ImageVerifierCode 换一换
格式:PDF , 页数:124 ,大小:638.04KB ,
资源ID:730738      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-730738.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI ES 201 671-2007 Lawful Interception (LI) Handover interface for the lawful interception of telecommunications traffic (V3 1 1)《通信安全 通信业务流中合法侦听的切换接口(版本3 1 1)》.pdf)为本站会员(wealthynice100)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI ES 201 671-2007 Lawful Interception (LI) Handover interface for the lawful interception of telecommunications traffic (V3 1 1)《通信安全 通信业务流中合法侦听的切换接口(版本3 1 1)》.pdf

1、 ETSI ES 201 671 V3.1.1 (2007-05)ETSI Standard Lawful Interception (LI);Handover interface for the lawful interception oftelecommunications trafficETSI ETSI ES 201 671 V3.1.1 (2007-05) 2 Reference RES/LI-00037 Keywords data, handover, interface, Lawful Interception, security, speech ETSI 650 Route d

2、es Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded fro

3、m: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be

4、 the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available

5、at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyri

6、ght and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2007. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently be

7、ing registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI ES 201 671 V3.1.1 (2007-05) 3 Contents Intellectual Property Rights8 Foreword.8 Introduction 8 1 Scope 9 2 References 9 3

8、 Definitions and abbreviations.13 3.1 Definitions13 3.2 Abbreviations .16 4 General requirements .18 4.1 Basic principles for the Handover Interface .18 4.2 Legal requirements.18 4.3 Functional requirements .19 5 Overview of Handover Interface19 5.1 Handover Interface port 1 (HI1).20 5.1.1 Manual in

9、terface .21 5.1.2 Electronic interface.21 5.2 Handover Interface port 2 (HI2).21 5.3 Handover Interface port 3 (HI3).21 6 Specific identifiers for LI .21 6.1 Lawful Interception IDentifier (LIID)22 6.2 Communication IDentifier (CID) .22 6.2.1 Network IDentifier (NID).22 6.2.2 Communication Identity

10、Number (CIN) - optional 23 7 HI1: Interface port for administrative information.23 7.1 Information for the activation of lawful interception .23 7.2 LI notifications towards the LEMF 24 8 HI2: Interface port for Intercept Related Information24 8.1 Data transmission protocols .24 8.1.1 Application fo

11、r IRI (HI2 information) 25 8.2 Types of IRI records.25 9 HI3: Interface port for Content of Communication25 10 Performance and quality.26 10.1 Timing 26 10.2 Quality26 11 Security aspects26 11.1 Security properties26 11.2 Security mechanisms27 12 Quantitative aspects27 Annex A (normative): Circuit s

12、witched network handover.28 A.1 Specific identifiers for LI .28 A.1.1 CC Link IDentifier (CCLID)28 A.1.2 Circuit switched LI correlation between CC and IRI .28 A.1.3 Usage of Identifiers 28 A.2 HI1: interface port for administrative state 29 A.3 HI2: interface port for IRI 29 A.3.1 Definition of Int

13、ercept Related Information (IRI) 29 ETSI ETSI ES 201 671 V3.1.1 (2007-05) 4 A.3.2 Structure of IRI records30 A.3.2.1 Control information for HI230 A.3.2.2 Basic call information.30 A.3.2.3 Information on Supplementary Services, related to a call in progress31 A.3.2.4 Information on non-call related

14、Supplementary Services .31 A.3.3 Selection of parameters for IRI records32 A.3.4 Coding of parameters in IRI records 35 A.3.5 Information content of the IRI record types .35 A.4 HI3: interface port for Content of Communication35 A.4.1 Delivery of Content of Communication (CC) 35 A.4.1.1 Delivery of

15、TETRA CC over circuit switched handover networks 36 A.4.2 Delivery of packetized Content of Communication (CC) (general).36 A.4.2.1 Delivery of TETRA CC over packet switched handover networks 37 A.4.3 Control information for circuit switched Content of Communication (CC).37 A.4.4 Exception handling.

16、38 A.4.4.1 Failure of CC links38 A.4.4.2 Fault reporting 38 A.4.5 Security requirements at the interface port HI338 A.4.5.1 LI access verification39 A.4.5.2 Access protection39 A.4.5.3 Authentication.39 A.5 LI procedures for circuit switched supplementary services .39 A.5.1 General .39 A.5.2 CC link

17、 Impact .42 A.5.3 IRI impact, general principle for sending IRI records42 A.5.4 Multi party calls - general principles, options A, B42 A.5.4.1 CC links for active and non-active calls (option A)43 A.5.4.2 Reuse of CC links for active calls (option B) .43 A.5.5 Subscriber Controlled Input (SCI): Acti

18、vation/Deactivation/Interrogation of services .44 A.6 Detailed procedures for circuit switched supplementary services44 A.6.1 Advice of Charge services (AOC)44 A.6.2 Call Waiting (CW) .44 A.6.2.1 Call Waiting (CW) at target: CC links44 A.6.2.2 Call Waiting: IRI records44 A.6.2.2.1 Target is served u

19、ser44 A.6.2.2.2 Other party is served user44 A.6.3 Call Hold/Retrieve45 A.6.3.1 CC links for active and non-active calls (option A)45 A.6.3.2 Reuse of CC links for active calls (option B) .45 A.6.3.3 IRI records 45 A.6.3.3.1 Invocation of Call Hold or Retrieve by target.45 A.6.3.3.2 Invocation of Ho

20、ld or Retrieve by other parties45 A.6.4 Explicit Call Transfer (ECT)45 A.6.4.1 Explicit Call Transfer (ECT), CC link45 A.6.4.2 Explicit Call Transfer (ECT), IRI records 45 A.6.5 Calling Line Identification Presentation (CLIP) (IRI Records)46 A.6.5.1 Call originated by target (other party is served u

21、ser)46 A.6.5.2 Call terminated at target (target is served user) 46 A.6.6 Calling Line Identification Restriction (CLIR) 46 A.6.7 COnnected Line identification Presentation (COLP) .46 A.6.7.1 Call terminated at target (other party is served user) 46 A.6.7.2 Call originated by target (target is serve

22、d user) 46 A.6.8 COnnected Line identification Restriction (COLR).46 A.6.9 Closed User Group (CUG) .46 A.6.10 Completion of Call to Busy Subscriber (CCBS) 46 A.6.11 CONFerence call, add-on (CONF).47 A.6.11.1 CONFerence calls, add on: CC links 47 A.6.11.2 Conference calls: IRI records47 A.6.12 Three

23、Party Service (Conference) 47 A.6.12.1 CC links 47 ETSI ETSI ES 201 671 V3.1.1 (2007-05) 5 A.6.12.2 Three Party Service, IRI Records .47 A.6.13 Meet-Me Conference (MMC) 47 A.6.14 Direct Dialling In (DDI).47 A.6.15 Multiple Subscriber Number (MSN)47 A.6.16 DIVersion services (DIV) 48 A.6.16.1 Call Di

24、version by target48 A.6.16.1.1 Call Diversion by target, CC links 48 A.6.16.1.2 Call Diversion by target, IRI records 48 A.6.16.2 Forwarded call terminated at target 48 A.6.16.3 Call from target forwarded .49 A.6.17 Variants of call diversion services49 A.6.18 Void49 A.6.19 Malicious Call IDentifica

25、tion (MCID).49 A.6.20 SUBaddressing (SUB)49 A.6.21 Terminal Portability (TP) .49 A.6.21.1 CC links 49 A.6.21.2 IRI records 49 A.6.21.2.1 Invocation of Terminal Portability by target.49 A.6.21.2.2 Invocation of Terminal Portability by other parties 49 A.6.22 User-to-User Signalling (UUS) 49 A.6.23 Ab

26、breviated Address (AA).49 A.6.24 Fixed Destination Call (FDC) 50 A.6.25 Alarm Call (AC)/Wake-Up Service (WUS).50 A.6.26 Incoming Call Barring (ICB)50 A.6.27 Outgoing Call Barring (OCB) 50 A.6.28 Completion of Calls on No Reply (CCNR)50 A.6.29 Reverse charging 50 A.6.30 Line hunting .50 A.6.31 Messag

27、e Wait Indication (MWI)50 A.6.32 Name display50 A.6.33 Tones, announcements .51 A.7 Void51 A.8 GSM circuit switched technology annex51 A.8.1 Functional architecture .51 A.8.2 Correlation of CC and IRI (see clause 6) .52 A.8.3 HI3 (delivery of CC) 52 A.8.4 HI2 (delivery of IRI) 52 A.9 TETRA technolog

28、y annex53 A.10 NGN PSTN/ISDN emulation and simulation services technology annex .54 A.10.1 Functional architecture .54 A.10.2 Correlation54 A.10.3 HI254 A.10.4 HI354 Annex B (normative): Packet switched network handover55 B.1 Specific identifiers for LI .55 B.2 HI1: interface port for administrative

29、 state 55 B.3 HI2: interface port for IRI 55 B.3.1 Definition of Interception Related Information for packet switched55 B.3.2 Exception handling.55 B.3.3 Security aspects 55 B.4 HI3: interface port for Content of Communication (CC).56 B.5 GPRS technology annex.56 B.5.1 Functional architecture .56 B.

30、5.2 Correlation57 B.5.2.1 Correlation of the present document IDs to GSM IDs57 ETSI ETSI ES 201 671 V3.1.1 (2007-05) 6 B.5.2.2 GPRS LI correlation between CC and IRI57 B.5.3 HI2 (delivery of IRI) 57 B.5.4 HI3 (Delivery of CC) .58 Annex C (normative): HI2 Delivery mechanisms and procedures59 C.1 ROSE

31、59 C.1.1 Architecture59 C.1.2 ASE_HI procedures59 C.1.2.1 Sending part59 C.1.2.2 Receiving part.61 C.1.2.3 Data link management 61 C.1.2.3.1 Data link establishment .61 C.1.2.3.2 Data link release62 C.1.2.4 Handling of unrecognized fields and parameters62 C.1.3 Void62 C.2 FTP.62 C.2.1 Introduction 6

32、2 C.2.2 Usage of the FTP63 C.2.3 Profiles .64 C.2.4 File content.66 C.2.5 Exceptional procedures 66 C.2.6 Other considerations.67 Annex D (normative): Structure of data at the Handover Interface.68 D.1 Syntax definitions.68 D.2 Object tree 69 D.3 HI management operation 70 D.4 LI management notifica

33、tion .71 D.5 Intercept related information (HI2 PS and CS) 73 D.6 User data packet transfer (HI3 CS) 87 D.7 TETRA data transfer (HI3 interface) .88 D.8 Definition of the UUS1 content associated to the CC link.88 D.9 Content of Communication (HI3 GPRS) .89 Annex E (informative): Use of subaddress and

34、 calling party number to carry correlation information.91 E.1 Introduction 91 E.2 Subaddress options.91 E.3 Subaddress coding91 E.3.1 BCD values 91 E.3.2 Field order and layout.92 E.4 Field coding97 E.4.1 Direction.97 E.4.2 Coding of the Calling Party Number98 E.5 Length of fields 98 Annex F (inform

35、ative): GPRS HI3 Interface.99 F.1 Functional architecture.99 F.2 Correlation99 F.3 HI3 Delivery Content of Communication (CC) .100 ETSI ETSI ES 201 671 V3.1.1 (2007-05) 7 F.3.1 GPRS LI correlation header .100 F.3.1.1 Introduction.100 F.3.1.2 Definition of GLIC header100 F.3.1.3 Exceptional procedure

36、 102 F.3.1.4 Other considerations .102 F.3.2 FTP.102 F.3.2.1 Introduction.102 F.3.2.2 Usage of the FTP 102 F.3.2.3 Profiles104 F.3.2.4 Exceptional procedures.106 F.3.2.5 CC contents for FTP .106 F.3.2.5.1 Fields.106 F.3.2.5.2 Information Element syntax108 F.3.2.6 Other considerations .110 Annex G (i

37、nformative): LEMF requirements - handling of unrecognized fields and parameters111 Annex H (informative): IP Multimedia Subsystem (IMS) handover.112 H.1 Specific identifiers for LI .112 H.1.1 Lawful interception identifier.113 H.1.2 Network identifier 113 H.1.3 Correlation number.113 H.1.4 IRI for I

38、MS.114 H.1.4.1 Events and information.115 H.1.5 Correlation indications of IMS IRI with GSN CC at the LEMF 116 Annex I (informative): Latest ASN.1 module versions 118 Annex J (informative): Bibliography.119 Annex K (informative): Change Request history.121 History 124 ETSI ETSI ES 201 671 V3.1.1 (20

39、07-05) 8 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual

40、 Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation

41、, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This ETSI Standard (ES) has b

42、een produced by ETSI Technical Committee Lawful Interception (LI). Introduction References within the main body of the present document are made if applicable to the 3GPP specification number with in square brackets the reference number as listed in clause 2. In clause 2 “References“ the correspondi

43、ng ETSI specification number is indicated with a reference to the 3GPP specification number. 3GPP specifications are available faster than the equivalent ETSI specifications. ETSI ETSI ES 201 671 V3.1.1 (2007-05) 9 1 Scope The present document is step 3 of a three-step approach to describe a generic

44、 Handover Interface (HI) for the provision of lawful interception from a Network Operator, an Access Provider or a Service Provider (NWO/AP/SvP) to the Law Enforcement Agencies (LEAs). The provision of lawful interception is a requirement of national law, which is usually mandatory for the operation

45、 of any telecommunication service. Step 1 contains the requirements for lawful interception from a users (LEAs) point of view and is published in TS 101 331 1. Step 2 describes the derived network functions and the general architecture (or functional model) and is published in ES 201 158 2. The pres

46、ent document specifies: the generic flow of information as well as the procedures and information elements, which are applicable to any future telecommunication network or service; the network/service specific protocols relating to the provision of lawful interception at the Handover Interface (HI),

47、 for the following networks/services: - switched circuit; and - packet data. The technologies covered in the present document are: GSM, TETRA, GPRS, ISDN, PSTN, fixed NGN (including PSTN/ISDN emulation) and fixed IMS PSTN simulation. NOTE: As new networks and/or services are developed, the present d

48、ocument will be expanded as the relevant standards become available. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or edition number o

49、r version number) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE 1: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. NOTE 2: The numbering of the references is kept in line with the numbering as used in version 1.1.1 and version 2.1.1 of ES 201 671. 1

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1