的网元和接口。在图1所示的网络架构中,上行方向的控制面信令从UE开始经过演进型通用陆地无线接入网(Evolved Universal Terrestrial Radio Access Network,E-UTRAN)、MME、CGW、策略和计费规则功能(Policy and Charging Rules Function,PCRF)实体后到达公用数据网(Public Data Network,PDN);上行方向的本地分流业务的用户面数据从UE开始经过E-UTRAN、RGW后直接到达本地应用服务器,非本地分流业务的用户面数据从UE开始经过E-UTRAN、RGW、CGW到达PDN。
图2为本申请实施例提供的另一种网关下移的EPS网络架构的示意图,其中,该网络架构中包括RGW和CGW。MME为用户设备选择RGW,RGW是下移部署的远端网关节点,集成了现有的EPS网络架构中的SGW功能和PGW的部分功能(如面向本地应用服务器的路由转发)。CGW为集中网关节点,承担PGW的部分功能,主要负责移动性管理,会话管理功能以及对外的接口功能,如计费接口、合法监听接口等。CGW通过S5-C接口与RGW进行控制面信令交互,通过S5-U接口与RGW进行用户面数据交换。其中,S5-C接口和S5-U接口可以应用现有的EPS网络架构中SGW和PGW之间的接口协议,S11接口可以应用现有的EPS网络架构中SGW和MME之间的接口协议,也都可以应用其它接口协议或新定义的协议,本申请实施例不做限定。在该网络架构中,除引入的CGW和RGW以及相关的接口外,其他网元和接口可以应用现有的EPS网络架构的网元和接口。在图2所示的网络架构中,上行方向的控制面信令从UE开始经过E-UTRAN、MME、RGW、CGW、PCRF实体后到达PDN;上行方向的本地分流业务的用户面数据从UE开始经过E-UTRAN、RGW后直接到达本地应用服务器,非本地分流业务的用户面数据的传输路径从UE开始经过E-UTRAN、RGW、CGW到达PDN。
当需要对如图1或图2所示的EPS网络进行合法监听时,合法监听系统还包括:合法监听中心和LIG。合法监听中心主要下达开启或停止监听的指示,以及对上报的数据执行合法监听。LIG主要转发合法监听中心的下达的指示,以及向监听中心上报用户设备的业务数据。合法监听中心与LIG连接,或者合法监听中心和LIG部署在一起,LIG通过CGW接入EPS网络。其中LIG与CGW之间有三个接口,分别为X1接口、X2接口和X3接口,本申请实施例不做限定。
为了更好的理解本申请实施例,对本申请实施例的应用场景进行简单介绍,如下:
通常,应用提供商会根据不同的业务要求部署不同的应用服务器,例如,对于要求低时延的业务,例如:视频直播,AR(Augmented Reality,扩增实境)游戏等,部署在离用户设备位置较近的本地应用服务器。这样,可将该类业务设置为本地分流业务,当用户设备访问该类业务时,直接通过远端网关设备访问本地应用服务器,实现对这类业务进行本地分流,这样用户设备 访问本地分流业务的路径变短,传输速率提高,进而有利于提高用户体验。而对时延要求不高的业务,例如:邮件、网页浏览业务等,部署在离用户设备位置较远的非本地应用服务器上。这样,可将该类业务设置为非本地分流业务,当用户设备访问该类业务时,由远端网关设备通过集中网关设备访问PDN。在该应用场景下,合法监听中心对用户设备进行合法监听时,无法获取用户设备的本地分流业务,因此无法合法监听用户设备的本地分流业务数据。
为了解决无法合法监听远端网关设备上本地分流业务数据的问题,本申请实施例提供一种合法监听的方法,可运用于图1或图2所示的网络中,如图3所示,该方法包括:
101、集中网关设备接收合法监听网关设备发送的监听指示。
其中,监听指示中携带待监听的用户设备的标识,则集中网关设备可根据该标识来确定需要监听的用户设备。
在一个示例中,当合法监听中心需要对用户设备进行合法监听时,会通过合法监听网关向集中网关设备发送监听指示,由集中网关设备通过合法监听网关上传该用户设备的业务数据至合法监听中心,由合法监听中心对该用户设备进行监听。
102、所述集中网关设备向所述远端网关设备发送关闭分流指示。
其中,所述关闭分流指示携带待监听用户的标识,可用于通知远端网关设备关闭待监听用户设备的本地分流功能。可选的,可新增一条消息用于指示远端网关设备开启或关闭分流功能,也可通过扩展现有技术中的Echo Request消息,如在Echo Request消息中增加新的指示信元,以指示远端网关设备开启或关闭分流功能。具体的,可自定义该新的指示信元的值为零时,为开启分流功能,否则为关闭分流功能。对于开启分流指示或关闭分流指示的具体实现,本申请实施例不做限定。
在一个示例中,若用户设备在远端网关设备上开启了本地分流功能,则该用户设备的本地分流业务会在远端网关设备处直接被分流到本地应用服务器,而不再经过集中网关设备。于是,集中网关设备无法上报待监听用户的本地分流业务的数据,合法监听中心便不能监听到该用户设备的本地分流业务的数据。因此,为了能够监听到该用户设备的本地分流业务的数据,集中网关设备需要向该远端网关设备发送关闭分流指示,远端网关设备根据指示关闭本地分流功能后,远端网关设备将该用户设备的本地分流业务数据通过集中网关设备发往PDN。这样,集中网关设备就能向合法监听中心上报该用户设备的本地分流数据,合法监听中心便可监听到该用户设备的本地分流业务的数据。
可选的,在执行本步骤之前,集中网关设备需要先确定为用户设备服务的远端网关设备,具体的,当应用于图1所示的系统架构时,集中网关设备本身的上下文中包括远端网关设备的标识,因此可直接根据该上下文确定远端网关设备。当应用于图2所示的系统架构时,集中网关设备获取用户设备 在附着过程中的上下文,该上下文中包括为该用户设备服务的远端网关设备的标识,则可根据该上下文确定远端网关设备,该具体过程可见后文详述。
103、所述远端网关设备向所述集中网关设备发送所述用户设备的业务数据。
其中,所述业务数据包括本地分流业务数据和非本地分流业务数据。
在一个示例中,远端网关设备在接收到集中网关设备发送的关闭分流指示后,关闭该用户设备的本地分流功能。则当远端网关设备接收该用户设备的业务数据后,将全部转发给集中网关设备,这样,集中网关设备通过合法监听网关将该用户的全部业务数据上报给合法监听中心,合法监听中心能监听到该用户设备的全部业务数据。
104、所述集中网关设备向所述合法监听网关设备上报所述用户设备的业务数据。
本申请实施例提供了一种合法监听的方法,在集中网关设备接收到合法监听中心发送的监听指示后,向远端网关设备发送关闭分流指示,通知远端网关设备关闭本地分流功能。集中网关设备将接收到远端网关设备发送的业务数据上报给合法监听中心。与现有技术合法监听中心无法监听到待监听用户设备的本地分流业务相比,本申请实施例通过关闭远端网关设备上该用户设备的本地分流功能,使得集中网关设备能够获取用户设备的本地分流业务数据。于是,集中网关设备能够将待监听用户设备的本地分流业务数据上报给合法监听中心,进而合法监听中心能监听到待监听用户设备的本地分流业务。
实际应用中,本申请可应用于对待监听的用户设备的全部业务数据进行监听的场景下,此时合法监听中心发送的监听指示中可以只携带待监听用户设备的标识,以实现监听该用户设备的全部业务数据。考虑到有些场景下,可能仅需要对用户设备的特定业务数据进行监听。此时,合法监听中心向集中网关设备发送的监听指示中除了携带待监听用户设备的标识,还需携带待监听业务的标识,相应的,集中网关设备向远端网关设备发送的关闭分流指示中也携带了待监听业务的标识,则远端网关设备可根据关闭分流指示中的待监听用户设备的标识和待监听业务的标识,关闭该用户设备对该待监听业务的本地分流功能。这样,可以实现对特定用户设备的特定业务进行监听,减轻网关设备间的数据传输量,提高监听的效率。
可选的,集中网关设备向远端网关设备发送关闭分流指示之前,还需要获知远端网关设备是否为用户设备开启了本地分流功能,因此,在图3所示的方法的基础上,本申请实施例还提供了一种合法监听的方法,如图4所示,在步骤102之前,该方法还包括集中网关设备根据用户设备的上下文获知远端网关设备上开启了用户设备的本地分流功能的步骤,这一步骤具体包括:
201、所述集中网关设备判断所述用户设备的上下文中是否包括所述用户设备对应的本地应用服务器的地址。
202、如果是,则所述集中网关设备确定所述远端网关设备上开启了所述 用户设备的本地分流功能。
其中,上下文中包括该用户设备具有分流功能的每个业务的标识。根据每个具有分流功能的业务的标识,可逐个获取每一个具有分流功能的业务数据对应的统一资源定位符(Uniform Resoure Locator,URL)。并进一步确定这些URL中是否包含本地应用服务器的URL。若存在,则集中网关设备可确定该用户设备在远端网关设备上开启了本地分流的功能。
可选的,在执行步骤201之前,集中网关设备首先判断是否为待监听用户设备配置了本地分流策略。若为该用户设备配置了本地分流策略,表示远端网关设备具备对该用户设备进行本地分流的能力,则可进一步通过上述步骤201和步骤202获知远端网关设备是否开启了本地分流功能。若远端设备网关没有给该用户设备配置本地分流策略,则表示远端网关设备不具备对该用户设备进行本地分流的能力。其中,本地分流策略可以由远端网关设备为用户设备进行本地配置,也可以通过集中网关设备从PCRF处获取。此外,本地分流策略可以通过设置特定的标识,用于表征用户设备是否能够进行本地分流。本地分流策略也可包含在用户设备的上下文中,集中网关设备可根据用户设备的上下文确定远端网关设备是否具备开启本地分流的功能。本申请实施例对本地分流策略的实现方式不做限定。
为了在合法监听结束后,远端网关设备能够重新开启用户设备的本地分流功能,远端网关设备在接收到关闭分流指示之后可以保存用户设备的本地分流策略。因此,在图3所示方法的基础上,如图5所示,本申请实施例还提供了一种合法监听的方法,在步骤104之后,该方法还包括:
301、如果所述集中网关设备接收到所述合法监听网关设备发送的停止监听指示,则所述集中网关设备向所述远端网关设备发送开启分流指示。
其中,所述停止监听指示用于通知所述集中网关设备停止上报所述用户设备的业务数据,所述开启分流指示用于通知所述远端网关设备开启所述用户设备的本地分流功能。
图5中分别以301a和301b示出了步骤301中的各个过程。
302、所述远端网关设备接收所述集中网关设备发送的开启分流指示,则向本地应用服务器发送所述用户设备的所述本地分流业务数据,并向所述集中网关设备发送所述用户设备的所述非本地分流业务数据。
其中,所述开启分流指示用于通知所述远端网关设备开启所述用户设备的本地分流功能。
在一种示例中,当合法监听中心对该用户设备的合法监听结束后,会通过合法监听网关设备向集中网关设备发送停止监听指示。当集中网关设备接收到停止监听指示后,向远端网关设备发送开启分流指示,指示远端网关设备开启对该用户设备的本地分流功能。当远端网关设备接收到集中网关设备发送的开启分流指示后,根据预先保存的本地分流策略重新开启该用户设备的本地分流功能。
图5中分别以302a和302b示出了步骤302中的各个过程。其中302a和 302b步骤不限定先后顺序。
进一步的,在图3所示方法的基础上,考虑到在合法监听用户设备的过程中,用户设备可能会发生位置移动,造成MME为其切换了远端网关设备,为了保证对用户设备进行合法监听的过程不被中断,如图6所示,本申请实施例还提供了一种合法监听的方法,在步骤103之后,该方法还包括:
401、集中网关设备获知该用户设备切换了远端网关设备。
在一种示例中,如果被监听的用户设备位置发生移动,有可能会造成MME选择新的远端网关设备为其服务,此时MME会向集中网关设备发送切换消息,集中网关设备根据该切换消息可确定该用户设备切换了远端网关设备。
402、当确定该用户设备切换了远端网关设备时,集中网关设备不激活该用户设备的本地分流功能。
在一种示例中,现有技术中,当MME为用户设备选择了新的远端网关设备后,该用户设备会在切换后的远端网关设备上重新进行附着流程和激活本地分流功能。而在本申请实施例中,由于该用户设备为合法监听的用户设备,因此,用户设备在切换后的远端网关设备上完成附着流程后,集中网关设备不激活该用户设备的本地分流功能。这样,集中网关设备能够获取用户设备的全部业务数据并上报至合法监听网关。
结合本申请的实际应用场景,本申请实施例还提供了一种合法监听的方法,如图7所示,该方法包括:
501、用户设备完成附着流程,并激活远端网关设备上的本地分流功能。
在一种示例中,用户设备完成附着流程后获得网络服务权限,并激活本地分流功能。
具体的,在附着流程中,MME根据用户设备位置信息或者用户设备请求的业务信息为该用户设备确定服务的远端网关设备。同时,也会根据用户设备请求的业务信息确定为用户设备服务的集中网关设备。在确定远端网关设备和集中网关设备后,MME通过创建会话请求信令将二者的地址信息发送给相关网元设备,如PCRF设备。PCRF在得知为用户设备服务的集中网关设备的地址后,将为该用户设备配置的本地分流策略发送给集中网关设备。集中网关设备将本地分流策略转发给远端网关设备,同时,指示远端网关开启本地分流功能并在用户设备上下文中标记远端网关设备已开启本地分流功能的信息。于是,该用户设备的本地分流业务将在远端网关设备处分流至本地应用服务器,而非本地分流业务则通过集中网关设备发送到PDN网络中。
502、合法监听网关向集中网关设备发送监听指示。
503、集中网关设备获知待监听用户设备是否开启了本地分流功能。
504、当待监听用户设备开启了本地分流功能时,集中网关设备向远端网关设备发送关闭分流指示。
步骤502-504的具体实现过程可参考步骤101-102,在此不重复赘述。
505、远端网关设备停止待监听用户设备的本地分流。
在一种示例中,远端网关设备停止待监听用户设备的本地分流后,远端网关设备将待监听用户设备的本地分流业务发送给集中网关设备,并由集中网关设备发送到PDN网络中。
506、远端网关设备向集中网关设备回复关闭本地分流功能的确认消息。
在一种示例中,远端网关设备回复的确认消息可以采用新增的消息,也可以通过扩展现有技术中的Echo Response消息,本申请实施例不做限定。
507、集中网关设备向合法监听网关上报待监听用户设备的业务数据。
在一种示例中,集中网关设备向合法监听网关上报待监听用户设备的业务数据,此时的业务数据包括本地分流业务数据和非本地分流业务数据,由合法监听网关设备发送给合法监听中心,以监听该用户设备的业务数据。
在一种示例中,如果该用户设备在合法监听的过程中,集中网关设备获知到该用户设备切换了远端网关设备,则可控制在切换后远端网关设备不激活该用户设备的本地分流功能,以保证合法监听的过程不中断。
508、在合法监听结束后,合法监听网关向集中网关设备发送停止监听指示。
509、集中网关设备向远端网关设备发送开启分流指示。
510、远端网关设备进行该用户设备的本地分流。
步骤508-510的具体实现过程可参考步骤201-202,在此不重复赘述。
511、远端网关设备向集中网关设备回复开启本地分流功能的确认消息。
在一种示例中,远端网关设备的回复的确认消息可以采用新增的消息,也可以通过扩展现有技术中的Echo Response消息,本申请实施例不做限定。
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。可以理解的是,各个网元,例如集中网关设备和远端网关设备,为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本发明能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
本申请实施例可以根据上述方法示例对集中网关设备和远端网关设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用对应各个功能划分各个功能模块的情况下,图8示出了上述实施例中所涉及的集中网关设备一种可能的结构示意图,集中网关设备800包括:接收单元801和发送单元802。接收单元801用于支持集中网关设备执行图3中的过程101,图5中的过程301a;发送单元802用于支持集中网关设备执 行图3中的过程102和104、图4中过程202、图5中过程301b、图7中的过程502、图7中的过程504、图7中的过程507-509。其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
进一步地,如图9所示,集中网关设备800还包括处理单元901,处理单元901用于支持集中网关设备执行图4中的过程201和202、图6中的过程401和402、图7中的过程501和503。其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
图10示出了上述实施例中所涉及的远端网关设备一种可能的结构示意图,远端网关设备1000包括:接收单元1001和发送单元1002。接收单元1001用于支持远端网关设备执行图5中的过程302a。发送单元1002用户支持远端网关设备执行图3中的过程103、图5中的过程302a和302b、图7中的过程505-506、图7中的过程510-511。
在采用集成的单元的情况下,图11示出了上述实施例中所涉及的集中网关设备的一种可能的结构示意图。集中网关设备1100包括:处理模块1101和通信模块1102。处理模块1101用于对集中网关设备的动作进行控制管理,例如,处理模块1101用于支持集中网关设备执行图3中的过程101、102和104,图4中的过程201、202,图5中的过程301,图6中的过程401、402,图7中的过程501、503、504、507、509,和/或用于本文所描述的技术的其它过程。通信模块1102用于支持集中网关设备与其他网络实体的通信,例如与图1或图2中示出的功能模块或网络实体之间的通信。集中网关设备还可以包括存储模块1103,用于存储集中网关设备的程序代码和数据。
在采用集成的单元的情况下,图12示出了上述实施例中所涉及的远端网关设备的一种可能的结构示意图。远端网关设备1200包括:处理模块1201和通信模块1202。处理模块1201用于对远端网关设备的动作进行控制管理,例如,处理模块1201用于支持远端网关设备执行图3中的过程103,图5中的过程302,图7中的过程505、506、510、511,和/或用于本文所描述的技术的其它过程。通信模块1202用于支持远端网关设备与其他网络实体的通信,例如与图3、图4、图5、图6或图7中示出的功能模块或网络实体之间的通信。远端网关设备还可以包括存储模块1203,用于存储远端网关设备的程序代码和数据。
其中,处理模块1101/1201可以是处理器或控制器,例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC),现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本发明公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信模块1102/1202可以是收发器、 收发电路或通信接口等。存储模块1103/1203可以是存储器。
当处理模块1101为处理器,通信模块1102为通信接口,存储模块1103为存储器时,本申请实施例所涉及的集中网关设备可以为图13所示的集中网关设备。
当处理模块1201为处理器,通信模块1202为通信接口,存储模块1203为存储器时,本申请实施例所涉及的远端网关设备可以为图14所示的远端网关设备。
图13示出了上述实施例中涉及到的一种集中网关设备的结构示意图。该集中网关设备包括:控制器/处理器1302用于对集中网关设备的动作进行控制管理。例如,控制器/处理器1302用于支持集中网关设备执行执行图3中的过程101、102和104,图4中的过程201和202,图5中过程301a和301b,图6中的过程401和402,图7中的过程501-504、507-509,和/或用于本发明实施例中所描述的技术的其他过程。存储器1301用于存储用于集中网关设备的程序代码和数据。通信接口1303用于支持集中网关设备与其他网络实体的通信。例如,通信接口1303用于支持集中网关设备与图1或图2中示出的各个网络实体之间的通信。
图14示出了上述实施例中涉及到的一种远端网关设备的结构示意图。该远端网关设备包括:控制器/处理器1402用于对远端网关设备的动作进行控制管理。例如,控制器/处理器1402用于支持远端网关设备执行执行图3中的过程103,图5中的过程302,图7中的过程505、506、510、511,和/或用于本文所描述的技术的其它过程。存储器1401用于存储用于远端网关设备的程序代码和数据。通信接口1403用于支持远端网关设备与其他网络实体的通信。例如,通信接口1403用于支持远端网关设备与图1或图2中示出的各个网络实体之间的通信。
结合本发明公开内容所描述的方法或者算法的步骤可以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器(Random Access Memory,RAM)、闪存、只读存储器(Read Only Memory,ROM)、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、电可擦可编程只读存储器(Electrically EPROM,EEPROM)、寄存器、硬盘、移动硬盘、只读光盘(CD-ROM)或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于核心网接口设备中。当然,处理器和存储介质也可以作为分立组件存在于核心网接口设备中。
如图15所示,本申请实施例还提供一种合法监听系统,包括如上所述的集中网关设备1501以及如上所述的远端网关设备1502。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应 过程,在此不再赘述。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。

Claims (25)

  1. 一种合法监听的方法,其特征在于,包括:
    集中网关设备接收合法监听网关设备发送的监听指示,所述监听指示携带待监听的用户设备的标识;
    所述集中网关设备向远端网关设备发送关闭分流指示,所述关闭分流指示用于通知所述远端网关设备关闭所述用户设备的本地分流功能;
    所述集中网关设备接收所述远端网关设备发送的所述用户设备的业务数据,并向所述合法监听网关设备上报所述业务数据。
  2. 根据权利要求1所述的方法,其特征在于,在所述集中网关设备向远端网关设备发送关闭分流指示之前,所述方法还包括:
    所述集中网关设备根据所述用户设备的上下文获知所述远端网关设备上开启了所述用户设备的本地分流功能。
  3. 根据权利要求2所述的方法,其特征在于,所述集中网关设备根据所述用户设备的上下文获知所述远端网关设备上开启了所述用户设备的本地分流功能包括:
    所述集中网关设备判断所述用户设备的上下文中是否包括所述用户设备对应的本地应用服务器的地址;
    如果是,则所述集中网关设备确定所述远端网关设备上开启了所述用户设备的本地分流功能。
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述监听指示还携带待监听业务的标识,所述关闭分流指示还用于通知所述远端网关设备关闭所述用户设备的所述待监听业务的本地分流功能。
  5. 根据权利要求1-4任一项所述的方法,其特征在于,在所述集中网关设备向远端网关设备发送关闭分流指示之前,所述方法还包括:
    所述集中网关设备根据所述用户设备的上下文确定为所述用户设备执行本地分流功能的所述远端网关设备。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,在所述集中网关设备向远端网关设备发送关闭分流指示之后,所述方法还包括:
    如果所述集中网关设备接收到所述合法监听网关设备发送的停止监听指示,则所述集中网关设备向所述远端网关设备发送开启分流指示,其中,所述停止监听指示用于通知所述集中网关设备停止上报所述用户设备的业务数据,所述开启分流指示用于通知所述远端网关设备开启所述用户设备的本地分流功能。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,在监听用户设备的过程中,所述方法还包括:
    如果获知所述用户设备切换了远端网关设备,所述集中网关设备不激活切换后的远端网关设备上所述用户设备的本地分流功能。
  8. 一种合法监听的方法,其特征在于,包括:
    远端网关设备接收集中网关设备发送的关闭分流指示,所述关闭分流指示 携带待监听的用户设备的标识,所述关闭分流指示用于通知所述远端网关设备关闭所述用户设备的本地分流功能;
    所述远端网关设备向所述集中网关设备发送所述用户设备的业务数据,所述业务数据包括本地分流业务数据和非本地分流业务数据。
  9. 根据权利要求8所述的方法,其特征在于,所述关闭分流指示还携带待监听业务的标识,所述关闭分流指示还用于通知所述远端网关设备关闭所述用户设备的所述待监听业务的本地分流功能;
    所述远端网关设备向所述集中网关设备发送所述用户设备的业务数据包括:所述远端网关设备向所述集中网关设备发送所述用户设备的所述待监听业务的数据。
  10. 根据权利要求8或9所述的方法,其特征在于,在远端网关设备接收集中网关设备发送的关闭分流指示之后,所述方法还包括:
    如果所述远端网关设备接收到所述集中网关设备发送的开启分流指示,则所述远端网关设备向本地应用服务器发送所述用户设备的所述本地分流业务数据,并向所述集中网关设备发送所述用户设备的所述非本地分流业务数据,其中,所述开启分流指示用于通知所述远端网关设备开启所述用户设备的本地分流功能。
  11. 一种集中网关设备,其特征在于,包括:
    接收单元,用于接收合法监听网关设备发送的监听指示,所述监听指示携带待监听的用户设备的标识;
    发送单元,用于在所述接收单元接收到所述监听指示后,向所述远端网关设备发送关闭分流指示,所述关闭分流指示用于通知所述远端网关设备关闭所述用户设备的本地分流功能;
    所述接收单元,还用于接收所述远端网关设备发送的所述用户设备的业务数据;
    所述发送单元,还用于向所述合法监听网关设备上报所述业务数据。
  12. 根据权利要求11所述的集中网关设备,其特征在于,还包括处理单元,用于根据所述用户设备的上下文获知所述远端网关设备上开启了所述用户设备的本地分流功能。
  13. 根据权利要求12所述的集中网关设备,其特征在于,所述处理单元,还用于判断所述用户设备的上下文中是否包括所述用户设备对应的本地应用服务器的地址;
    如果是,则确定所述远端网关设备上开启了所述用户设备的本地分流功能。
  14. 根据权利要求11-13任一项所述的集中网关设备,其特征在于,所述接收单元接收的所述监听指示还携带待监听业务的标识,所述发送单元发送的所述关闭分流指示还用于通知所述远端网关设备关闭所述用户设备的所述待监听业务的本地分流功能。
  15. 根据权利要求11-14任一项所述的集中网关设备,其特征在于,所述 处理单元,还用于根据所述用户设备的上下文确定为所述用户设备执行本地分流功能的所述远端网关设备。
  16. 根据权利要求11-15任一项所述的集中网关设备,其特征在于,所述接收单元,还用于接收所述合法监听网关设备发送的停止监听指示,所述停止监听指示用于通知所述集中网关设备停止上报所述用户设备的业务数据;
    所述发送单元,还用于在所述接收单元接收到所述停止监听指示后,向所述远端网关设备发送开启分流指示,所述开启分流指示用于通知所述远端网关设备开启所述用户设备的本地分流功能。
  17. 根据权利要求11-16任一项所述的集中网关设备,其特征在于,所述处理单元,用于在监听用户设备的过程中,当获知所述用户设备切换了远端网关设备时,不激活切换后的远端网关设备上所述用户设备的本地分流功能。
  18. 一种远端网关设备,其特征在于,包括:
    接收单元,用于接收集中网关设备发送的关闭分流指示,所述关闭分流指示携带待监听的用户设备的标识,所述关闭分流指示用于通知所述远端网关设备关闭所述用户设备的本地分流功能;
    发送单元,用于在所述接收单元接收到所述关闭分流指示后,向所述集中网关设备发送所述用户设备的业务数据,所述业务数据包括本地分流业务数据和非本地分流业务数据。
  19. 根据权利要求18所述的远端网关设备,其特征在于,所述关闭分流指示还携带待监听业务的标识,所述关闭分流指示还用于通知所述远端网关设备关闭所述用户设备的所述待监听业务的本地分流功能;
    所述发送单元,还用于向所述集中网关设备发送所述用户设备的所述待监听业务的数据。
  20. 根据权利要求18或19所述的远端网关设备,其特征在于,所述接收单元,还用于接收所述集中网关设备发送的开启分流指示,所述开启分流指示用于通知所述远端网关设备开启所述用户设备的本地分流功能;
    所述发送单元,还用于在所述接收单元接收到所述开启分流指示后,向本地应用服务器发送所述用户设备的所述本地分流业务数据,并向所述集中网关设备发送所述用户设备的所述非本地分流业务数据。
  21. 一种合法监听系统,其特征在于,包括如上述权利要求11至17任一项所述的集中网关设备以及如上述权利要求18至20任一项所述的远端网关设备。
  22. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行权利要求1至7任一项所述的方法。
  23. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行权利要求8至10任一项所述的方法。
  24. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使 得计算机执行权利要求1至7任一项所述的方法。
  25. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得计算机执行权利要求8至10任一项所述的方法。
PCT/CN2017/075279 2017-02-28 2017-02-28 一种合法监听的方法、装置及系统 WO2018157322A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2017/075279 WO2018157322A1 (zh) 2017-02-28 2017-02-28 一种合法监听的方法、装置及系统
EP17898952.1A EP3582478A1 (en) 2017-02-28 2017-02-28 Lawful interception method, device, and system
CN201780086987.5A CN110326278B (zh) 2017-02-28 2017-02-28 一种合法监听的方法、网关设备、系统、存储介质
US16/553,713 US20190387397A1 (en) 2017-02-28 2019-08-28 Lawful Interception Method, Apparatus, And System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/075279 WO2018157322A1 (zh) 2017-02-28 2017-02-28 一种合法监听的方法、装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/553,713 Continuation US20190387397A1 (en) 2017-02-28 2019-08-28 Lawful Interception Method, Apparatus, And System

Publications (1)

Publication Number Publication Date
WO2018157322A1 true WO2018157322A1 (zh) 2018-09-07

Family

ID=63369598

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/075279 WO2018157322A1 (zh) 2017-02-28 2017-02-28 一种合法监听的方法、装置及系统

Country Status (4)

Country Link
US (1) US20190387397A1 (zh)
EP (1) EP3582478A1 (zh)
CN (1) CN110326278B (zh)
WO (1) WO2018157322A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115298412A (zh) * 2020-03-05 2022-11-04 斯伦贝谢技术有限公司 钻井钻机控制系统和方法
CN117158017A (zh) * 2022-03-30 2023-12-01 吉欧平台有限公司 用于实现合法拦截管理集成的系统和方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050152275A1 (en) * 2004-01-14 2005-07-14 Nokia Corporation Method, system, and network element for monitoring of both session content and signalling information in networks
CN101005409A (zh) * 2006-01-18 2007-07-25 华为技术有限公司 一种在下一代网络中实现合法监听的方法和系统
CN101141761A (zh) * 2007-09-30 2008-03-12 华为技术有限公司 一种监听的方法、系统及装置
CN102204235A (zh) * 2011-05-25 2011-09-28 华为技术有限公司 一种监听方法、监听系统及安全分流设备
CN102469433A (zh) * 2010-11-09 2012-05-23 中兴通讯股份有限公司 一种实现数据流服务质量和计费策略控制的方法及系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090100040A1 (en) * 2007-04-03 2009-04-16 Scott Sheppard Lawful interception of broadband data traffic
CN101364901B (zh) * 2007-08-10 2011-06-01 华为技术有限公司 合法监听方法、合法监听系统、分组数据网关、监听中心
EP2345223A1 (en) * 2008-08-15 2011-07-20 Telefonaktiebolaget L M Ericsson (PUBL) Lawful interception of nat/ pat
WO2013097089A1 (zh) * 2011-12-27 2013-07-04 华为技术有限公司 监听移动用户位置的方法和监听系统
EP2941936B1 (en) * 2013-01-03 2019-09-11 Intel Corporation Apparatus, system and method of lawful interception (li) in a cellular network
IN2015CH01716A (zh) * 2015-03-31 2015-04-24 Wipro Ltd
CN106161357B (zh) * 2015-04-02 2019-12-13 中兴通讯股份有限公司 Ims网络中实现合法监听的方法、装置及应用服务器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050152275A1 (en) * 2004-01-14 2005-07-14 Nokia Corporation Method, system, and network element for monitoring of both session content and signalling information in networks
CN101005409A (zh) * 2006-01-18 2007-07-25 华为技术有限公司 一种在下一代网络中实现合法监听的方法和系统
CN101141761A (zh) * 2007-09-30 2008-03-12 华为技术有限公司 一种监听的方法、系统及装置
CN102469433A (zh) * 2010-11-09 2012-05-23 中兴通讯股份有限公司 一种实现数据流服务质量和计费策略控制的方法及系统
CN102204235A (zh) * 2011-05-25 2011-09-28 华为技术有限公司 一种监听方法、监听系统及安全分流设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3582478A4 *

Also Published As

Publication number Publication date
CN110326278A (zh) 2019-10-11
EP3582478A4 (en) 2019-12-18
US20190387397A1 (en) 2019-12-19
CN110326278B (zh) 2021-03-30
EP3582478A1 (en) 2019-12-18

Similar Documents

Publication Publication Date Title
US20210021334A1 (en) Wireless communications method and apparatus
US8565076B2 (en) Destination learning and mobility detection in transit network device in LTE and UMTS radio access networks
US9635594B2 (en) Method; apparatus and computer program product for moving a UE context application service handover between access nodes
WO2018166317A1 (zh) 一种业务的切换方法、上下文迁移方法及相关设备
US8144593B2 (en) Method and apparatus for efficient routing in communication networks
BR112020016328A2 (pt) Método de comunicação, aparelho de comunicações, sistema de comunicações e um meio legível por computador
JP2019521588A (ja) 通信制御方法および関連するネットワーク要素
KR20150096463A (ko) 네트워크에 액세스하는 시스템 및 방법
JP6198940B2 (ja) デフォルト・ベアラなしのハンドオーバのための方法および装置
JP2012249288A (ja) ネットワーク・モニタリング・システム及びコンピュータ読み出し可能な記録媒体
US9961045B2 (en) Service path changing method and apparatus
KR20130055194A (ko) 이종 네트워크 간 핸드오버 방법 및 장치
US20180255481A1 (en) Service flow transmission method and apparatus
WO2018058529A1 (zh) 建立承载的方法及装置
WO2011143997A1 (zh) 一种实现路由选择的方法和装置
KR20110121044A (ko) 무선 통신 시스템에서 통신 시스템 노드와 데이터 서비스 망 노드 간 연결 설정 방법
US20130058312A1 (en) Method, apparatus and system for processing local address in shunt connection
WO2018195943A1 (zh) 用于拥塞处理的方法和设备
WO2018157322A1 (zh) 一种合法监听的方法、装置及系统
WO2018045515A1 (zh) 一种数据分流方法及相关装置
JP7206390B2 (ja) データの送信方法およびデバイス
WO2013037271A1 (zh) 一种多接入方法及系统
WO2011157100A1 (zh) 一种数据缓存的方法和系统
EP2903330B1 (en) Data transmission method, base station, access network device and user equipment
KR20190132921A (ko) 네트워크에서 멀티 액세스 네트워크를 통한 트래픽 분산 방법 및 이를 수행하는 네트워크 엔터티

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17898952

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017898952

Country of ref document: EP

Effective date: 20190911