ImageVerifierCode 换一换
格式:PDF , 页数:16 ,大小:439.95KB ,
资源ID:731826      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-731826.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI ETR 363-1997 Digital Cellular Telecommunications System Lawful Interception Requirements for GSM (GSM 10 20 Version 5 0 1)《数字蜂窝通信系统 GSM合法侦听的要求 GSM 10 20(版本5 0 1)》.pdf)为本站会员(inwarn120)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI ETR 363-1997 Digital Cellular Telecommunications System Lawful Interception Requirements for GSM (GSM 10 20 Version 5 0 1)《数字蜂窝通信系统 GSM合法侦听的要求 GSM 10 20(版本5 0 1)》.pdf

1、STD-ETSI ETR 3b3-ENGL 4997 3q00855 035872?7 Yb9 E ? ETSI ETR 363 January 1997 Source: ETSI TC-SMG Reference: DTR/SMG-1 O1 020Q ICs: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile communications (GSM) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS Digital cellular tel

2、ecommunications system; Lawful Interception requirements for GSM (GSM 10.20 version 5.0.1) ETSI European Telecommunications Standards Institute ETSI Secretariat Postal address: F-O6921 Sophia Antipolis CEDEX - FRANCE Office address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE X.400

3、: c=fr, a=atlas, p=etsi, s=secretariat - Internet: secretariatetsi.fr Tel.: +33 4 92 94 42 O0 - Fax: +33 4 93 65 47 16 Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. O Euro

4、pean Telecommunications Standards Institute 1997. All rights reserved. - STDSETSI ETR 3b3-ENGL 1797 W 3q00855 0358730 b8O Page 2 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Whilst every care has been taken in the preparation and publication of this document, errors in content, typographical or o

5、therwise, may occur. If you have comments concerning its accuracy, please write to “ETSI Editing and Committee Support Dept.“ at the address shown on the title page. Page 3 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Con tents Foreword . 5 Scope 7 References 7 Definitions and abbreviations 8 3.1

6、 Definitions 8 3.2 Abbreviations . 8 Telecom interception requirements . 9 4.1 Background 9 4.2 Background technical requirements 9 General technical requirements for legal interception in GSM/PCN networks 10 5.1 General principles 11 5.2 Capability . 11 5.3 Operation . 11 Summary of information pas

7、sed over the X-interface . 11 6.1 Intercept request, Set-up details for target (XI) . 11 6.2 Output (from PLMN to RF) . 12 6.2.1 X2, network related data . 12 6.2.2 X3, product (when requested) . 12 Interception mechanisms 12 Intercept Request Function (XI) 12 Interception output, product and networ

8、k related data 13 7.3 Delivery mechanisms . 13 Network Related Data (see subclause 6.2.1) 13 7.4.1 Security 14 Merging and processing of product and network related data . 14 7 .I 7.2 7.3.1 7.3.2 Product 13 7.4 Administration mechanism . 14 7.5 Annex A: Diagram of an example interception technical i

9、mplementation 15 History 16 STD.ETSI ETR 3b3-ENGL 1997 3400855 0358732 Y53 M Page 4 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Blank page Page 5 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Foreword This ETSI Technical Report (ETR) has been produced by the Special Mobile Group (SMG) Technica

10、l Committee of the European Telecommunications Standards Institute (ETSI). ETRs are informative documents resulting from ETSI studies which are not appropriate for European Telecommunication Standard (ETS) or Interim European Telecommunication Standard (I-ETS) status. An ETR may be used to publish m

11、aterial which is either of an informative nature, relating to the use or the application of ETSs or I-ETSs, or which is immature and not yet suitable for formal adoption as an ETS or an I-ETS. STD-ETSI ETR 3b3-ENGL 1997 3LiUU855 OL5873Li 22b Page 6 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Bla

12、nk page Page 7 ETR 363 (GSM 10.20 version 5.0.1): January i997 1 Scope This ETSI Technical Report (ETR) describes the interface requirements of a mechanism which will deliver intercept from GSM mobile stations, including both speech and data product. 2 References This ETR incorporates by dated and u

13、ndated reference, provisions from other publications. These normative references are cited at the appropriate places in the text and the publications are listed hereafter. For dated references, subsequent amendments to or revisions of any of these publications apply to this ETR only when incorporate

14、d in it by the amendment or revision. For undated references, the latest edition of the publication referred to applies. GSM O1 .O4 (ETR 100): “Digital cellular telecommunications system (Phase 2); Abbreviations and acronyms“. Pl GSM MOU Association document SG09, June 1995. 31 41 The European Union

15、 Council Resolution reference: “International Requirements for The Lawful Interception of Telecommunications“ (January 1995), (JA1-24-Rev 2, 81 97/2/95). ITU-T Recommendation G.711: “Pulse Code Modulation (PCM) of voice frequencies“. STD-ETSI ETR 3b3-ENGL 1777 M 31iUU855 O15873b UT7 Page 8 ETR 363 (

16、GSM 10.20 version 5.0.1): January 1997 3 Definitions and abbreviations 3.1 Definitions A-party: The originating party number. B-Party: The called party number. C-Party: A diverted-to party number. network related data: Data associated with a call, excluding the actual product such as speech or data.

17、 product: Data sent or received by a mobile user such as speech or fax or data. RF: Requesting Function; mechanism owned by an interception authority to Set-up and receive the interception product. Target: An MSISDN (or sometimes IMSI) which is to be made the subject of an interception. WAN: Wide Ar

18、ea Network, or interconnected LANs providing a computer data network between PLMN elements. 3.2 Abbreviations In addition to those mentioned below, abbreviations used in this report are listed in GSM 01.04. CGI FTAM GSM HLR IMEI IMSI ISDN LEA MOU MS MSC MSISDN PLMN PSTN RF SMG SMG-SG SMS ss ss7 UD1

19、WAN MOU-SG Cell Global Identity File Transfer Access and Management Global System for Mobile communications Home Location Register International Mobile station Equipment Identity International Mobile Subscriber Identity Integrated Services Digital Network Law Enforcement Agency Memorandum of Underst

20、anding The MOU Security Group Mobile Station Mobile-services Switching Centre Mobile Station International ISDN Number Public Lands Mobile Network Public Switched Telephone Network Requesting Function Special Mobile Group The ETSI TC SMG Security Group Short Message Service Supplementary Service Sig

21、nalling System No. 7 Unrestricted Digital Interface (64 kbiffs ISDN data) Wde Area Network STD-ETSI ETR 3b3-ENGL 3777 = 3400855 0358737 T35 Page 9 ETR 363 (GSM 10.20 version 5.0.1): January 1997 4 Telecom interception requirements 4.1 Bac kg round Previous MoU-SG specification SG09 has defined the i

22、nterception of GSM in general terms. This report will define the X-interface to the Public Lands Mobile Network (PLMN) to support interception. 4.2 Background technical requirements This report describes the interface to the PLMN, defined as the X-interface. The interface is illustrated in figure I.

23、 The X-interface is between the Requesting Function (RF) and the PLMN. It is divided into three logical parts: 1) The X1-interface is used to present commands to the PLMN, from an administration centre. This interface is part of the switch management capability, usually over an X.25 interface or WAN

24、. 2) The X2-interface receives “Network Related Data“ from the Mobile-services Switching Centre (MSC), in switch management or file output format, probably over an X.25 network or WAN. Alternatively, it may be sent in combination with the ISDN product in the X3-interface described below. 3) The X3-i

25、nterface receives “Product“ (mobile users speech and data) from the MSC. It is contained within one or more 64 kbitls channels. The objective of the X-interface is to allow a standard to be created so that a PLMN consisting of MSCs from different manufacturers may be combined. Although the X1-interf

26、ace commands may be slightly different for each manufacturer, it should be possible to create a single intelligent system to manage the interface at a low cost, capable of managing all different manufacturers implementations. Similarly, the outputs defined in the X2 and X3 parts of the X-interface s

27、hould be capable of processing by the same “Requesting Function“. STDmETSI ETR 3b3-ENGL 1777 W 3LI00855 0358738 971 Page IO ETR 363 (GSM 10.20 version 5.0.1): January 1997 5 General technical requirements for legal interception in GSMIPCN networks Figure 1 shows the general system for interception.

28、Technical interception is implemented within a PLMN by special functionality on network elements; primarily the MSCsNLRs and Home Location Registers (HLRs). Use of the function and delivery of the product from the target is defined by the X-interface. X-interface REQUESTING TARGET I MSISDN TECHNICAL

29、 INTERCEPTION INTERFACE NOTES: 1 : Paper or direct request 2: Electronic request 3a and 3b: Network related data 4a and 4b: Product, such as speech and mobile data Items 3 - roamers from other PLMNs may also be targets; - mobile originating, mobile terminating, and diversion or multiparty calls will

30、 be capable of interception; - location information. 5.3 Operation The interception function shall not alter the operation of a targets service or provide indication to any party involved in the call. Output product should be in “clear“ form - no GSM radio interface or PLMN generated radio interface

31、 encoding or encryption is present (the PLMN cannot remove subscriber encryption). The service should not alter the standard functions of GSM network elements. The product and network related data shall be delivered as near as possible to the time the call is made. 6 Summary of information passed ov

32、er the X-interface 6.1 Intercept request, Set-up details for target (XI) Data to be stored for target mobile station: - - MSISDN, or optionally the International Mobile Subscriber Identity (IMSI); Connection address for the Requesting Function (RF); - Type of output: - product or network related dat

33、a or both. STD-ETSI ETR 3b3-ENGL 1777 = 3400855 0358740 52T Page 12 ETR 363 (GSM 10.20 version 5.0.1): January 1997 6.2 Output (from PLMN to RF) 6.2.1 X2, network related data unique reference number for MSC call event; MSISDN, (and optionally IMSI, International Mobile station Equipment Identity (I

34、MEI); type of call (.e. originating or terminating); A-party number, B-party number; C-party (diversion or multiparty numbers); start time of call; finish time of call (or call duration); location information (Cell Global Identity (CGI); teleservice or bearer service used, Supplementary Service (SS)

35、 used; call completion message (giving call release reason). NOTE 1: The above list is a guide to the information which may be provided by the MSC, but not all the items will be available for every call type. NOTE2: Connected party numbers (A-, B- and C-party) may only be available for calls complet

36、ely contained within ISDN based networks. NOTE 3: Appropriate network related data should also be output from the MSC for unsuccessful call attempts. 6.2.2 X3, product (when requested) - Product: speech, user data, fax, or Short Message Service (SMS); NOTE: SMS text may be forwarded to the RF by mea

37、ns of the X2-interface mechanism. - Unique reference number for MSC call event. 7 Interception mechanisms 7.1 Intercept Request Function (XI) The following basic target administration functions are to be supported: ADD - - - - flag a target by MSISDN, or optionally IMSI; X2 delivery address, e.g. X.

38、25 or WAN address; X3 product delivery address, E.164 address; select network related data alone, or network related data and product. REMOVE - de-flag a target. SHOW - list one or more targeted MSISDNs. STD-ETSI ETR 3b3-ENGL 1997 3q00855 0158741 Ybb D Page 13 ETR 363 (GSM 10.20 version 5.0.1): Janu

39、ary 1997 7.2 Interception output, product and network related data The product of the target and connected parties will be additionally connected to an output port of the MSC (by means of a three party bridge for example) which routes the product to an RF, possibly via an optional mediation device.

40、The mediation device provides interface conversion (if necessary) between the PLMN X2- and X3-interfaces and the RF. Different RFs may require the same information. The mediation device may simultaneously provide multiple output of product and network related data regarding one MSISDN to more than o

41、ne RF. No information should be passed to the RF about which other RFs are using the information. Some types of call may require multiple links to the RF, for example Unrestricted Digital Interface (UDI) data services, and optionally in-band data (3.1 kHz) services. 7.3 Delivery mechanisms 7.3.1 Net

42、work Related Data (see subclause 6.2.1) There are two mechanisms proposed for delivery of network related data; these are: - - ISDN user to user signalling; or MSCHLR file format output, (via an X.25 network using File Transfer Access and Management (FTAM), or WAN). 7.3.2 Product The product should

43、be passed in ISDN format: .e. for voice according to ITU-T Recommendation G.711, A-law encoding in one or more 64 kbitls channels. For UD1 data the output is transparently transmitted in two 64 kbiffs channels. Product (speech and data) should be routed to the RF by E.164 address. SMS product, excep

44、tionally, will probably be transported according to the mechanism selected for network related data. Page 14 ETR 363 (GSM 10.20 version 5.0.1): January 1997 7.4 Administration mechanism A secure means of administrating the service by the PLMN operator and/or requesting function is necessary. This me

45、chanism should provide for the addition and removal of subscribers from the marked list by authorized personnel, and a show marked MSISDNs command. Access should be policed by appropriate authentication and audit procedures. 7.4.1 Security The intercept function must only be capable of being used by

46、 authorized personnel. Security functions should provide the following capability (to national requirements): - security administration to control nominated user access to the function; - secure data network arrangements between administration centre and MSCIHLR for the intercept function commands;

47、- security mechanisms to control access to the function should be provided at both the administration centre and MSC/HLR elements; - secure network arrangements between MSCIHLR and the RF to ensure that network related data and product only reach the appropriate authorities; - it should not be possi

48、ble for non authorized personnel to read the target list of MSISDNs; - an audit log of use of the intercept function (successful or failed should be maintained, accessible only to authorized users; - no indication whatsoever should be given to any PLMN operative (except authorized personnel) or the

49、target or customer that the intercept function has been invoked on the target. 7.5 Merging and processing of product and network related data This aspect of the service is not addressed by this report. It is a matter of discussion between relevant authorities and the PLMN operator as to responsibilities for the provision of the mediation device, and the means of handling product at the RF. STD-ETSI ETR 3b3-ENGL 1997 m 3400855 0358743 237 m Page 15 ETR 363 (GSM 10.20 version 5.0.1): January 1997 Annex A: Diagram of an example interception technical implementation Law enforce

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1