999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Implementation of Lawful Interception Within IMS

2008-06-20 12:50:36ZhangLuKongMin
ZTE Communications 2008年4期

Zhang Lu,Kong Min

(Central R&D Institute of ZTE Corporation, Nanjing 210012, P. R. China)

Abstract:Lawful Interception(LI)is a system which monitors a user or a communication in support of criminal investigation.It is a necessary function of the telecommunication operator.The telecommunication standards bodies such as ETSI,3GPP are producing technical specifications on LI system,and have developed standards on handover areas and interception areas which can guide the implement.IP Multimedia Subsystem(IMS)is a new core-network architecture introduced after the version of 3GPP Release 5,which is layer-designed,IP-based,and using Session Initiation Protocol(SIP)as application protocol.There are two typical implementations of LI within IMS,distributed type and centralized type.

1 Introduction to IMS

I PMultimedia Subsystem(IMS)is a subsystem supporting IPmultimedia services,which was proposed by the 3GPPin Release 5.Its main features include layered architecture,IP-based core network and using Session Initiation Protocol(SIP)as its communication protocol[1-2].

2 Lawful Interception Overview

Lawful Interception(LI)is the interception of telecommunications by security authorities for the purpose of law enforcement.It involves two aspects:signaling and content of communication.Figure 1 is an interception framework proposed by the ETSI[3].

3GPPand ETSIhave done lots of work in developing standards for LI.Up to now,they have worked out the standard for handover interface between Law Enforcement Monitoring Facility(LEMF)and Administration Function(ADMF)[4-5]as well as the standard for the interface between communications device and LIdevice[6].However,in the Next Generation Networks(NGNs),represented by IMS,implementation of interception data collection in the core network is still not clearly defined.One key problem is how to deploy the interception data collection function into IMSnetwork.In an interception system,the interception data collection is a logic function,which can either be integrated into each functional entity of IMSor be performed with an independent device.By the arrangement of interception data collection unit,the interception can be divided into two types:distributed and centralized.Below the two interception types,especially the centralized one,will be discussed in detail.

3 Implementation of LI

3.1 Distributed Interception

▲Figure 1. Interception framework proposed by ETSI.

In distributed interception[7],the Lawful Interception Collection Facility(LICF)is arranged between IMSnetwork elements that perform interception functions.Often,the LICFis placed between the access device and a Proxy-Call Session Control Function(P-CSCF)device or a Serving-Call Session Control Function(S-CSCF)device.

The implementation of distributed interception proceeds as follows:

(1)Configure the identification information of interception target on the LICF,such as user ID or service ID[8].The user ID should be the unique information of the user,for instance,the user identity or the user's telephone number;while the service ID can be the service feature code that uniquely identifies the user service.

(2)The LICFreceives signaling streams and media streams from other network nodes.

(3)Upon receiving the streams,the LICFchecks whether the messages of the interception target are included in these streams.

(4)If the messages of interception target are contained,the LICFsends the signaling streams and media streams to both their receivers and monitoring device;otherwise,it only sends these streams to their receivers.

3.2 Centralized Interception

In centralized interception[9],the LICFis placed in the IMS'core network.One scenario is to use the LICFas a SIP Application Server(AS)of IMSnetwork.

The LICFis used with the Home Subscriber Server(HSS)to implement or release interception of a target user by dynamically changing the Initial Filter Criteria(iFC)[10].In the following chapters,we will discuss this interception mode from three aspects:setting,releasing,and implementing.

3.2.1 Interception Setting

To intercept the telecommunications of a specific user,it is necessary to follow the steps below to set the interception target.

(1)The interception center gives an interception instruction to an interception AS,where the target user identity and contents for interception are included.

(2)The interception ASthen makes a request to the HSS,asking to activate the subscription rule of the target user if it already exists or to add and activate the subscription rule if it does not exist.The iFC that triggers the interception can be configured in the HSSin advance and activated by the interception AS;or it can be first changed by the interception AS or other network elements through the interface the HSSprovides,and then dynamically added into the HSSby the interception AS.

(3)After the HSSupdates the subscription rule of the interception target,it notifies the S-CSCFof the updated information.

(4)Upon receiving an initial request related to the interception target,the S-CSCFsends the request to the interception ASbased on the subscription rule[11].

Now,the signaling and media streams of the target user can be intercepted.

3.2.2 Interception Release

To release the interception of a specific user,do the following:

(1)The interception center sends an interception release instruction to an interception AS,where the identification information of the user which will be released from the interception is included.

(2)The interception ASthen sends a request to the HSS,asking to deactivate the subscription rule of the user.

(3)The HSSupdates the subscription rule of the user and notifies the S-CSCF of the updated information.

(4)When receiving an initial request related to the user,the S-CSCFdoes not send the request to the interception AS.

So far,the interception of the specific user is released.

3.2.3 Interception Implementation

Suppose the interception center instructs to intercept the conversations of user A.

The implementation procedure is illustrated in Figure 2.

(1)The interception center sends an interception instruction to the interception AS,instructing to intercept the conversations of user A.

(2)The interception ASsends a subscription rule modification request to the HSSto activate the interception subscription rule of user A.

(3)The HSSnotifies the S-CSCFof the change of user A's interception subscription rule.

(4)User A initiates an INVITEcall request to user B,where user A's media description(SDPA)is included.

(5)The S-CSCFsends the INVITE request to the interception ASbased on user A's interception subscription rule.

(6)The interception ASupdates the media description in the INVITErequest,adding itself as a receiver(SDPAS).

(7)The interception ASreports signaling messages to the interception center.

(8)The interception ASforwards the updated INVITErequest to the S-CSCF.

(9)The S-CSCFforwards the INVITE request to user B.

(10)User Breplies with Response 183,where user B's media description(SDPB)is included.

(11)The S-CSCFforwards Response 183 to the interception AS.

(12)The interception ASupdates the media description in Response 183,and changes the destination as itself.

(13)The interception ASforwards the updated Response 183 to the S-CSCF.

(14)The S-CSCFforwards Response 183 to user A.

(15)The interception ASreports signaling messages to the interception center.

(16)User A exchanges signaling messages with user B via the S-CSCF and the interception ASto set up a call.

(17)User A sends media to the interception AS.

(18)The interception ASforwards media to the interception center.

(19)The interception ASforwards the media to user B.

(20)User Bsends the media to the interception AS.

(21)The interception ASforwards the media to the interception center.

(22)The interception ASforwards the media to user A.In this way,the interception of user A's conversation is completed.This procedure is designed for user A-originated calls.For user A-terminated calls,the interception procedure is similar.

3.3 Comparison between Two Interception Modes

Distributed interception is a traditional solution.Its advantage is that many interception points can be set,allowing relatively comprehensive information to be collected.Its disadvantage is the interception points are distributed.In IMS,there is a large number of access networks,P-CSCFs and S-CSCFs,so the interception is difficult to implement and the networking is restricted.Moreover,because the signaling and media streams of all users are collected by the LICF,the network's fault points and the risk of congestion increase.

▲Figure 2. Interception implementation procedure.

The centralized interception adopts IMSnetwork architecture and has the following advantages;

(1)The centralized arrangement of interception devices effectively solves the engineering and management problems of interception devices,which always perplex distributed interception.

(2)By modifying the iFC,the centralized interception method ensures the interception device to collect specific user's signaling and media for interception.As a result,the load of the interception device is considerably decreased and congestion is unlikely to occur.

(3)The centralized interception method treats interception as one application of IMS.All interception operations follow the processing rules of IMSand they have no impact on existing IMS,thus ensuring the feasibility and backward compatibility of this method.

(4)The triggering of interception with iFC will not affect the normal call process even if the interception ASdoes not work.Therefore,the robustness of the entire system is enhanced.

4 Conclusion

IMSis a new network architecture.Taking advantage of the scalability of IMSfor various applications has become an important research topic.The interception solution discussed in this paper not only realizes the interception within existing IMSnetwork,but also provides useful reference for implementation of other applications in IMS.

主站蜘蛛池模板: 色婷婷国产精品视频| 国产全黄a一级毛片| 欧美激情伊人| 小说区 亚洲 自拍 另类| 亚洲熟女偷拍| 女人18毛片一级毛片在线 | 久久久久亚洲Av片无码观看| 亚洲成综合人影院在院播放| 一级一级一片免费| 国产网站一区二区三区| 欧洲欧美人成免费全部视频| 中文成人无码国产亚洲| 国产黄色片在线看| 国产又大又粗又猛又爽的视频| 国产经典免费播放视频| 亚洲中文精品人人永久免费| 日韩免费成人| 国产精品亚洲欧美日韩久久| 久久黄色小视频| 久草网视频在线| 欧美成人精品欧美一级乱黄| 99精品视频播放| 国产超碰一区二区三区| 广东一级毛片| 91在线播放免费不卡无毒| 无码丝袜人妻| 国产麻豆永久视频| 中日韩一区二区三区中文免费视频| 日韩免费毛片视频| 亚洲综合日韩精品| 强奷白丝美女在线观看| 国产精品第| 91精品小视频| 日韩a级片视频| 欧美性猛交一区二区三区| 亚洲二区视频| 亚洲AV无码久久精品色欲| 香蕉视频在线精品| 亚洲人在线| 午夜爽爽视频| 中文字幕在线日韩91| 人人看人人鲁狠狠高清| 五月婷婷中文字幕| 国产精品成人啪精品视频| 精品视频一区二区观看| 91毛片网| 69av在线| 2020精品极品国产色在线观看| 草草线在成年免费视频2| 黄色福利在线| 欧美成人手机在线视频| 日韩中文精品亚洲第三区| 色综合成人| 丁香五月亚洲综合在线 | 中文无码伦av中文字幕| 国产精品视频3p| 国产成人精品日本亚洲| 在线观看亚洲天堂| 蝌蚪国产精品视频第一页| 国产女人水多毛片18| 在线免费不卡视频| 自拍偷拍欧美| 毛片a级毛片免费观看免下载| 日本高清免费一本在线观看| 国产乱子伦手机在线| 国产69囗曝护士吞精在线视频| 欧美日韩中文字幕在线| 欧美精品在线免费| 成年女人a毛片免费视频| 在线色国产| 亚洲一区二区精品无码久久久| 亚洲精品欧美日本中文字幕| 亚洲成a人片在线观看88| 美女无遮挡被啪啪到高潮免费| 毛片免费网址| 亚洲一级无毛片无码在线免费视频| 青草精品视频| www.99精品视频在线播放| 欧美成人午夜视频免看| 亚洲无码精彩视频在线观看| 99re在线免费视频| 精品久久蜜桃|