摘要:
Methods and arrangements are provided for maintaining a wanted Quality of Service transmission level of Lawful Interception (LI) payload data to a Law Enforcement Agency (LEA) via an HI3 interface in a LI system. The data is acquired from an intercepted IP packet flow and belongs to one or more target identities using a specific Internet communications service. The method, which is performed by the arrangement, includes monitoring the state of congestion of IP packets in the HI3 interface in relation to a first threshold level T1 and a second threshold level T2. The first threshold level T1 corresponds to a lower level of congestion than the second threshold level T2. The transmission of LI payload data is controlled based on the monitoring and a priority classification assigned to the LI payload data to be transmitted.
摘要:
Methods and apparatuses to enhance delivery capacity for traffic in a communication network are disclosed. Traffic is received to a Delivery Function with originally coded Quality of Services (QoS). A specification of requested QoS is received to the Delivery Function. The originally coded QoS is established to be higher than the requested QoS. The received traffic is transcoded into requested QoS. Optionally, the traffic is buffered with originally coded QoS and at request, the buffered traffic is retrieved.
摘要:
Methods and apparatuses to enhance delivery capacity for traffic in a communication network are disclosed. Traffic is received to a Delivery Function with originally coded Quality of Services (QoS). A specification of requested QoS is received to the Delivery Function. The originally coded QoS is established to be higher than the requested QoS. The received traffic is transcoded into requested QoS. Optionally, the traffic is buffered with originally coded QoS and at request, the buffered traffic is retrieved.
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. At least a first parameter value in data for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic is intercepted or retained at a second node crossed by the traffic in the same network is evaluated. If the second node is located downstream of the first node, lawful interception requests or intercepted data are filtered out.
摘要:
The present invention relates to methods and arrangements for optimizing monitoring capacity in a telecommunication system comprising at least one information element receiving unit. One activity report request along with identities of a target to be monitored are received at the element receiving unit. At least two information elements belonging to a first element group, related to the specified target by different identities and comprise duplicate information are also received at the target. The element receiving unit selects one of the received at least two elements.
摘要:
A node of telecommunications network comprises comparing means for comparing current mobile station ID information with previously stored mobile station ID information. The node also comprises preparing means for preparing a notification message including both the previous mobile station ID information and the current mobile station ID information.
摘要:
Lawful Interception (LI) management system for retrieving user and/or traffic data associated to a given target identity of a telecommunication network. The system comprises an Administration Function device and at least one Mediation/Delivery Function device. The LI management system comprises a first common handover interface to both a Data Retention Sources domain and an Intercepting Control Elements domain and a second common handover interface to at least one Law Enforcement Agency. The first common handover interface is configured to receive user and/or traffic data from both Data Retention Sources and Intercepting Control Elements.
摘要:
The present invention relates to method and arrangements to provide information related to user devices in a telecommunication system (TS). The system comprises at least one network domain (HPLMN, WCDMA) that is associated with a central database (DCR). The method comprises identification in the central database (DCR) of a first request (REQ1, REQI1) to provide to at least one data analysis function, user identity information related to all user devices that notifies attachment to the at least one network domain (HPLMN, WCDMA). Attachment notification from a requested user device (A, B) to the network domain is then detected in the central database.
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. At least a first parameter value in data for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic is intercepted or retained at a second node crossed by the traffic in the same network is evaluated. If the second node is located downstream of the first node, lawful interception requests or intercepted data are filtered out.
摘要:
The present invention relates to method and arrangements to provide information related to user devices in a telecommunication system (TS). The system comprises at least one network domain (HPLMN, WCDMA) that is associated with a central database (DCR). The method comprises identification in the central database (DCR) of a first request (REQ1, REQI1) to provide to at least one data analysis function, user identity information related to all user devices that notifies attachment to the at least one network domain (HPLMN, WCDMA). Attachment notification from a requested user device (A, B) to the network domain is then detected in the central database.