999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Implementation of Lawful Interception Within IMS

2008-06-20 12:50:36ZhangLuKongMin
ZTE Communications 2008年4期

Zhang Lu,Kong Min

(Central R&D Institute of ZTE Corporation, Nanjing 210012, P. R. China)

Abstract:Lawful Interception(LI)is a system which monitors a user or a communication in support of criminal investigation.It is a necessary function of the telecommunication operator.The telecommunication standards bodies such as ETSI,3GPP are producing technical specifications on LI system,and have developed standards on handover areas and interception areas which can guide the implement.IP Multimedia Subsystem(IMS)is a new core-network architecture introduced after the version of 3GPP Release 5,which is layer-designed,IP-based,and using Session Initiation Protocol(SIP)as application protocol.There are two typical implementations of LI within IMS,distributed type and centralized type.

1 Introduction to IMS

I PMultimedia Subsystem(IMS)is a subsystem supporting IPmultimedia services,which was proposed by the 3GPPin Release 5.Its main features include layered architecture,IP-based core network and using Session Initiation Protocol(SIP)as its communication protocol[1-2].

2 Lawful Interception Overview

Lawful Interception(LI)is the interception of telecommunications by security authorities for the purpose of law enforcement.It involves two aspects:signaling and content of communication.Figure 1 is an interception framework proposed by the ETSI[3].

3GPPand ETSIhave done lots of work in developing standards for LI.Up to now,they have worked out the standard for handover interface between Law Enforcement Monitoring Facility(LEMF)and Administration Function(ADMF)[4-5]as well as the standard for the interface between communications device and LIdevice[6].However,in the Next Generation Networks(NGNs),represented by IMS,implementation of interception data collection in the core network is still not clearly defined.One key problem is how to deploy the interception data collection function into IMSnetwork.In an interception system,the interception data collection is a logic function,which can either be integrated into each functional entity of IMSor be performed with an independent device.By the arrangement of interception data collection unit,the interception can be divided into two types:distributed and centralized.Below the two interception types,especially the centralized one,will be discussed in detail.

3 Implementation of LI

3.1 Distributed Interception

▲Figure 1. Interception framework proposed by ETSI.

In distributed interception[7],the Lawful Interception Collection Facility(LICF)is arranged between IMSnetwork elements that perform interception functions.Often,the LICFis placed between the access device and a Proxy-Call Session Control Function(P-CSCF)device or a Serving-Call Session Control Function(S-CSCF)device.

The implementation of distributed interception proceeds as follows:

(1)Configure the identification information of interception target on the LICF,such as user ID or service ID[8].The user ID should be the unique information of the user,for instance,the user identity or the user's telephone number;while the service ID can be the service feature code that uniquely identifies the user service.

(2)The LICFreceives signaling streams and media streams from other network nodes.

(3)Upon receiving the streams,the LICFchecks whether the messages of the interception target are included in these streams.

(4)If the messages of interception target are contained,the LICFsends the signaling streams and media streams to both their receivers and monitoring device;otherwise,it only sends these streams to their receivers.

3.2 Centralized Interception

In centralized interception[9],the LICFis placed in the IMS'core network.One scenario is to use the LICFas a SIP Application Server(AS)of IMSnetwork.

The LICFis used with the Home Subscriber Server(HSS)to implement or release interception of a target user by dynamically changing the Initial Filter Criteria(iFC)[10].In the following chapters,we will discuss this interception mode from three aspects:setting,releasing,and implementing.

3.2.1 Interception Setting

To intercept the telecommunications of a specific user,it is necessary to follow the steps below to set the interception target.

(1)The interception center gives an interception instruction to an interception AS,where the target user identity and contents for interception are included.

(2)The interception ASthen makes a request to the HSS,asking to activate the subscription rule of the target user if it already exists or to add and activate the subscription rule if it does not exist.The iFC that triggers the interception can be configured in the HSSin advance and activated by the interception AS;or it can be first changed by the interception AS or other network elements through the interface the HSSprovides,and then dynamically added into the HSSby the interception AS.

(3)After the HSSupdates the subscription rule of the interception target,it notifies the S-CSCFof the updated information.

(4)Upon receiving an initial request related to the interception target,the S-CSCFsends the request to the interception ASbased on the subscription rule[11].

Now,the signaling and media streams of the target user can be intercepted.

3.2.2 Interception Release

To release the interception of a specific user,do the following:

(1)The interception center sends an interception release instruction to an interception AS,where the identification information of the user which will be released from the interception is included.

(2)The interception ASthen sends a request to the HSS,asking to deactivate the subscription rule of the user.

(3)The HSSupdates the subscription rule of the user and notifies the S-CSCF of the updated information.

(4)When receiving an initial request related to the user,the S-CSCFdoes not send the request to the interception AS.

So far,the interception of the specific user is released.

3.2.3 Interception Implementation

Suppose the interception center instructs to intercept the conversations of user A.

The implementation procedure is illustrated in Figure 2.

(1)The interception center sends an interception instruction to the interception AS,instructing to intercept the conversations of user A.

(2)The interception ASsends a subscription rule modification request to the HSSto activate the interception subscription rule of user A.

(3)The HSSnotifies the S-CSCFof the change of user A's interception subscription rule.

(4)User A initiates an INVITEcall request to user B,where user A's media description(SDPA)is included.

(5)The S-CSCFsends the INVITE request to the interception ASbased on user A's interception subscription rule.

(6)The interception ASupdates the media description in the INVITErequest,adding itself as a receiver(SDPAS).

(7)The interception ASreports signaling messages to the interception center.

(8)The interception ASforwards the updated INVITErequest to the S-CSCF.

(9)The S-CSCFforwards the INVITE request to user B.

(10)User Breplies with Response 183,where user B's media description(SDPB)is included.

(11)The S-CSCFforwards Response 183 to the interception AS.

(12)The interception ASupdates the media description in Response 183,and changes the destination as itself.

(13)The interception ASforwards the updated Response 183 to the S-CSCF.

(14)The S-CSCFforwards Response 183 to user A.

(15)The interception ASreports signaling messages to the interception center.

(16)User A exchanges signaling messages with user B via the S-CSCF and the interception ASto set up a call.

(17)User A sends media to the interception AS.

(18)The interception ASforwards media to the interception center.

(19)The interception ASforwards the media to user B.

(20)User Bsends the media to the interception AS.

(21)The interception ASforwards the media to the interception center.

(22)The interception ASforwards the media to user A.In this way,the interception of user A's conversation is completed.This procedure is designed for user A-originated calls.For user A-terminated calls,the interception procedure is similar.

3.3 Comparison between Two Interception Modes

Distributed interception is a traditional solution.Its advantage is that many interception points can be set,allowing relatively comprehensive information to be collected.Its disadvantage is the interception points are distributed.In IMS,there is a large number of access networks,P-CSCFs and S-CSCFs,so the interception is difficult to implement and the networking is restricted.Moreover,because the signaling and media streams of all users are collected by the LICF,the network's fault points and the risk of congestion increase.

▲Figure 2. Interception implementation procedure.

The centralized interception adopts IMSnetwork architecture and has the following advantages;

(1)The centralized arrangement of interception devices effectively solves the engineering and management problems of interception devices,which always perplex distributed interception.

(2)By modifying the iFC,the centralized interception method ensures the interception device to collect specific user's signaling and media for interception.As a result,the load of the interception device is considerably decreased and congestion is unlikely to occur.

(3)The centralized interception method treats interception as one application of IMS.All interception operations follow the processing rules of IMSand they have no impact on existing IMS,thus ensuring the feasibility and backward compatibility of this method.

(4)The triggering of interception with iFC will not affect the normal call process even if the interception ASdoes not work.Therefore,the robustness of the entire system is enhanced.

4 Conclusion

IMSis a new network architecture.Taking advantage of the scalability of IMSfor various applications has become an important research topic.The interception solution discussed in this paper not only realizes the interception within existing IMSnetwork,but also provides useful reference for implementation of other applications in IMS.

主站蜘蛛池模板: 亚洲精品无码抽插日韩| 国产成人高清在线精品| 婷婷成人综合| 亚洲 日韩 激情 无码 中出| 亚洲有码在线播放| 91香蕉国产亚洲一二三区| 四虎永久在线精品影院| 亚洲成年人片| 91在线激情在线观看| 久久综合九九亚洲一区| 国产亚洲精久久久久久久91| 99色亚洲国产精品11p| 日本午夜三级| 精品国产欧美精品v| 在线观看免费国产| 日本伊人色综合网| 国产精品亚欧美一区二区三区 | 色婷婷在线播放| 欧美日韩中文国产va另类| 日韩国产无码一区| 欧美性精品不卡在线观看| 一级高清毛片免费a级高清毛片| 狠狠v日韩v欧美v| 国产福利免费视频| 中文字幕欧美日韩| 国产微拍精品| 亚洲永久色| 亚洲制服中文字幕一区二区| 国产精品福利一区二区久久| 久久伊伊香蕉综合精品| 狠狠综合久久| 亚洲精选高清无码| 成人精品亚洲| 最新国产成人剧情在线播放| 国产成人免费高清AⅤ| 激情综合激情| 国产欧美日韩视频一区二区三区| 九色综合伊人久久富二代| 久久综合伊人 六十路| 久久天天躁狠狠躁夜夜躁| 99er精品视频| 一级福利视频| 欧美爱爱网| 黄色国产在线| 国产精品成人AⅤ在线一二三四| 色婷婷丁香| 国产综合亚洲欧洲区精品无码| 99免费在线观看视频| 中文天堂在线视频| 国产激爽大片高清在线观看| 国产激情无码一区二区免费| 91成人在线免费视频| 高清乱码精品福利在线视频| 农村乱人伦一区二区| 97超级碰碰碰碰精品| 国产成人艳妇AA视频在线| 国产无码精品在线| 麻豆精品国产自产在线| 啪啪永久免费av| 91视频99| hezyo加勒比一区二区三区| 国产无码性爱一区二区三区| 自拍偷拍一区| 国产亚洲美日韩AV中文字幕无码成人| 亚洲综合色婷婷| 国产在线观看成人91| 中文字幕1区2区| 国产成人精品一区二区三区| 99热精品久久| 免费a级毛片18以上观看精品| 91在线高清视频| 99ri精品视频在线观看播放| 国产嫩草在线观看| 亚洲毛片网站| 色噜噜在线观看| 欧美激情第一欧美在线| 97综合久久| 国产一区二区福利| 日韩小视频在线播放| 99无码中文字幕视频| 成人午夜亚洲影视在线观看| 国产欧美另类|