ETSI TS 103 120-2016 Lawful Interception (LI) Interface for warrant information (V1 2 1 Includes Diskette)《合法侦听(LI) 授权信息接口(V1 2 1 包括软盘)》.pdf

上传人:cleanass300 文档编号:739804 上传时间:2019-01-11 格式:PDF 页数:65 大小:390.06KB
下载 相关 举报
ETSI TS 103 120-2016 Lawful Interception (LI) Interface for warrant information (V1 2 1 Includes Diskette)《合法侦听(LI) 授权信息接口(V1 2 1 包括软盘)》.pdf_第1页
第1页 / 共65页
ETSI TS 103 120-2016 Lawful Interception (LI) Interface for warrant information (V1 2 1 Includes Diskette)《合法侦听(LI) 授权信息接口(V1 2 1 包括软盘)》.pdf_第2页
第2页 / 共65页
ETSI TS 103 120-2016 Lawful Interception (LI) Interface for warrant information (V1 2 1 Includes Diskette)《合法侦听(LI) 授权信息接口(V1 2 1 包括软盘)》.pdf_第3页
第3页 / 共65页
ETSI TS 103 120-2016 Lawful Interception (LI) Interface for warrant information (V1 2 1 Includes Diskette)《合法侦听(LI) 授权信息接口(V1 2 1 包括软盘)》.pdf_第4页
第4页 / 共65页
ETSI TS 103 120-2016 Lawful Interception (LI) Interface for warrant information (V1 2 1 Includes Diskette)《合法侦听(LI) 授权信息接口(V1 2 1 包括软盘)》.pdf_第5页
第5页 / 共65页
点击查看更多>>
资源描述

1、 ETSI TS 103 120 V1.2.1 (2016-03) Lawful Interception (LI); Interface for warrant information floppy3TECHNICAL SPECIFICATION ETSI ETSI TS 103 120 V1.2.1 (2016-03)2 Reference RTS/LI-00131 Keywords eWarrant, lawful interception, warrant, warrantry ETSI 650 Route des Lucioles F-06921 Sophia Antipolis C

2、edex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document

3、 may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or i

4、n print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status

5、 of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be

6、reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restr

7、iction extend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of

8、its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 103 120 V1.2.1 (2016-03)3 Contents Intellectual Property Rights 7g3Foreword . 7g3Modal verbs terminology 7g3Executive summary 7g3Introduction 7g31 Scope

9、 8g32 References 8g32.1 Normative references . 8g32.2 Informative references 9g33 Definitions and abbreviations . 10g33.1 Definitions 10g33.2 Abbreviations . 10g34 Structure and model 11g34.1 Structure of the standard . 11g34.2 Structure of the present document 11g34.3 Reference model . 11g35 Messag

10、e Exchange . 12g36 Message Structure 13g36.1 Overview 13g36.2 Message Header . 13g36.2.1 Introduction. 13g36.2.2 Structure 13g36.2.3 Version 14g36.2.4 EndpointID . 14g36.2.5 Transaction Identifiers 15g36.3 Message Payload 15g36.3.1 Introduction. 15g36.3.2 Request Payload 15g36.3.3 Response Payload .

11、 16g36.4 Action Request and Responses . 16g36.4.1 Overview 16g36.4.2 Action Requests 16g36.4.3 Action Responses 16g36.4.4 Action Identifiers 17g36.4.5 GET 17g36.4.6 CREATE . 17g36.4.7 UPDATE 18g36.4.8 LIST 18g36.4.9 Action Unsuccessful Information . 20g37 Data Definitions . 20g37.1 HI-1 Object . 20g

12、37.1.1 Overview 20g37.1.2 ObjectIdentifier . 21g37.1.3 Generation. 21g37.1.4 AssociatedObjects . 21g37.1.5 LastChanged . 21g37.1.6 NationalHandlingParameters 21g37.2 Authorisation Object 21g37.2.1 Overview 21g37.2.2 AuthorisationReference 22g37.2.3 AuthorisationLegalType . 22g37.2.4 AuthorisationPri

13、ority 23g3ETSI ETSI TS 103 120 V1.2.1 (2016-03)4 7.2.5 AuthorisationStatus . 23g37.2.6 AuthorisationDesiredStatus 23g37.2.7 AuthorisationTimespan . 24g37.2.8 AuthorisationCSPID . 24g37.2.9 AuthorisationCreationTimestamp . 24g37.2.10 AuthorisationServedTimestamp . 24g37.2.11 AuthorisationApprovalDeta

14、ils 24g37.2.12 AuthorisationFlags 24g37.3 Document Object 25g37.3.1 Overview 25g37.3.2 DocumentReference 26g37.3.3 DocumentName 26g37.3.4 DocumentStatus 26g37.3.5 DocumentDesiredStatus 26g37.3.6 DocumentTimespan 27g37.3.7 DocumentType . 27g37.3.8 DocumentProperties 27g37.3.9 DocumentBody . 27g37.3.1

15、0 DocumentSignature 28g37.4 Notification Object . 28g37.4.1 Overview 28g37.4.2 NotificationDetails 28g37.4.3 NotificationType . 28g37.4.4 NewNotification . 29g37.4.5 NotificationTimestamp . 29g37.4.6 NationalNotificationParameters 29g38 Task Objects . 29g38.1 Overview 29g38.2 LITaskObject 29g38.2.1

16、Overview 29g38.2.2 Reference 30g38.2.3 Status 30g38.2.4 DesiredStatus 31g38.2.5 TimeSpan 31g38.2.6 TargetIdentifier . 31g38.2.6.1 Overview. 31g38.2.6.2 TargetIdentifierValues Field . 32g38.2.6.3 FormatType . 32g38.2.6.4 Task Service Type . 33g38.2.7 DeliveryType 33g38.2.8 TaskDeliveryDetails . 33g38

17、.2.8.1 Overview . 33g38.2.8.2 DeliveryDestination 34g38.2.8.3 DeliveryAddress 34g38.2.8.4 HandoverFormat . 34g38.2.9 ApprovalDetails 35g38.2.10 CSPID . 35g38.2.11 HandlingProfile . 35g38.2.12 Flags 35g39 Transport and Encoding . 35g39.1 Overview 35g39.2 Encoding. 35g39.2.1 XML Schema 35g39.2.2 Error

18、 conditions 35g39.2.3 Message signing and encryption . 35g39.3 HTTP Transport . 36g39.3.1 Use of HTTP . 36g39.3.2 Client/Server architecture . 36g39.3.3 HTTP Configuration . 36g39.3.4 Transport security . 36g3ETSI ETSI TS 103 120 V1.2.1 (2016-03)5 9.4 Nationally-defined Transport . 36g3Annex A (info

19、rmative): Example usage scenarios for HI-1 37g3A.1 Overview 37g3A.2 Direct communication 37g3A.3 Single “Central Authority“ . 37g3A.4 Multiple Approving Authorities . 38g3A.4.1 Overview 38g3A.4.2 “Serial“ interaction . 38g3A.4.3 “Parallel“ interaction 39g3Annex B (informative): Example Template Nati

20、onal Profile . 41g3B.1 Introduction 41g3B.1.1 Overview 41g3B.1.2 Structure of this annex 41g3B.1.3 Checklist for National Profile authors 41g3B.1.4 Details of the fictional national jurisdiction . 42g3B.2 Example National Profile . 43g3B.2.1 Approach and reference model . 43g3B.2.1.1 Overview 43g3B.

21、2.1.2 Warrants 43g3B.2.1.3 Tasking Instructions 43g3B.2.1.4 Representation by HI-1 Objects 43g3B.2.2 Message Structure 44g3B.2.2.1 Overview 44g3B.2.2.2 Version information 44g3B.2.2.3 Sender and Receiver Identifiers 44g3B.2.2.4 LIST semantics . 44g3B.2.3 Data Definitions . 44g3B.2.3.1 Overview 44g3B

22、.2.3.2 Object Identifiers 44g3B.2.3.3 Generic Object Fields . 45g3B.2.3.4 Authorisation Objects . 45g3B.2.3.5 Document Objects 46g3B.2.3.6 Notification Objects 47g3B.2.3.7 LITaskObjects . 47g3B.2.4 Transport and Encoding . 48g3B.2.5 Example XML 48g3B.2.5.1 Introduction. 48g3B.2.5.2 Request 1 48g3B.2

23、.5.3 Response 1 50g3B.2.5.4 Request 2 50g3B.2.5.5 Response 2 51g3B.2.5.6 Request 3 52g3B.2.5.7 Response 3 53g3Annex C (normative): ETSI Target Identifier Format Definitions . 55g3C.1 Overview 55g3C.2 Definitions 55g3Annex D (normative): Error Codes 57g3D.1 Detailed error codes 57g3Annex E (normative

24、): Approval Details 58g3E.1 Overview 58g3ETSI ETSI TS 103 120 V1.2.1 (2016-03)6 E.2 ApprovalType . 58g3E.3 ApprovalDescription 58g3E.4 ApprovalReference . 58g3E.5 ApproverDetails . 59g3E.5.1 Overview 59g3E.5.2 ApproverIdentity 59g3E.6 ApprovalTimestamp . 59g3E.7 ApprovalIsEmergency 59g3E.8 ApprovalD

25、igitalSignature 60g3E.8.1 Overview 60g3Annex F (normative): Dictionaries . 61g3F.1 Overview 61g3F.2 DictionaryEntry type 61g3F.3 Definition and use of dictionaries 61g3F.3.1 Overview 61g3F.3.2 Owner . 61g3F.3.3 Name 62g3F.3.4 Use of dictionaries 62g3F.3.5 Machine-readable dictionary definitions 62g3

26、Annex G (normative): Drafting conventions for National Parameters . 63g3G.1 Overview 63g3G.2 Drafting conventions 63g3Annex H (informative): Bibliography . 64g3History 65g3ETSI ETSI TS 103 120 V1.2.1 (2016-03)7 Intellectual Property Rights IPRs essential or potentially essential to the present docum

27、ent may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of

28、ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other I

29、PRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI). Modal verbs terminology In the pres

30、ent document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables

31、 except when used in direct citation. Executive summary The present document defines a protocol for the electronic exchange of legal and technical information for the purposes of establishing and managing lawfully required actions (e.g. Lawful Interception). In this phase, the present document is in

32、tended to provide the underlying functionality for HI-1, as defined in the ETSI LI Reference Model, and it has been designed for applicability beyond LI in future phases. Introduction The present document was constructed in multiple phases. The first phase of the present document consisted of a refe

33、rence architecture. It was created by investigating current practices and procedures across TC LI. It makes clear the distinction between the process of communicating with the Communication Service Provider to inform them about the interception details (commonly called “tasking“) and also communicat

34、ion among government/law enforcement/judiciary to establish the warrant (commonly called “warrantry“). The second phase of the present document provided a standardised detailed interface based on the architecture in the first phase, in particular for LI. The present document anticipates that future

35、phases will add other requests for legal action. ETSI ETSI TS 103 120 V1.2.1 (2016-03)8 1 Scope The present document defines an electronic interface between two systems for the exchange of information relating to the establishment and management of lawful required action, typically Lawful Intercepti

36、on. Typically this interface would be used between: on one side, a Communications Service Provider; and, on the other side, a Government or Law Enforcement Agency who is entitled to request a lawful action. The present document is a specific and detailed example of one particular Warrantry interface

37、 for eWarrants i.1. The ETSI reference model for LI (ETSI TS 101 671 1 or ETSI TS 102 232-1 2) defines three interfaces between law enforcement and CSPs, called HI-1, HI-2 and HI-3. The protocol defined in the present document is designed to provide a large part of the functionality for HI-1. It is

38、not designed to be used for HI-2 (delivery of intercept related information) or HI-3 (delivery of communications content). The protocol designed in the present document may also be used for interfaces which require structured exchange of information relating to the establishment and management of La

39、wful Interception. The general view is that the HI-1 concept can also be used for other legal actions than LI. For that reason the present document could, besides LI, also be applied for retained data requests, seized data requests, data preservation orders and other similar legal requests. 2 Refere

40、nces 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any

41、 amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity

42、. The following referenced documents are necessary for the application of the present document. 1 ETSI TS 101 671: “Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic“. 2 ETSI TS 102 232-1: “Lawful Interception (LI); Handover Interface and Service-

43、Specific Details (SSD) for IP delivery; Part 1: Handover specification for IP delivery“. 3 IETF RFC 4122: “A Universally Unique IDentifier (UUID) URN Namespace“. 4 W3C Recommendation 26 November 2008: “Extensible Markup Language (XML) 1.0“. 5 IETF RFC 2818: “HTTP over TLS“. 6 IETF RFC 4279: “Pre-Sha

44、red Key Ciphersuites for Transport Layer Security (TLS)“. 7 ETSI TS 103 280: “Lawful Interception (LI); Dictionary for common parameters“. 8 IETF RFC 1738: “Uniform Resource Locators (URL)“. 9 IETF RFC 2045: “Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies“.

45、10 IETF RFC 2046: “Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types“. 11 IETF RFC 1321: “The MD5 Message-Digest Algorithm“. 12 W3C Recommendation 28 October 2014: “HTML5 A vocabulary and associated APIs for HTML and XHTML“. 13 IEEE POSIX 1003.1-2008: “IEEE Standard for Information

46、Technology - Portable Operating System Interface (POSIX)“. ETSI ETSI TS 103 120 V1.2.1 (2016-03)9 14 ISO 3166-1: “Codes for the representation of names of countries and their subdivisions - Part 1: Country codes“. 15 ETSI TS 102 232-2: “Lawful Interception (LI); Handover Interface and Service-Specif

47、ic Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services“. 16 ETSI TS 102 232-3: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 3: Service-specific details for internet access services“. 17 ETSI TS 102 232-4: “L

48、awful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services“. 18 ETSI TS 102 232-5: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific det

49、ails for IP Multimedia Services“. 19 ETSI TS 102 232-6: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services“. 20 ETSI TS 102 232-7: “Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 7: Service-specific details for Mobile Services“. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or non-specif

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1