ImageVerifierCode 换一换
格式:PDF , 页数:39 ,大小:1.56MB ,
资源ID:735651      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-735651.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 102 053-2002 Telecommunications Security Lawful Interception (LI) Notes on ISDN Lawful Interception Functionality (V1 1 1)《通信安全 合法侦听(LI) ISDN的合法侦听功能说明(版本1 1 1)》.pdf)为本站会员(bowdiet140)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 102 053-2002 Telecommunications Security Lawful Interception (LI) Notes on ISDN Lawful Interception Functionality (V1 1 1)《通信安全 合法侦听(LI) ISDN的合法侦听功能说明(版本1 1 1)》.pdf

1、ETSI TR 102 053 1.1.1 (2002-03) Technical Repor Telecom m u ni cat ions secu ri ty ; Lawful Interception (LI); Notes on ISDN lawful interception functionality 2 ETSI TR 102 053 VI .I .I (2002-03) Reference DTR/SEC-003016 Keywords ISDN, lawful interception, security ETSI 650 Route des Lucioles F-O692

2、1 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 O0 Fax: +33 4 93 65 47 16 Siret No 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-prfecture de Grasse (06) No 7803/88 Important notice Individual copies of the present document can be downloaded from: http:l/w.etsi

3、 .orq The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on

4、 ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at 3 If you find

5、 errors in the present document, send your comment to: Cori vriaht Notifica tion No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. O European Telecommunications Standards Institute 2002. All rights r

6、eserved. ETSI 3 ETSI TR 102 053 VI . 1 . 1 (2002-03) Contents Intellectual Property Rights 5 Foreword . 5 1 Scope 6 2 References 6 3 Definitions and abbreviations . 6 Definitions 6 3.1 3.2 Abbreviations . 6 4 Introduction 6 5 Typical message sequence diagrams for IR1 7 5.1 5.2 5.3 5.4 5.4.1 5.4.2 5.

7、4.3 5.4.4 5.4.5 5.5 5.5.1 5.5.2 5.5.3 5.6 5.6.1 5.7 5.7.1 5.7.2 5.7.3 5.8 5.8.1 5.8.2 5.9 5.9.1 5.9.2 5.9.3 5.9.4 5.9.5 5.10 5.10.1 5.10.2 5.10.3 5.10.4 5.10.5 5.10.6 5.10.7 5.10.8 5.10.9 5.11 5.12 5.13 5.13.1 5.13.2 5.14 General remarks . 7 Remarks to tables . 8 Remarks to scenarios 8 Originating t

8、arget. basic call . 9 Initial LI procedures 9 Set up of an additional call leg 11 IRI-CONTINUE records (general) . 11 Answer by other party . 11 Call release (originating or terminating target) . 12 Temnating target, basic call . 14 Initial LI procedure . 14 Answer by target . 16 Call release 16 Ori

9、ginating target call, invocation of LI relevant services . 16 Call forwarded by called party 16 18 18 21 21 . Terminating target call. invocation of LI relevant services Terminating call at target is a forwarded call Call forwarded by target 18 Call HOLD by target 22 Call RETRIEVE by targ 22 Target

10、actions during a call in progres Three Party Service (3PTY) 23 Target establishes Three 23 24 Target: Private communication with Active-Held p 24 Release of 3 PTY conference by Active-Held party . 25 Release of 3 PTY conference by Active-Idle party 25 Add on conference (CONF) . 25 Mapping of PartyId

11、ConferenceId to Communication Identifiers 26 Beginning a conference from the Idle call state 26 Beginning a conference from the Active call state . 27 Adding a remote user 28 Splitting a remote user 29 Further actions during a conference 30 Target clears the conference . 31 Option B (CC link only fo

12、r active call) . 31 Add on conference using other protocols . 31 Target exchange receives notification related to other party 32 Service activation (not call related) 32 Service activatiodinvocation during a call 32 ISDN accesses 32 Analogue accesses 33 Unsuccessful calls from target (originating),

13、IRI-BEGIN record sent . 33 ETSI 4 ETSI TR 102 053 VI . 1 . 1 (2002-03) 5.15 6 State model for an ISDN (overview description for CC link and IR1 delivery) . 35 Annex A: Bibliography 38 Unsuccessful calls frodto target. IRI-BEGIN record not sent 34 History 39 ETSI 5 ETSI TR 102 053 VI .I .I (2002-03)

14、Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR O00 314: “Intellectual Property

15、 Rights (7PRs); Essential, orpotentially Essential, IPRs notlJied to ETSI in respect ofETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (5). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried o

16、ut by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR O00 3 14 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee

17、 Security (SEC). ETSI 6 ETSI TR 102 053 VI .I .I (2002-03) 1 Scope The present document republishes information previously available in ES 20 1 671 11 version 1.1.1, which is considered to be valuable, but which it was not appropriate to retain in future versions of ES 20 1 67 1 i. The present docum

18、ent gives detailed guidance on network functionality, beyond that provided in i, on lawful interception as it applies to an ISDN. The handover interface remains as specified in i. The material is expected to be of particular use to: - manufacturers; - network operators; - Law Enforcement Agencies; -

19、 others who are concerned with the specification and implementation of lawful interception as it concerns an ISDN. 2 Re fe re nces For the purposes of this Technical Report (TR) the following references apply: il ETSI ES 201 671 (V2.1.1): “Telecommunications security; Lawful Interception (LI); Hando

20、ver interface for the lawful interception of telecommunications traffic“. 3 Definitions and abbreviations 3.1 De fi nit ions For the purposes of the present document, the terms and definitions given in ES 201 671 i apply. 3.2 Abbreviations For the purposes of the present document, the abbreviations

21、defiied in ES 20 1 67 1 11 apply. 4 I n t rod uct ion The present document supplements ES 201 671 i in its application to an ISDN. ES 201 671 i describes H12: IR1 for circuit switching, H13: CC for circuit switching, general procedures for circuit switched supplementary services and detailed procedu

22、res for circuit switched supplementary services in the annex “Circuit switched handover“. ETSI 7 ETSI TR 102 053 VI .I .I (2002-03) 5 Typical message sequence diagrams for IR1 5.1 General remarks The tables and message sequence diagrams (scenarios) of this clause are typical examples showing which p

23、arameters shall be included in the IRI records, and when the records shall be sent out to the LEA, for different call phases, call configurations and the invocation of supplementary services. The purpose of this clause is to supplement and clarisl the procedures and the use of parameters which are s

24、pecified in the main body and the normative annexes of ES 201 671 i. These normative parts have precedence in case of ambiguities. A general principle for handling complex call configurations is to break down the scenarios for LI related tasks into several sub-scenarios, which are ideally identical

25、for parts of basic calls or other “standard“ call situations. This reduces significantly the complexity of specisling and realizing the LI related tasks. As a consequence, the scenarios below contain in many cases just a remark to another scenario with the applicable sequence, see example below. EXA

26、MPLE: Call Forwarding on No Reply (CFNR) is active for a target (party B). 1) An incoming call is, after a time-out, released at the targets access, but forwarded by the exchange. The sequence up to the release is handled similarly to a call released by B during ringing. 2) The following set up of t

27、he forwarded call to a party C is handled in the same way as for immediate forwarding, for example CFU. Both transactions can be treated independently of each other. A new specific sequence for CFNR is not needed. The tables and scenarios of this clause contain several typical cases. They do not cov

28、er all possible combinations, and are structured into clauses as follows: Basic calls 5.4 Originating target, basic call 5.5 Terminating target, basic call Call with ISDN supplementary services being invoked 5.6 5.7 5.8 5.9 Three Party Service (3PTY) 5.1 O Add on conference (CONF) 5.11 Target exchan

29、ge receives notification related to other party Originating target call, invocation of LI relevant services Terminating target call, invocation of LI relevant services Target actions during a call in progress Subscriber Controlled Input (SCI) 5.12 5.13 Service activation (not call related) Service a

30、ctivatiodinvocation during a call Unsuccessful calls 5.14 5.15 Unsuccessful calls from target (originating), IRI-BEGIN record sent Unsuccessful calls frodto target, IRI-BEGIN record not sent ETSI 8 ETSI TR 102 053 VI .I .I (2002-03) 5.2 Remarks to tables Within the tables, the parameters of an IR1 r

31、ecord which are significant for the specific case are indicated. They depend, except for the mandatory parameters, of the type of a target call. The order of the IR1 parameters is not fixed. The complete set of parameters, which may be part of an IR1 record, is described in ES 201 671 i in annex A “

32、Circuit switched network handover“. The parameter notation uses the ASN.l definitions of ES 201 671 i. Unless otherwise stated, the tables are applicable to all kinds of originating or terminating accesses, such as ISDN and analogue subscribers. Restrictions or differences may be mentioned in the co

33、lumn “remarks“ or within additional text. Mapping of parameters originated from signalling systems other than DSSl or ISUP shall follow existing interworking specifications. Only parameters and signals which are available from the standard signalling procedures shall be included. No additional proce

34、dures need be used for LI to obtain parameters which are not available by default. For example, no request for a missing CLI need be made, even if the signalling system would allow it. Regarding the accuracy of the time stamp value of a record, it may be determined at any point in time during the pe

35、riod between the detection of an event and the sending of the related record. 5.3 Remarks to scenarios The included scenarios are examples. They show successful LI invocations within a local exchange. Exceptional cases are not included. In case of ambiguities, the text of ES 201 671 i shall have pri

36、ority. The indicated call handling messages are, in general, not based on a specific protocol. However, in several cases protocol specific information needs to be mentioned. In these cases, the DSSl functional access protocol is used, because it is a kind of superset standard of protocol features. W

37、ithin the figures such cases are indicated by using DSSl protocol message names in capital letters. Message sequences for other protocols, such as for analogue access, should be derived from the specified sequences. The scenarios do not show all signalling protocol messages. The emphasis is on those

38、 messages which are significant for, or related to, IRI records and CC link events. The IR1 record parameters which are indicated as additional information in the scenarios are limited to significant ones for a given case. For example, parameters which are mandatory such as the LIID, data and time,

39、etc. are not explicitly mentioned. The parameter names use logical names, as described in ES 201 671 i in annex A “Circuit switched network handover“, instead of the exact ASN. 1 notation. It is not required that identical sequences result for the same actions of a target or another party. These seq

40、uences may depend on the actual access or network protocols, and the call configuration, for example purely local calls, or calls via other exchanges. The master configuration chosen for decisions as to which parameters ought to be included in IRI records is transit call switching using ISDN user pa

41、rt signalling. This means, for example, that the information which can be provided by such calls shall also be available in case of purely local calls. As described above, the individual IRI records, which carry certain information, may vary. As a general rule, intercept related information is trans

42、mitted to the LEMF within an IR1 record when it first becomes available. In the scenarios, identical parameters are not repeated in succeeding records, unless their content or value has changed. However, an implementation may decide to repeat information which has already been sent, for example in o

43、rder to avoid the need for a memory of previously sent parameters. With respect to the CC links in case of multi party calls, the option “CC links for active and non-active calls“ is generally shown (option A). In general, the scenario figures contain one or more pictures depicting the actual config

44、uration of the target and the other party, or parties, within a call and the targets call state. ETSI 9 ETSI TR 102 053 VI .I .I (2002-03) Functional entities used within the scenarios: Target terminal: Equipment of the interception subject, which originates or terminates an intercepted call. Orig./

45、tem. SF-T: Switching function of the target, containing the IIF; within these examples, the SF-T is assumed to be a fixed ISDN network local exchange. Orig./tem. SF-P: Switching function of the other party; within these examples, the SF-P is assumed to be a fixed ISDN network local exchange. Other p

46、arty: Equipment of the other party(ies), which originates or terminates a call, in which the target is involved. LEMF HI2 (IRI): LEMF port, receiving IRI. LEMF HI3 (CC): NOTE: LEMF port, receiving the content of communication (CC links). In general an incoming message to any functional entity causes

47、 one or more outgoing messages. In case of several outgoing messages, the order of sending them is purely implementation dependent. The figures do not intend to spec a fixed sequence. 5.4 Originating target, basic call This clause concentrates on the description of basic calls, originated by the tar

48、get. However, the IRI record tables partly depict parameters which can also be used in conjunction with the invocation of supplementary services. 5.4.1 Initial LI procedures This clause includes the procedure until the point in time when the local exchange of the target (SF-T) sends an IRI-BEGIN rec

49、ord, and sets up a CC link. Corresponding transition in state model: Begin, CC Zinkset up (the state model shows the special case of en-bloc signalling). The IRI-BEGIN record constitutes the first record of an originating or terminating call. NOTE: The exact point of sending the IRI-BEGIN record may depend on national regulations, and on the implementation of the IIF. For example, it may be sent immediately when connecting proceed indication (dial tone) or only when starting routing within the SF-T. Irrespective of the point in time of sending the IRI-BEGI

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1