[go: up one dir, main page]

CN1691601A - A system and method realizing legal snooping - Google Patents

A system and method realizing legal snooping Download PDF

Info

Publication number
CN1691601A
CN1691601A CN 200410037224 CN200410037224A CN1691601A CN 1691601 A CN1691601 A CN 1691601A CN 200410037224 CN200410037224 CN 200410037224 CN 200410037224 A CN200410037224 A CN 200410037224A CN 1691601 A CN1691601 A CN 1691601A
Authority
CN
China
Prior art keywords
monitoring
lemf
gateway
ices
admf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200410037224
Other languages
Chinese (zh)
Inventor
罗鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 200410037224 priority Critical patent/CN1691601A/en
Publication of CN1691601A publication Critical patent/CN1691601A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information

Landscapes

  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种实现合法监听的系统,该系统包括:法律强制监控设备LEMF、复数个监听网关以及监听控制网元ICEs,每个监听网关与LEMF和ICEs相连,其中,LEMF从所述复数个监听网关中选择工作正常的监听网关发送含有被监听用户标识的监听管理消息,ICEs收到该消息后,根据被监听用户标识监听对象,并将被监听对象的通信网络事件通过该监听网关上报到LEMF,且将被监听对象的通信内容通过该监听网关上报到LEMF。同时,本发明还公开了一种实现合法监听的方法。本发明引入多ADMF分布控制的概念,提高合法监听网络的可靠性和性能,同时增加合法监听网络组网的灵活性。

Figure 200410037224

The invention discloses a system for realizing legal interception. The system includes: legal enforcement monitoring equipment LEMF, a plurality of interception gateways and interception control network elements ICEs, and each interception gateway is connected with LEMF and ICEs, wherein, LEMF is from the plurality of Select the monitoring gateway that works normally among the monitoring gateways to send a monitoring management message containing the monitored user ID. After receiving the message, ICEs will monitor the object according to the monitored user ID and report the communication network events of the monitored object through the monitoring gateway. to LEMF, and report the communication content of the monitored object to LEMF through the monitoring gateway. At the same time, the invention also discloses a method for realizing legal interception. The invention introduces the concept of multi-ADMF distribution control, improves the reliability and performance of the legal interception network, and simultaneously increases the flexibility of the legal interception network networking.

Figure 200410037224

Description

一种实现合法监听的系统及方法A system and method for realizing lawful interception

技术领域technical field

本发明涉及移动通信系统中的监听技术,特别是指一种实现合法监听的系统及方法。The invention relates to the monitoring technology in the mobile communication system, in particular to a system and method for realizing legal monitoring.

背景技术Background technique

监听功能是世界上绝大部分国家安全部门强制要求通讯运营商提供的功能,主要在涉及国家安全或法律时对某些特定用户实行语音通讯的监听。在通用移动通信系统(UMTS),如宽带码分多址(WCDMA)、码分多址(CDMA)、下一代网络(NGN)中,核心网设备需要提供合法监听的功能。The monitoring function is a function that most national security departments in the world require communication operators to provide. It mainly monitors voice communication of certain specific users when national security or laws are involved. In Universal Mobile Telecommunications System (UMTS), such as Wideband Code Division Multiple Access (WCDMA), Code Division Multiple Access (CDMA), and Next Generation Network (NGN), core network equipment needs to provide the function of lawful interception.

参见图1所示,现有技术在UMTS系统中实现合法监听的网络结构包括:法律强制监控单元(LEMF)、监听网关和监听控制网元(ICEs)。其中,监听网关包括管理功能(ADMF)、第二转发功能实体(DF2)和第三转发功能实体(DF3)。运营商核心网设备和监听网关之间的接口为X接口,运营商的监听网关与LEMF之间为HI接口。协议中主要对HI接口进行了初步定义,但X接口由运营商独立实现。详细的说,ADMF与ICEs之间通过X11相连接,ADMF与DF2之间通过X12相连接,ADMF与DF3之间通过X13相连接,DF2与ICEs之间通过X2相连接,DF3与ICEs之间通过X3相连接。LEMF通过HI1接口、HI2接口、HI3接口分别与ADMF相连。逻辑上HI1接口、HI2接口、HI3接口独立。HI1(切换接口端口1)负责在LEMF和网络运营商之间传输侦听管理信息,比如激活和去激活一个侦听对象等;HI2(切换接口端口2)将通信网络中被监听对象发生的事件,比如附着、PDP上下文激活等信息上报给LEMF。HI3(切换接口端口3)将被监听对象的通信内容上报给LEMF。As shown in FIG. 1 , the prior art network structure for implementing lawful interception in the UMTS system includes: Law Enforcement Monitoring Unit (LEMF), Interception Gateway and Interception Control Elements (ICEs). Wherein, the listening gateway includes an administrative function (ADMF), a second forwarding function entity (DF2) and a third forwarding function entity (DF3). The interface between the operator's core network equipment and the monitoring gateway is the X interface, and the interface between the operator's monitoring gateway and the LEMF is the HI interface. The protocol mainly defines the HI interface initially, but the X interface is implemented independently by the operator. In detail, ADMF and ICEs are connected through X11, ADMF and DF2 are connected through X12, ADMF and DF3 are connected through X13, DF2 and ICEs are connected through X2, and DF3 and ICEs are connected through X3 is connected. The LEMF is connected to the ADMF through the HI1 interface, the HI2 interface and the HI3 interface respectively. Logically, the HI1 interface, HI2 interface, and HI3 interface are independent. HI1 (switching interface port 1) is responsible for transmitting interception management information between LEMF and network operators, such as activating and deactivating a listening object, etc.; HI2 (switching interface port 2) will communicate events that occur in the monitored object in the network , such as attachment, PDP context activation and other information reported to the LEMF. HI3 (handover interface port 3) reports the communication content of the monitored object to the LEMF.

基于图1所示的网络结构,现有技术中实现监听的过程如下:Based on the network structure shown in Figure 1, the process of implementing monitoring in the prior art is as follows:

LEMF通过HI1接口向ADMF下发含有监听对象标识的监听管理消息,这里,监听对象包括IMSI和MSISDN等;ADMF收到该监听管理消息后,通过X2接口将其转发至ICEs;ICEs收到该消息后,根据其中的监听对象标识监听用户,并将被监听对象的网络事件通过X2接口上报到DF2,DF2再通过HI2接口上报到各个LEMF;并且,ICEs将被侦听对象的通信内容通过X3接口上报到DF3,DF3再将被侦听对象的通信内容上报到各个LEMF。LEMF sends the monitoring management message containing the monitoring object identifier to ADMF through the HI1 interface. Here, the monitoring objects include IMSI and MSISDN, etc.; after receiving the monitoring management message, ADMF forwards it to ICEs through the X2 interface; ICEs receives the message Finally, monitor the user according to the monitoring object identification, and report the network events of the monitored object to DF2 through the X2 interface, and DF2 then report to each LEMF through the HI2 interface; and ICEs will communicate the content of the monitored object through the X3 interface Report to DF3, and DF3 then reports the communication content of the intercepted object to each LEMF.

从上述过程可以看出,侦听网关负责将HI接口转换威X接口,通过侦听网关,可以使运营商网络和侦听中心网络分别屏蔽对方的网络细节。对于LEMF来说,只需要与监听网关进行交互,而不用关心运营商的通信网络结构。对于ICE来说,监听网关也可以起到屏蔽LEMF的功能,令监听的多个LEMF对运营商通信网透明。It can be seen from the above process that the interception gateway is responsible for converting the HI interface into the WeiX interface. Through the interception gateway, the operator's network and the interception center network can shield each other's network details. For LEMF, it only needs to interact with the monitoring gateway, and does not need to care about the communication network structure of the operator. For ICE, the monitoring gateway can also function to shield LEMFs, making multiple LEMFs monitored transparent to the operator's communication network.

现有的这种监听网络是由一个ADMF集中控制,一个ADMF进行合法监听的管理,所有LEMF都通过同一个ADMF对监听目标进行激活和去激活,监听网络结构简单。但是,可靠性确存在很大的问题,比如,当LEMF出现故障后,将导致整个监听网络陷入瘫痪,而且,如果LEMF和备监听对象数目增多时,ADMF也会成为网络的性能瓶颈。The existing interception network is centralized controlled by one ADMF, and one ADMF performs legal interception management. All LEMFs activate and deactivate the interception target through the same ADMF, and the interception network structure is simple. However, reliability does have serious problems. For example, when LEMF fails, the entire monitoring network will be paralyzed. Moreover, if the number of LEMF and standby monitoring objects increases, ADMF will also become a performance bottleneck of the network.

发明内容Contents of the invention

有鉴于此,本发明的目的在于提供一种实现合法监听的系统,使其提高网络运行的可靠性。In view of this, the object of the present invention is to provide a system for realizing lawful interception, so as to improve the reliability of network operation.

本发明的另一个目的是提供一种实现合法监听的方法,使其能提高网络运行的可靠性。Another object of the present invention is to provide a method for realizing lawful interception, which can improve the reliability of network operation.

为了达到上述第一个目的,本发明提供了一种实现合法监听的系统,该系统包含:In order to achieve the above-mentioned first purpose, the present invention provides a system for realizing lawful interception, the system includes:

法律强制监控设备LEMF、复数个监听网关以及监听控制网元ICEs,每个监听网关与LEMF和ICEs相连,其中,Law enforcement monitoring equipment LEMF, a plurality of monitoring gateways and monitoring control network elements ICEs, each monitoring gateway is connected to LEMF and ICEs, wherein,

LEMF从所述复数个监听网关中选择工作正常的监听网关发送含有被监听用户标识的监听管理消息,ICEs收到该消息后,根据被监听用户标识监听对象,并将被监听对象的通信网络事件通过该监听网关上报到LEMF,且将被监听对象的通信内容通过该监听网关上报到LEMF。LEMF selects a monitoring gateway that works normally from the plurality of monitoring gateways to send a monitoring management message containing the monitored user ID. Report to the LEMF through the monitoring gateway, and report the communication content of the monitored object to the LEMF through the monitoring gateway.

所述复数个监听网关包括:The plurality of listening gateways includes:

一个以上个用于接收LEMF下发的监听管理消息的ADMF;More than one ADMF for receiving the monitoring management message issued by LEMF;

至少一个用于转发通信网络事件的第二转发功能实体DF2,至少一个用于转发通信内容的第三转发功能实体DF3,其中,每个ADMF与一个或以上的DF2和DF3相对应。At least one second forwarding function entity DF2 for forwarding communication network events, at least one third forwarding function entity DF3 for forwarding communication content, wherein each ADMF corresponds to one or more DF2 and DF3.

为了达到上述第二个目的,本发明提供了一种实现合法监听的方法,该方法包括:In order to achieve the above-mentioned second purpose, the present invention provides a method for realizing lawful interception, the method comprising:

A.LEMF从复数个监听网关中选择工作正常的监听网关作为当前监听网关;A. LEMF selects a working monitoring gateway from a plurality of monitoring gateways as the current monitoring gateway;

B.通过当前监听网关向ICEs下发含有被监听用户标识的监听管理消息;B. Send a monitoring management message containing the monitored user ID to ICEs through the current monitoring gateway;

C.ICEs收到该消息后,根据被监听用户标识监听被监听对象,并将被监听对象的通信网络事件和通信内容通过该监听网关上报到LEMF。After receiving the message, C. ICEs monitors the monitored object according to the monitored user ID, and reports the communication network event and communication content of the monitored object to LEMF through the monitoring gateway.

设置复数个监听网关的优先级,步骤A中包括:To set the priority of multiple monitoring gateways, step A includes:

A1、LEMF判断优先级最高的监听网关是否正常工作,如果是,则将该监听网关作为当前监听网关,执行步骤B,否则,选择下一优先级监听网关作为优先级最高的监听网关,返回步骤A1。A1. LEMF judges whether the listening gateway with the highest priority is working normally. If yes, take the listening gateway as the current listening gateway and execute step B. Otherwise, select the listening gateway with the next priority as the listening gateway with the highest priority and return to step A1.

所述复数个监听网关包括:The plurality of listening gateways includes:

一个以上个ADMF、至少一个第二转发功能实体DF2、至少一个第三转发功能实体DF3,其中,每个ADMF与一个或以上的DF2和DF3相对应,More than one ADMF, at least one second forwarding function entity DF2, at least one third forwarding function entity DF3, wherein each ADMF corresponds to one or more DF2 and DF3,

步骤B中所述含有被监听用户标识的监听管理消息是ADMF向ICEs下发;The monitoring management message containing the monitored user ID described in step B is sent by the ADMF to the ICEs;

步骤C中所述被监听对象的通信网络事件是DF2向LEMF上报;The communication network event of the monitored object described in step C is reported by DF2 to LEMF;

步骤C中所述通信内容通过DF3上报到LEMF。The communication content described in step C is reported to LEMF through DF3.

所述监听网关是否正常工作通过握手通信进行确定。Whether the monitoring gateway works normally is determined through handshake communication.

本发明在监听网络中引入多个监听网关,每个监听网关包括一个ADMF、至少一个DF2和至少一个DF3设备。在具体应用时,可以灵活根据不同国情进行不同的网络配置,比如不同的权利机构在国家法律范围内各自使用一套独立的ADMF和DF设备,防止互相干扰。LEMF利用正常工作的监听网关转发监听管理消息,在一个监听网关出现故障时,可以利用其它监听网关实现合法监听,从而可以提高网络可靠性。而且,本发明可以应用多个DF2和DF3设备转发被监听对象的通信网络事件和通信内容,从而提高了网络性能,增加网络容量。The present invention introduces a plurality of monitoring gateways in the monitoring network, and each monitoring gateway includes an ADMF, at least one DF2 and at least one DF3 device. In specific applications, different network configurations can be flexibly made according to different national conditions. For example, different authorities use a set of independent ADMF and DF equipment within the scope of national laws to prevent mutual interference. LEMF utilizes the monitoring gateways that are working normally to forward monitoring management messages. When a monitoring gateway fails, it can use other monitoring gateways to implement legal monitoring, thereby improving network reliability. Moreover, the present invention can apply multiple DF2 and DF3 devices to forward communication network events and communication content of monitored objects, thereby improving network performance and increasing network capacity.

附图说明Description of drawings

图1为现有技术中合法监听的网络结构示意图;FIG. 1 is a schematic diagram of a network structure of lawful interception in the prior art;

图2为本发明实现合法监听的网络结构示意图;Fig. 2 is the schematic diagram of the network structure that the present invention realizes lawful interception;

图3为实现本发明的方法的流程示意图。Fig. 3 is a schematic flow chart for realizing the method of the present invention.

具体实施方式Detailed ways

为使本发明的目的、技术方案和优点更加清楚,下面结合附图对本发明作进一步的详细描述。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

本发明在合法监听网络中引入多个ADMF进行分布式控制。The invention introduces a plurality of ADMFs into the lawful interception network for distributed control.

参见图2所示,本发明的合法监听的网络结构包括:LEMF、复数个监听网关和ICEs。其中,复数个监听网关包括:一个以上的ADMF、至少一个DF2、至少一个DF3,而且,每个监听网关包括一个ADMF、一个或以上个DF2、DF3,每个ADMF和DF设备之间的关系可以绑定,也可以与其它监听网关中的DF设备交叉互联,具体情况可以视不同组网需求而定。Referring to Fig. 2, the network structure of lawful interception of the present invention includes: LEMF, a plurality of interception gateways and ICEs. Among them, a plurality of listening gateways include: more than one ADMF, at least one DF2, and at least one DF3, and each listening gateway includes one ADMF, one or more DF2, and DF3, and the relationship between each ADMF and DF equipment can be Binding, or cross-connection with DF devices in other monitoring gateways, the specific situation can be determined according to different networking requirements.

基于本发明的上述网络结构并参见图3所示,本发明实现合法监听的方法如下:Based on the above-mentioned network structure of the present invention and referring to shown in Figure 3, the method for the present invention to realize lawful interception is as follows:

步骤300:设置监听网关优先级。Step 300: Set the monitoring gateway priority.

步骤301:LEMF判断优先级最高的监听网关是否正常工作,如果是,则将该监听网关作为当前监听网关,执行步骤302,否则,LEMF选择下一级监听网关作为优先级最高的监听网关,返回步骤301。这里,监听网关是否正常工作可以通过握手通信进行确定。Step 301: LEMF judges whether the monitoring gateway with the highest priority is working normally, and if so, takes the monitoring gateway as the current monitoring gateway, and executes step 302, otherwise, LEMF selects the monitoring gateway at the next level as the monitoring gateway with the highest priority, and returns Step 301. Here, whether the monitoring gateway works normally can be determined through handshake communication.

步骤302:LEMF通过HI1接口向当前监听网关中的ADMF下发含有被监听对象标识、DF2和DF3地址的监听管理消息,该ADMF收到监听管理消息后,通过X2接口将其转发至ICEs。这里,由于每个监听网关包括一个ADMF、一个或以上个DF2、DF3,所以,ADMF在发送监听管理消息激活被监听目标时,必须带有DF2和DF3的地址。Step 302: LEMF sends a monitoring management message containing the monitored object identifier, DF2 and DF3 addresses to the ADMF in the current monitoring gateway through the HI1 interface. After receiving the monitoring management message, the ADMF forwards it to ICEs through the X2 interface. Here, since each monitoring gateway includes an ADMF, and one or more DF2 and DF3, when ADMF sends a monitoring management message to activate the target to be monitored, it must carry the addresses of DF2 and DF3.

步骤303:ICEs收到该消息后,记录该被监听对象来自哪个ADMF,并根据其中的被监听用户标识监听被监听用户,然后根据其中的DF2和DF3地址,将被监听对象的网络事件通过X2接口上报到该监听网关中的DF2,该DF2再通过HI2接口将其上报到各个LEMF;并且,ICEs将被监听对象的通信内容通过X3接口上报到该监听网关中的DF3,该DF3再将被监听对象的通信内容上报到各个LEMF。Step 303: After receiving the message, ICEs records which ADMF the monitored object comes from, and monitors the monitored user according to the monitored user ID, and then passes the network event of the monitored object through X2 according to the DF2 and DF3 addresses. The interface is reported to DF2 in the monitoring gateway, and the DF2 reports it to each LEMF through the HI2 interface; and, ICEs report the communication content of the monitored object to DF3 in the monitoring gateway through the X3 interface, and the DF3 will be The communication content of the listening object is reported to each LEMF.

因此,当LEMF需要进行监听时,可以将监听操作发到任何一个正常的监听网关的ADMF进行处理。而且,当一个监听网关中的ADMF发生故障时,LEMF可以将监听任务切换到另外一个运行良好的监听网关上继续监听。并且在网络中引入多个DF设备,扩展监听网络的性能,提高网络的组网灵活性。由于每个ADMF是独立的,所以如果有多个ADMF激活同一个监听对象,ICEs必须分别上报。Therefore, when the LEMF needs to monitor, the monitoring operation can be sent to any ADMF of a normal monitoring gateway for processing. Moreover, when the ADMF in a monitoring gateway fails, the LEMF can switch the monitoring task to another monitoring gateway that operates well to continue monitoring. In addition, multiple DF devices are introduced into the network to expand the performance of the monitoring network and improve the networking flexibility of the network. Since each ADMF is independent, if multiple ADMFs activate the same listening object, ICEs must be reported separately.

总之,以上所述仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。In a word, the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention.

Claims (6)

1、一种实现合法监听的系统,其特征在于,该系统包括:1. A system for realizing legal interception, characterized in that the system comprises: 法律强制监控设备LEMF、复数个监听网关以及监听控制网元ICEs,每个监听网关与LEMF和ICEs相连,其中,Law enforcement monitoring equipment LEMF, a plurality of monitoring gateways and monitoring control network elements ICEs, each monitoring gateway is connected to LEMF and ICEs, wherein, LEMF从所述复数个监听网关中选择工作正常的监听网关发送含有被监听用户标识的监听管理消息,ICEs收到该消息后,根据被监听用户标识监听对象,并将被监听对象的通信网络事件通过该监听网关上报到LEMF,且将被监听对象的通信内容通过该监听网关上报到LEMF。LEMF selects a monitoring gateway that works normally from the plurality of monitoring gateways to send a monitoring management message containing the monitored user ID. Report to the LEMF through the monitoring gateway, and report the communication content of the monitored object to the LEMF through the monitoring gateway. 2、根据权利要求1所述的系统,其特征在于,所述复数个监听网关包括:2. The system according to claim 1, wherein the plurality of monitoring gateways include: 一个以上个用于接收LEMF下发的监听管理消息的ADMF;More than one ADMF for receiving the monitoring management message issued by LEMF; 至少一个用于转发通信网络事件的第二转发功能实体DF2,至少一个用于转发通信内容的第三转发功能实体DF3,其中,每个ADMF与一个或以上的DF2和DF3相对应。At least one second forwarding function entity DF2 for forwarding communication network events, at least one third forwarding function entity DF3 for forwarding communication content, wherein each ADMF corresponds to one or more DF2 and DF3. 3、一种应用权利要求1所述的系统实现合法监听的方法,其特征在于,该方法包括以下步骤:3. A method for implementing legal interception by applying the system according to claim 1, characterized in that the method comprises the following steps: A.LEMF从复数个监听网关中选择工作正常的监听网关作为当前监听网关;A. LEMF selects a working monitoring gateway from a plurality of monitoring gateways as the current monitoring gateway; B.通过当前监听网关向ICEs下发含有被监听用户标识的监听管理消息;B. Send a monitoring management message containing the monitored user ID to ICEs through the current monitoring gateway; C.ICEs收到该消息后,根据被监听用户标识监听被监听对象,并将被监听对象的通信网络事件和通信内容通过该监听网关上报到LEMF。After receiving the message, C. ICEs monitors the monitored object according to the monitored user ID, and reports the communication network event and communication content of the monitored object to LEMF through the monitoring gateway. 4、根据权利要求3所述的方法,其特征在于,设置复数个监听网关的优先级,步骤A中包括:4. The method according to claim 3, characterized in that, setting the priorities of a plurality of listening gateways, step A includes: A1、LEMF判断优先级最高的监听网关是否正常工作,如果是,则将该监听网关作为当前监听网关,执行步骤B,否则,选择下一优先级监听网关作为优先级最高的监听网关,返回步骤A1。A1. LEMF judges whether the listening gateway with the highest priority is working normally. If yes, take the listening gateway as the current listening gateway and execute step B. Otherwise, select the listening gateway with the next priority as the listening gateway with the highest priority and return to step A1. 5、根据权利要求3所述的方法,其特征在于,所述复数个监听网关包括:5. The method according to claim 3, wherein the plurality of listening gateways include: 一个以上个ADMF、至少一个第二转发功能实体DF2、至少一个第三转发功能实体DF3,其中,每个ADMF与一个或以上的DF2和DF3相对应,More than one ADMF, at least one second forwarding function entity DF2, at least one third forwarding function entity DF3, wherein each ADMF corresponds to one or more DF2 and DF3, 步骤B中所述含有被监听用户标识的监听管理消息是ADMF向ICEs下发;The monitoring management message containing the monitored user ID described in step B is sent by the ADMF to the ICEs; 步骤C中所述被监听对象的通信网络事件是DF2向LEMF上报;The communication network event of the monitored object described in step C is reported by DF2 to LEMF; 步骤C中所述通信内容通过DF3上报到LEMF。The communication content described in step C is reported to LEMF through DF3. 6、根据权利要求4所述的方法,其特征在于,所述监听网关是否正常工作通过握手通信进行确定。6. The method according to claim 4, characterized in that whether the monitoring gateway works normally is determined through handshake communication.
CN 200410037224 2004-04-27 2004-04-27 A system and method realizing legal snooping Pending CN1691601A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200410037224 CN1691601A (en) 2004-04-27 2004-04-27 A system and method realizing legal snooping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410037224 CN1691601A (en) 2004-04-27 2004-04-27 A system and method realizing legal snooping

Publications (1)

Publication Number Publication Date
CN1691601A true CN1691601A (en) 2005-11-02

Family

ID=35346752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410037224 Pending CN1691601A (en) 2004-04-27 2004-04-27 A system and method realizing legal snooping

Country Status (1)

Country Link
CN (1) CN1691601A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007082477A1 (en) * 2006-01-18 2007-07-26 Huawei Technologies Co., Ltd. A method for realizing the legal listening in the next generation network and a system thereof
CN100396028C (en) * 2006-01-05 2008-06-18 华为技术有限公司 Monitoring system and monitoring method in a communication system
CN101179449B (en) * 2007-11-27 2010-05-26 华为技术有限公司 A monitoring system, device and method in an IP network
CN101035036B (en) * 2007-04-19 2011-03-02 中兴通讯股份有限公司 Legal monitoring system and method
CN101212356B (en) * 2006-12-31 2011-05-18 华为技术有限公司 Session border controller, communication system and listening method
CN105684381A (en) * 2013-09-09 2016-06-15 诺基亚通信公司 Apparatus and method for lawful interception
CN106411911A (en) * 2016-10-19 2017-02-15 浙江大学 Method for maximizing monitoring non-interruption probability of system based on active monitoring

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100396028C (en) * 2006-01-05 2008-06-18 华为技术有限公司 Monitoring system and monitoring method in a communication system
WO2007082477A1 (en) * 2006-01-18 2007-07-26 Huawei Technologies Co., Ltd. A method for realizing the legal listening in the next generation network and a system thereof
CN101005409B (en) * 2006-01-18 2010-12-01 华为技术有限公司 A method and system for realizing lawful interception in next generation network
CN101212356B (en) * 2006-12-31 2011-05-18 华为技术有限公司 Session border controller, communication system and listening method
CN101035036B (en) * 2007-04-19 2011-03-02 中兴通讯股份有限公司 Legal monitoring system and method
CN101179449B (en) * 2007-11-27 2010-05-26 华为技术有限公司 A monitoring system, device and method in an IP network
CN105684381A (en) * 2013-09-09 2016-06-15 诺基亚通信公司 Apparatus and method for lawful interception
CN106411911A (en) * 2016-10-19 2017-02-15 浙江大学 Method for maximizing monitoring non-interruption probability of system based on active monitoring
CN106411911B (en) * 2016-10-19 2019-05-07 浙江大学 A method based on active monitoring to maximize the non-interrupted probability of system monitoring

Similar Documents

Publication Publication Date Title
US12328343B2 (en) Managing lawful interception information
US6577865B2 (en) System for intercept of wireless communications
CN1586054A (en) Technique for generating correlation number for use in lawful interception of telecommunications traffic
CN1361967A (en) Ordered delivery of intercepted data
EP2266301B1 (en) One activity report for interception purposes
CN1158878C (en) Communications network
JP2012513140A (en) Adaptive system for lawful interception in various communication networks
US20140073295A1 (en) Interception of databases
CN1691601A (en) A system and method realizing legal snooping
CN1684425A (en) Method for realizing legal monitoring
CN100344115C (en) Monitoring network system and method
EP2652932B1 (en) Monitoring target having multiple identities in lawful interception and data retention
CN101170712B (en) A method and system for implementing intelligent network service monitoring
CN101103618A (en) Lawful interception of DSS 1-based virtual private networks
CN100344111C (en) Method and device for guaranteeing call connection in intelligent net system
CN100574215C (en) Device and method for monitoring multiple heterogeneous network elements
CN1612563A (en) System and method for monitoring and intercepting activity
CN1842196A (en) Method for analyzing call fault reason
CN100346613C (en) System and method for monitoring network
CN100525149C (en) A monitoring method
CN1691614A (en) A target IP address based snooping method
EP1427138A2 (en) System and method for acquisition, storage and delivery of communications usage data from communications resources
CN1684542A (en) Method for automatically reporting targeted user equipment position information
CN114726602A (en) Self-adaptive threat blocking method for enterprise intranet under network zero change condition
CN1691613A (en) A service based snooping method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication