1、 ETSI TR 102 503 V1.9.1 (2015-11) Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and Retained data handling Specifications TECHNICAL REPORT ETSI ETSI TR 102 503 V1.9.1 (2015-11) 2 Reference RTR/LI-00130 Keywords ASN.1, object identifier ETSI 650 Route des Lucioles F-06921
2、Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search Th
3、e present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such
4、 versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on
5、the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part
6、 may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoi
7、ng restriction extend to reproduction in all media. European Telecommunications Standards Institute 2015. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the ben
8、efit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 102 503 V1.9.1 (2015-11) 3 Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4g31 Scope 5g32 References 5g32.1 Norm
9、ative references . 5g32.2 Informative references 5g33 Definitions and abbreviations . 6g33.1 Definitions 6g33.2 Abbreviations . 6g34 Structure of the ETSI domain . 7g34.1 Tree structure 7g34.2 Description of the ETSI domain . 7g3Annex A: Change Request history 18g3Annex B: Bibliography 20g3History 2
10、1g3ETSI ETSI TR 102 503 V1.9.1 (2015-11) 4 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
11、 in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy
12、, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Techni
13、cal Report (TR) has been produced by ETSI Technical Committee Lawful Interception (LI). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI
14、 Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI TR 102 503 V1.9.1 (2015-11) 5 1 Scope The present document gives an overview over the relevant Object IDentifiers (OID) used in L
15、awful Interception and Retained data handling specifications of ETSI and other specifications from ITU-T and ISO. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references,
16、 only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any
17、 hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. Not applicable. 2.2 Informative references References are either specific (identifi
18、ed by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. NOTE: While any hyperlinks included in this claus
19、e were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 Void. i.2 ETSI ES 201 671: “Lawful Intercep
20、tion (LI); Handover interface for the lawful interception of telecommunications traffic“. i.3 ETSI TS 101 671: “Lawful Interception (LI); Handover Interface for the lawful interception of telecommunications traffic“. NOTE: Periodically ETSI TS 101 671 is published as ETSI ES 201 671. A reference to
21、the latest version of the TS as above reflects the latest stable content from ETSI/TC LI. i.4 ETSI TS 133 108: “Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Handover interface for Lawful Interception (LI) (3GPP TS 33.108)“. i.5 ETSI TS 102 232: “Lawful Interception (LI); Hand
22、over Interface and Service-Specific Details (SSD) for IP delivery“. NOTE: ETSI TS 102 232 is replaced by ETSI TS 102 232-1 i.13. i.6 ETSI TS 102 233: “Lawful Interception (LI); Service specific details for E-mail services“. NOTE: ETSI TS 102 233 is replaced ETSI TS 102 232-2 i.14. i.7 ETSI TS 102 23
23、4: “Lawful Interception (LI); Service-specific details for internet access services“. NOTE: ETSI TS 102 234 is replaced by ETSI TS 102 232-3 i.15. ETSI ETSI TR 102 503 V1.9.1 (2015-11) 6 i.8 ETSI TS 102 815: “Lawful Interception (LI); Service-specific details for Layer 2 Lawful Interception“. NOTE:
24、ETSI TS 102 815 is replaced by ETSI TS 102 232-4 i.16. i.9 Recommendation ITU-T X.880: “Information technology - Remote Operations: Concepts, model and notation“. i.10 ETSI TS 101 909-20-1: “Digital Broadband Cable Access to the Public Telecommunications Network; IP Multimedia Time Critical Services
25、; Part 20: Lawful Interception; Sub-part 1: CMS based Voice Telephony Services“. i.11 ETSI TS 101 909-20-2: “Digital Broadband Cable Access to the Public Telecommunications Network; IP Multimedia Time Critical Services; Part 20: Lawful Interception; Sub-part 2: Streamed multimedia services“. i.12 ET
26、SI EN 301 040: “Terrestrial Trunked Radio (TETRA); Security; Lawful Interception (LI) interface“. i.13 ETSI TS 102 232-1: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 1: Handover specification for IP delivery“. i.14 ETSI TS 102 232-2: “Lawful
27、 Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services“. i.15 ETSI TS 102 232-3: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 3: Service-specific deta
28、ils for internet access services“. i.16 ETSI TS 102 232-4: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services“. i.17 ETSI TS 102 232-5: “Lawful Interception (LI); Handover Interface and Service-Speci
29、fic Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services“. i.18 ETSI TS 102 232-6: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services“. i.19 ETSI TS 102 657: “
30、Lawful Interception (LI); Retained data handling; Handover Interface for the request and delivery of retained data“. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: common domain: set of objects, which are part of t
31、he definition of a protocol or a set of related protocols information object: well-defined piece of information, definition, or specification, which requires a name in order to, identify its use in an instance of communication Object IDentifier (OID): value (distinguishable from all other such value
32、s), which is associated with an information object NOTE: An object identifier consists of a sequence of integers. Each integer represents a node in the object identifier tree. So, each successive integer can be thought of as a selection of an end of a branch of the tree. The branch is traversed to g
33、et to the next level in the tree. 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: ASN.1 Abstract Syntax Notation One AT-D Access and Terminals - Digital ETSI ETSI TR 102 503 V1.9.1 (2015-11) 7 CR Change Request EP ETSI ProjectLI Lawful Interception OID
34、Object IDentifier ROSE Remote Operation Service Element TC Technical Committee TETRA TErrestrial Trunked RAdio 4 Structure of the ETSI domain 4.1 Tree structure Figure 1 contains the structure for the ETSI domain with the included Lawful Intercept and Retained data handling domain and ASN.1 modules
35、from other Lawful Interception (LI) specifications. ETSI/TC LI will act as the formal registration authority for the Lawful Intercept and Retained data handling domain, except for the “threeGPP(4)“ subdomain which is administrated by 3GPP/SA3-LI, ETSI/TC AT-D is responsible for the “ts101909(1909)“
36、subdomain and ETSI/EP TETRA is responsible for the “en301040(1040)“ subdomain. 4.2 Description of the ETSI domain Tables 1 to 4 contain the OIDs of the ETSI domain. The entries in the last column in the tables point to the specification where the modules can be found. For information, in addition to
37、 those OIDs defined within ETSI/TC LI, table 5 contains the OIDs for the ROSE operations. Because of the imports, the ASN.1 modules of ROSE will be included when syntax checking or compiling the LI specific ASN.1 modules. ETSI ETSI TR 102 503 V1.9.1 (2015-11) 8 NOTE: There are other standards which
38、contain ASN.1 modules for interception (see http:/portal.etsi.org/li/status.asp). Figure 1: Tree structure of ETSI domain identified-organization (4)dod (6)itu-t (0)member-body (2) iso (1)root etsi (0)securityDomain (2)lawfulIntercept (2)fraud (1) ts101909 (1909)en301040 (1040)threeGPP (4)him (3)hi3
39、 (2)hi2 (1) hi1 (0)subpart2(2)subpart1(1)specific versioninternet (1) private (4)enterprise (1)cable-Television Laboratories-Inc (4491) clapProject (6)clapProjPacketCable (2)pktcLawfulIntercept (5)identifiedorganization (3) pcesp (1)us (840)tia (113737)laes (2)tr45 (0)j-std-025 (0)ETSI domain t1 (1)
40、t1-678 (0)part20 (20)li-ps (5)notificationOperations (1) circuitLI (1) tETRALI (2) gPRSLI (3) cclinkLI (4)gSMLI (5) email (2) iPAccess (3) l2Access (4) iPMultimedia (5)pstnIsdn (6)genHeader (1)TS 133 108 retainedData (3)rdHeader (0)TS 102 657 tetra (6)TS 101 671 TS 102 232-1 ETSI ETSI TR 102 503 V1.
41、9.1 (2015-11) 9 Table 1: OIDs of the ETSI Lawful Intercept domain Object IDentifier Specification itu-t (0) identified-organizations(4) etsi(0) securityDomain(2) ETSI TR 102 503 V1.9.1 (the present document) fraud(1) ETSI ES 201 671 i.2, V1.1.1 clause A.4 lawfulIntercept(2) hi1(0) notification Opera
42、tions (1) version1(1) version2(2) version3(3) version4(4) version5(5) version6(6) version7(7) ETSI ES 201 671 i.2, V1.1.1 clause A.4 ETSI ES 201 671 i.2, V2.1.1 clause D.4 ETSI TS 101 671 i.3, V2.9.1 clause D.4 ETSI TS 101 671 i.3, V2.11.1 clause D.4 ETSI TS 101 671 i.3, V2.12.1 clause D.4 ETSI TS 1
43、01 671 i.3, V3.3.1 clause D.4 ETSI TS 101 671 i.3, V3.13.1 clause D.4 hi2(1) version1(1) version2(2) version3(3) version4(4) version5(5) version6(6) version7(7) version8(8) version9(9) version10(10) version11(11) version12(12) version13(13) version14(14) version15(15) version16(16) version17(17) ver
44、sion18(18) ETSI ES 201 671 i.2, V1.1.1 clause A.5 ETSI ES 201 671 i.2, V2.1.1 clause D.5 ETSI TS 101 671 i.3, V2.5.1 clause D.5 ETSI TS 101 671 i.3, V2.7.1 clause D.5 ETSI TS 101 671 i.3, V2.9.1 clause D.5 ETSI TS 101 671 i.3, V2.10.1 clause D.5 ETSI TS 101 671 i.3, V2.11.1 clause D.5 ETSI TS 101 67
45、1 i.3, V2.12.1 clause D.5 ETSI TS 101 671 i.3, V2.13.1 clause D.5 ETSI TS 101 671 i.3, V2.14.1 clause D.5 ETSI TS 101 671 i.3, V3.5.1 clause D.5 ETSI TS 101 671 i.3, V3.6.1 clause D.5 ETSI TS 101 671 i.3, V3.7.1 clause D.5 ETSI TS 101 671 i.3, V3.8.1 clause D.5 ETSI TS 101 671 i.3, V3.9.1 clause D.5
46、 ETSI TS 101 671 i.3, V3.10.1 clause D.5 ETSI TS 101 671 i.3, V3.11.1 clause D.5 ETSI TS 101 671 i.3, V3.12.1 clause D.5 hi3(2) circuitLI(1) version1(1) version2(2) version3(3) version4(4) ETSI ES 201 671 i.2, V1.1.1 clause A.6 ETSI ES 201 671 i.2, V2.1.1 clause D.6 ETSI TS 101 671 i.3, V2.12.1 clau
47、se D.6 ETSI TS 101 671 i.3, V3.7.1 clause D.6 tETRALI(2) version1(1) ETSI ES 201 671 i.2, V1.1.1 clause A.7 For Further Study gPRSLI(3) version1(1) version2(2) version3(3) ETSI ES 201 671 i.2, V1.1.1 clause A.8 ETSI TS 101 671 i.3, V2.10.1 clause D.9 ETSI TS 101 671 i.3, V2.12.1 clause D.9 cclinkLI(
48、4) version1(1) version2(2) version3(3) version4(4) ETSI ES 201 671 i.2, V1.1.1 clause A.9 ETSI ES 201 671 i.2, V2.1.1 clause D.8 ETSI TS 101 671 i.3, V2.7.1 clause D.8 ETSI TS 101 671 i.3, V2.12.1 clause D.8 gSMLI(5) ETSI ES 201 671 i.2, V2.1.1 clause D.2 For Further Study ETSI ETSI TR 102 503 V1.9.
49、1 (2015-11) 10 Object IDentifier Specification itu-t (0) identified-organizations(4) etsi(0) securityDomain(2) lawfulIntercept(2) him(3) version1(1) version2(2) version3(3) ETSI ES 201 671 i.2, V1.1.1 clause A.3 ETSI ES 201 671 i.2, V2.1.1 clause D.3 ETSI TS 101 671 i.3, V2.12.1 clause D.3 threeGPP(4) Notification Operations (1) hi1(0) r12(12) version-0(0) version-1(1) 3GPP TS 33.108 i.4, V12.7.0 clause M.2 3GPP TS 33.108