摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. At least a first parameter value in data for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic is intercepted or retained at a second node crossed by the traffic in the same network is evaluated. If the second node is located downstream of the first node, lawful interception requests or intercepted data are filtered out.
摘要:
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. At least a first parameter value in data for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic is intercepted or retained at a second node crossed by the traffic in the same network is evaluated. If the second node is located downstream of the first node, lawful interception requests or intercepted data are filtered out.
摘要:
Lawful Interception (LI) management system for retrieving user and/or traffic data associated to a given target identity of a telecommunication network. The system comprises an Administration Function device and at least one Mediation/Delivery Function device. The LI management system comprises a first common handover interface to both a Data Retention Sources domain and an Intercepting Control Elements domain and a second common handover interface to at least one Law Enforcement Agency. The first common handover interface is configured to receive user and/or traffic data from both Data Retention Sources and Intercepting Control Elements.
摘要:
Methods and arrangements are provided for maintaining a wanted Quality of Service transmission level of Lawful Interception (LI) payload data to a Law Enforcement Agency (LEA) via an HI3 interface in a LI system. The data is acquired from an intercepted IP packet flow and belongs to one or more target identities using a specific Internet communications service. The method, which is performed by the arrangement, includes monitoring the state of congestion of IP packets in the HI3 interface in relation to a first threshold level T1 and a second threshold level T2. The first threshold level T1 corresponds to a lower level of congestion than the second threshold level T2. The transmission of LI payload data is controlled based on the monitoring and a priority classification assigned to the LI payload data to be transmitted.
摘要:
Methods and apparatuses to enhance delivery capacity for traffic in a communication network are disclosed. Traffic is received to a Delivery Function with originally coded Quality of Services (QoS). A specification of requested QoS is received to the Delivery Function. The originally coded QoS is established to be higher than the requested QoS. The received traffic is transcoded into requested QoS. Optionally, the traffic is buffered with originally coded QoS and at request, the buffered traffic is retrieved.
摘要:
Methods and apparatuses to enhance delivery capacity for traffic in a communication network are disclosed. Traffic is received to a Delivery Function with originally coded Quality of Services (QoS). A specification of requested QoS is received to the Delivery Function. The originally coded QoS is established to be higher than the requested QoS. The received traffic is transcoded into requested QoS. Optionally, the traffic is buffered with originally coded QoS and at request, the buffered traffic is retrieved.
摘要:
Methods and arrangements are provided for maintaining a wanted Quality of Service transmission level of Lawful Interception (LI) payload data to a Law Enforcement Agency (LEA) via an HI3 interface in a LI system. The data is acquired from an intercepted IP packet flow and belongs to one or more target identities using a specific Internet communications service. The method, which is performed by the arrangement, includes monitoring the state of congestion of IP packets in the HI3 interface in relation to a first threshold level T1 and a second threshold level T2. The first threshold level T1 corresponds to a lower level of congestion than the second threshold level T2. The transmission of LI payload data is controlled based on the monitoring and a priority classification assigned to the LI payload data to be transmitted.
摘要:
The present invention relates to methods and arrangement for user-centric interception in a telecommunication system wherein correlated identities are federated in an Identity Management Controller. The method comprises: Sending from an Intercept Unit to the Identity Management Controller, a request for identities correlated with a specified key target identity. The Intercept Unit receives identities federated to the specified key target identity. The received identities are utilized for user-centric interception purposes.
摘要:
The present invention relates to methods and arrangements for optimizing monitoring capacity in a telecommunication system comprising at least one information element receiving unit. One activity report request along with identities of a target to be monitored are received at the element receiving unit. At least two information elements belonging to a first element group, related to the specified target by different identities and comprise duplicate information are also received at the target. The element receiving unit selects one of the received at least two elements.
摘要:
The present application relates to monitoring non-local originating calls in a telecommunication system having a local network part and a non-local network part. A monitoring centre is attached to an Intercept Access Point in the local network part. A monitoring request comprising an external target identification is received from the monitoring centre to the Intercept Access point. A call is set-up of from an originating subscriber in the non-local network part, towards the local network part. An Initial Address Message comprising the originating subscriber's identity is received to the Intercept Access point from the non-local network part. A match is found between the Initial Address Message and the received target identification. Monitoring information related to the matched target is transferred from the Intercept Access Point to the monitoring centre.