Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing legal monitoring in nextgeneration network

A lawful interception, next-generation technology, applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problems of unable to send media streams, no collection scheme, and unable to realize NGN user monitoring.

Inactive Publication Date: 2007-07-25
HUAWEI TECH CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the 3G GSN in the IMS network is not the network entity involved when the user accesses the NGN through the fixed network, that is to say, when the user accesses the NGN from the fixed network, the transmission of the user's media stream will not pass through the 3G GSN. 3G GSN cannot send media streams of users accessing NGN from fixed network to monitoring center
However, for users accessing from a fixed network, there is currently no other legal collection solution for monitoring media streams.
[0005] It can be seen that in the current NGN network, it is impossible to monitor the users accessing the NGN from the fixed network, which greatly limits the application scope of the legal interception service and reduces the business service quality of the NGN network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing legal monitoring in nextgeneration network
  • Method and system for realizing legal monitoring in nextgeneration network
  • Method and system for realizing legal monitoring in nextgeneration network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] Fig. 3 is a flowchart of Embodiment 1 of the present invention. Referring to Figure 2A1 and Figure 3, in Embodiment 1, the ADMF entity on the law enforcement agency side is used as the monitoring information providing entity described in the present invention, and the BGF entity is used as the monitoring control network element as an example. In the NGN network, this implementation Example The process of implementing lawful interception for users accessing from a fixed network includes the following steps:

[0118] Step 301: Connect the BGF entity in the NGN network with the DF3 entity on the law enforcement agency side through the X3 interface in advance.

[0119] Step 302: Connect the ADMF entity on the law enforcement agency side with the BGF entity in advance through the existing X1_1 interface.

[0120] Step 303: When an interception object needs to be intercepted, the ADMF entity on the law enforcement agency side directly sends the interception data carrying the...

Embodiment 2

[0150] Fig. 4 is a flowchart of Embodiment 2 of the present invention. Referring to Figure 2B and Figure 4, in Embodiment 2, the ADMF entity is used as the monitoring information providing entity described in the present invention, but the BGF entity is not used as the monitoring control network element as an example. In the NGN network, the present invention aims at The process for users accessing the network to implement lawful interception includes the following steps:

[0151] Step 401: Connect the BGF entity in the NGN network with the DF3 entity on the law enforcement agency side through the X3 interface in advance.

[0152] Step 402: When an interception object needs to be intercepted, the ADMF entity on the law enforcement agency side sends the interception data carrying the interception object identifier to the existing interception control network element through the X1_1 interface.

[0153] Here, the P-CSCF entity, the S-CSCF entity, and the LI-AS as the intercepti...

Embodiment 3

[0164] In this embodiment 3, the interception control network element in the NGN network is used as the interception information providing entity in the present invention, and the interception control network element triggers the BGF entity to copy the media stream of the interception object by carrying the interception data in the message .

[0165] Fig. 5 is a flow chart of Embodiment 3 of the present invention. Referring to Fig. 2C and Fig. 5, for the convenience of description, take the lawful interception application server (LI-AS) in the NGN network as the interception control network element, and carry the interception data in the message to trigger the BGF entity to copy the media stream of the interception object as an example In this embodiment, the process of implementing lawful interception for users accessing from a fixed network includes the following steps:

[0166] Step 501: Connect the BGF entity in the NGN network with the DF3 entity on the law enforcement a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The system includes 3-thannel delivery functional entity (3TDFE), entity of providing monitored information (EPMI), and border gateway functional entity (BGFE). The method includes steps: connecting BGFE in next generation network to 3TDFE at law enforcement agency side; EPMI sends information of monitored object to BGFE; based on received information of monitored object, BGFE sends media stream of monitored object to 3TDFE. In the next generation network, the invention is capable of carrying out legal monitoring for users accesses from fixed network. The invention expands application range of legal monitoring operation, so as to raise quality of service of operation in next generation network.

Description

technical field [0001] The invention relates to interception technology, in particular to a method and system for realizing legal interception for users accessing from a fixed network in the next generation network (NGN). Background technique [0002] Lawful interception refers to law enforcement agencies (LEA) that are approved by the corresponding authorized agencies to monitor public communication network communication services in accordance with relevant national laws and public communication network industry norms. The basic implementation process of legal interception is as follows: the administrative function (ADMF) entity of legal interception on the law enforcement agency side sends the interception data to the interception control network element in the communication network through the data interface X1_1; after receiving the interception data, the interception control network element The object monitors. When the activity of the monitored object is monitored, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
CPCH04L65/1083H04L63/30H04M3/2281H04L65/1026H04L29/06027H04L63/306H04L65/1101
Inventor 郑波
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products