CN100461715C - Medium control method for realizing legal monitoring using soft exchanging system - Google Patents

Medium control method for realizing legal monitoring using soft exchanging system Download PDF

Info

Publication number
CN100461715C
CN100461715C CNB2004800424304A CN200480042430A CN100461715C CN 100461715 C CN100461715 C CN 100461715C CN B2004800424304 A CNB2004800424304 A CN B2004800424304A CN 200480042430 A CN200480042430 A CN 200480042430A CN 100461715 C CN100461715 C CN 100461715C
Authority
CN
China
Prior art keywords
end points
shadow
monitored
descending
topology
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004800424304A
Other languages
Chinese (zh)
Other versions
CN1926807A (en
Inventor
徐伟
汤艳
蒋孝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
UTStarcom Telecom Co Ltd
Original Assignee
UTStarcom Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by UTStarcom Telecom Co Ltd filed Critical UTStarcom Telecom Co Ltd
Publication of CN1926807A publication Critical patent/CN1926807A/en
Application granted granted Critical
Publication of CN100461715C publication Critical patent/CN100461715C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]

Landscapes

  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Monitoring And Testing Of Exchanges (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A media control method for realizing the lawful interception includes the following steps: establish the up-shadow-termination corresponding to the intercepted termination in the context of the intercepted termination of the intercepted object, the up-shadow-termination is used to audit the up media flow of the intercepted object; establish the down-shadow-termination corresponding to the opposite termination in the context of the opposite termination of the intercepted termination, the down-shadow-termination is used to audit the down media flow of the intercepted object; and bridge the up-shadow-termination, the down-shadow-termination and intercepting termination corresponding to the interception center to the same conference bridge, wherein the up media flow and the down media flow of the intercepted object is mixed on the conference bridge through the up-shadow-termination and the down-shadow-termination. So the present invention realizes the interception function to the intercepted termination.

Description

Adopt soft exchanging system to realize the media control method of Lawful Interception
Technical field
The present invention relates to the relevant technologies of the medium networking model of the Lawful Interception function in the communication network, the method for Lawful Interception medium control under particularly a kind of soft exchanging system.
Background technology
Lawful Interception is meant that requiring telecom operators to be provided with by the user according to certain legal procedure carries out real-time tracking and monitoring to specific user's traffic and non-traffic activity.Monitor content and comprise user position information, switching on and shutting down information, call status information, sending and receiving short messages content, the content of conversation, data communication, fax sending and receiving content etc.Along with the continuous development of the communication technology, requirement system of increasing telecom operators has the function of this Lawful Interception.
Softswitch technology is the core technology of next generation network (NGN), it is by being separated control of the call signaling in the conventional switch and media bearer, and the agreement by standard between each entity connects and communicates by letter, thereby has realized professionally being separated in calling out control.Media bearer inserts, resource is controlled and management realizes that by entity MGW (media gateway) control for medium among the CallServer (call server) is realized by entity MGC (Media Gateway Controller).Control interface between Media Gateway Controller and the media gateway uses the standard agreement standard, for example the MGCP that is proposed by IETF (the Internet engineering duty group): Media Gateway Control Protocol and the MGCP formulated by ITU-T be agreement H.248/Megaco.
Each functional entity to Lawful Interception among the technical specification TS33.107-LawfulInterception Architecture and Functions of 3GPP (third generation collaborative project) has had detailed description, therefore, the networking model that medium are controlled among the CallServer is that the implementation of DF3 function is the key technology that the Lawful Interception function realizes.We can realize certain medium networking at the interface protocol that passes through standard between MGC (Media Gateway Controller) and MGW (media gateway) under the system of soft switch, thereby do not changing call signaling control, realizing the call monitoring business under the prerequisite of use standard media gateway.
The most simple a kind of medium networking methods is the network connecting mode that adopts local meeting bridge, as shown in Figure 1.Calling party A initiates a call to the end points TB of called subscriber B from its end points TA, situation shown in Figure 1 is calling party A and the situation of called subscriber B at different gateways, end points TA ' in the middle of wherein the call context at calling party A place (CallContext) 1 comprises, end points TB ' in the middle of the call context 2 at called subscriber B place comprises, end points constitutes path in the middle of these.When calling party A is monitored, be that calling party A is under the situation of intercepted user, the Lawful Interception end points Tm of the end points TA of intercepted user and the end points TB of calling user and listening center correspondence is bridged in the meeting bridge of conference context 3, utilizes the Media Stream after the sound mixing function of meeting bridge is monitored the speech audio mixing of intercepted user A and its calling user B.Though this network connecting mode is simple, but this mode has changed the grid connect mode of monitored call, thereby influenced the medium control flow of original ordinary call, make original ordinary call become MPTY based on the meeting bridge, various operations at popular endpoints have become at the operation of monitoring meeting bridge upper extreme point..And, like this to the medium attended operation meeting of each supplementary service along with whether the user is sent different medium bind commands by monitoring, form different media groups pessimistic concurrency controls, such change can make the suitable complexity that medium control becomes and can't accept.
Summary of the invention
At the problems referred to above, the present invention proposes the media control method that a kind of monitoring service realizes, it is based on the notion of " shadow end points ", make monitored call be attached to basic calling, by " up shadow end points " and " descending shadow end points " be connected with the topology of conversation object by the eavesdropping target, thereby obtain respectively by eavesdropping target's up-downgoing Media Stream, to be bridged in the meeting bridge by eavesdropping target " up-downgoing shadow end points " and the circuit of listening center again, utilize the Media Stream after the sound mixing function of meeting bridge is monitored the speech audio mixing of intercepted user and its conversation object.The medium topology that this network connecting mode does not change any original ordinary call connects and the medium control flow.
According to another aspect of the present invention, provide a kind of media control method of realizing Lawful Interception, comprised following step:
1) foundation is monitored the corresponding up shadow end points of end points with described in by eavesdropping target's the context of being monitored the end points place, and described up shadow end points is used for auditing the up Media Stream by the eavesdropping target;
2) set up the descending shadow end points corresponding with described opposite end end points in the context of the described opposite end end points of being monitored end points, described descending shadow end points is used for auditing the downlink media stream by the eavesdropping target; And
3) bridge to same meeting bridge with described up shadow end points and descending shadow end points and with the corresponding monitoring end points of listening center,
Wherein flowed audio mixing on the meeting bridge by the IP of described up shadow end points and descending shadow end points respectively by eavesdropping target's up Media Stream and downlink media stream, realize thus being monitored the monitor function of end points, and the duplicating and network to monitor and set up successfully laggard row at calling and called of Media Stream wherein.
According to an aspect of the present invention, provide a kind of media control method, comprised the steps:
1) after successfully connecting between the calling and called,, in a new context, sets up the monitoring end points corresponding with the monitored call media bearer by Megaco order Add;
2) by Megaco order Add, in by the context of being monitored the end points correspondence at eavesdropping target place, increase auxiliary up shadow end points, it is used for auditing the up Media Stream by the eavesdropping target;
3) by Megaco order Add, in by the context of being monitored the end points correspondence at eavesdropping target place, increase auxiliary descending shadow end points, it is used for auditing the downlink media stream by the eavesdropping target;
4) set up a tripartite talks bridge by Megaco order Add, comprise first end points, second end points and the 3rd end points that are used for outwards providing service;
5) increasing an auxiliary IP point and join far-end IP at the context of monitoring the end points place by Megaco order Add is the 3rd end points;
6) respectively the far-end IP of up shadow end points and descending shadow end points being joined by Megaco order Mod is first end points and second end points;
7) by Megaco order Mod, the two-way topology that disconnects up shadow end points and the opposite end end points of being monitored end points is connected;
8), disconnect descending shadow end points and be connected with the two-way topology of being monitored end points by Megaco order Mod.
Following detailed description by the reference accompanying drawing will be seen that above and other objects of the present invention, feature, each side and advantage.
Description of drawings
The following drawings provides further understanding of the present invention, constitutes the part of specification, and embodiments of the invention are described, explains the principle of the invention with explanatory note.
Fig. 1 is traditional Lawful Interception network model figure;
Fig. 2 is the medium control chart in the media gateway;
Fig. 3 is a Lawful Interception media network networking illustraton of model of the present invention;
Fig. 4 monitors the medium control flow chart for basic call.
Embodiment
Below with reference to the accompanying drawings, specifically describe the specific embodiment of the present invention.
Fig. 2 is the medium control chart in the media gateway.
As shown in Figure 2, the soft switch framework is adopted in medium control involved in the present invention, and call signaling and medium control are separated.MGC (media gateway controlling) realizes the control that medium are set up, and MG (media gateway) realizes concrete carrying foundation and resource management control.
MGC (media gateway controlling) defers to the agreement Megaco (h.248) of the ITU-T of standard for the control of MG (media gateway).Realize medium networking model described later by defined series of standards message of Megaco (Add, Subtract, Modify) and standard message.
Wherein, end points (Termination) be Media Stream generation and (or) termination; Context (Context) is the set of a series of end points that are mutually related.In the context a plurality of end points that are associated can be arranged, this association can concern to come illness that has not attacked the vital organs of the human body by the different topology between end points.The method that the present invention proposes is utilized this point, has increased auxiliary " shadow " end points in the context of original calling, utilizes the unidirectional topology between the end points of the media bearer correspondence that itself and reason call out to be connected, thus the realization monitor function
According to protocol description h.248, MGC comprises modification for topological connection relation between the modification of end points media bearer attribute and end points for the Media Stream control of end points.
End points media bearer attribute is meant the Media Stream transmitting-receiving attribute of end points, comprising: SendOnly (only sending out), ReceiveOnly (only receiving), SendReceive (transmitting-receiving), Inactive (unavailable), Loop (winding).
Topology connects the transmission direction that refers to Media Stream between two end points, comprising: OneWay (unidirectional), BothWay (two-way), Isolate (not having medium to connect).
Call monitoring medium of the present invention control networking model is exactly that the medium control mode that made full use of these the two kinds of standards medium that change end points among the MG connect.
Fig. 3 shows Lawful Interception media network networking illustraton of model of the present invention.
As shown in Figure 3, calling party A initiates a call to the end points TB of called subscriber B from its end points TA, situation shown in Figure 3 is calling party A and the situation of called subscriber B at different gateways, wherein the call context 1 at calling party A place comprises opposite end end points TA ', the call context 2 at called subscriber B place comprises opposite end end points TB ', and end points TA ', TB ' are the middle end points that constitutes path.When calling party A is monitored, be that calling party A is an intercepted user, by monitoring end points is under the situation of TA, in the context (Context) 1 at calling party A place, increase " up shadow end points " UpT and corresponding " the descending shadow end points " DownT of its opposite end end points TA ' of its end points TA correspondence, " up shadow end points " UpT and " descending shadow end points " DownT are the IP end points, and the media bearer attribute is SendOnly (only sending out)." up shadow end points " UpT only with by monitoring end points TA has two-way topology to be connected; " descending shadow end points " DownT only has two-way topology to be connected with opposite end end points TA '.Respectively the Lawful Interception end points Tm of " up shadow end points " UpT and " descending shadow end points " DownT and listening center (not shown) correspondence is bridged to a meeting bridge at conference context 3 places.Like this, the up Media Stream of intercepted user and downlink media stream by IP stream audio mixing on the meeting bridge of " up shadow end points " UpT and " descending shadow end points " DownT, have so just realized the monitor function to end points TA respectively.
Auxiliary IP point on " up shadow end points " UpT and " descending shadow end points " DownT and all meeting bridges and monitor end points Tm and all depend on and monitored end points TA, and with monitored end points TA and had master slave relation, must this relation of preservation among the MGC.
Be to be that example is illustrated with the calling party above by the eavesdropping target.It will be understood by those of skill in the art that also and can the called subscriber monitor for the eavesdropping target.
Figure 4 shows that the present invention realizes monitoring pairing medium control flow chart to ordinary call.This medium controlled step is:
1) by Megaco order Add, in a new context ($), sets up the monitoring end points Tm corresponding with the monitored call media bearer.
2) by Megaco order Add, in the context 1 of being monitored the end points correspondence at intercepted user A place, increase auxiliary " up shadow end points " UpT, it is used for auditing the up Media Stream of intercepted user A.(default, as to be that two-way topology is connected between the end points in the initiate context and other end points)
3) by Megaco order Add, in the context 1 of being monitored the end points correspondence at intercepted user A place, increase auxiliary " descending shadow end points " DownT, it is used for auditing the downlink media stream of intercepted user A.
4) set up a tripartite talks bridge by Megaco order Add, it comprises end points T1 (first end points), end points T2 (second end points) and end points T3 (the 3rd end points), and these end points outwards provide the end points of service for the meeting bridge.
5) increasing an auxiliary IP point and join far-end IP at the context of monitoring end points Tm place by Megaco order Add is end points T3.
6) order Mod respectively the far-end IP of shadow end points UpT and DownT to be joined by Megaco and be end points T1 and end points T2.
7) by Megaco order Mod, the issuable two-way topology between the opposite end end points TA ' of disconnection " up shadow end points " UpT and end points TA connects, to avoid possible crosstalking.
8) by Megaco order Mod, the issuable two-way topology that disconnects between " descending shadow end points " DownT and the intercepted user end points TA connects, to avoid possible crosstalking.
Because intercepted user may do miscellaneous service, for example Call Forwarding, exhale more, MPTY etc., the networking model will guarantee that call monitoring is not subjected to the influence of these business and fails.Under the present invention who adopts soft exchanging system must network model, not only guaranteed this point, and call monitoring is limited set for these professional medium control flows, the element of set is 2.Like this, can not increase the medium control flow of monitoring because of the increase of business, this implementation method has good versatility and extensibility.
Analyze networking model shown in Figure 3, no matter which kind of business user A does, and only have two kinds of results: end points TA changes, and end points TA ' changes.Therefore, we can change the reconstruction that two medium control flows of definition realize monitoring the connection network at these two kinds.Definition set α.
α={C 1,C 2}
C 1: end points TA changes, deletion shadow end points UpT and DownT, and in new end points TA context, increase end points UpT and DownT, change the far-end information that IP corresponding with it on the meeting bridge is ordered, disconnect end points TA and is connected with topology between end points DownT, disconnection end points TA ' is connected with topology between end points UpT.
C 2: end points TA ' changes, and disconnects new end points TA ' and is connected with topology between end points UpT.
HO, the user A that can analyze general business: CH, CW, user A initiate MPTY and can be classified as medium control flow C 1
Call Forwarding, user B Call Retrieve, the HO of user B, user A participates in MPTY can be classified as medium control flow C 2
Therefore, the medium of this solution call monitoring that reaches of the present invention control implementation method
1) satisfied the requirement of Lawful Interception function.
2) adopt the soft exchanging system structure, calling out control separates with medium control, for original call signaling that do not influence of realizing the professional medium control flow that increases of call monitoring is controlled, and do not change the connection of medium topology and the medium control flow of original ordinary call yet.
3) interface between medium controls (MGC) and media gateway (MGW) is deferred to Megaco (h.248) agreement of standard.
4) when intercepted user carried out the miscellaneous service operation, the influence that this monitoring medium are controlled was limited, can make monitoring not be subjected to the influence of intercepted user business by the medium control operation of a finite aggregate.
Therefore, as mentioned above, call monitoring medium control of the present invention is what to realize by following mode: the user is from the calling of an end points initiation to another end points.After the call setup success,, in being monitored the context of end points, increase " up shadow end points " and " descending shadow end points " corresponding with it to making a call or the call accepted end points is monitored.Described " up shadow end points " and " descending shadow end points " are the IP end points of SendOnly for the media bearer attribute, and " up shadow end points " only with by the monitoring end points has two-way topology to be connected; " descending shadow end points " only has two-way topology to be connected with the opposite end end points of being monitored end points.Respectively " shadow end points " and the monitoring end points corresponding with listening center are bridged to a meeting bridge.Like this, the up Media Stream of intercepted user and downlink media stream by IP stream audio mixing on the meeting bridge of " up shadow end points " and " descending shadow end points ", have just realized the function that end points is monitored respectively.
Auxiliary IP point on " shadow end points " and all the meeting bridges and monitoring end points all depend on is monitored end points, and has master slave relation with quilt monitoring end points, must this relation of preservation among the MGC.
The media control method of above-mentioned realization Lawful Interception is monitored after duplicating of Media Stream and networking occur in calling and called and all set up success.
In addition, this method also comprises following treatment principle:
(as stopping to monitor) must delete all " shadow end points " and the auxiliary IP point on all meeting bridges when end points is monitored in deletion; Monitored end points (as the intercepted user on-hook) when deletion, need deletion all " shadow end points " and the auxiliary IP point on all meeting bridges and monitor end points; When being monitored end points change (carrying out exhaling more or switching), rebuild " up shadow end points " and " descending shadow end points ", and change the far-end attribute that IP is ordered on the meeting bridge as the user; The opposite end end points of being monitored end points is changed (as changeing before the customer call of opposite end), need to disconnect " up shadow end points " and be connected with the topology of being monitored the opposite end end points.
Above-mentioned declarative description the media control method of Lawful Interception of the present invention, but scope of the present invention is not limited to detail and the exemplary embodiments representing and illustrate here.Reach accompanying drawing and claim according to the above description, those skilled in the art is to be understood that under not breaking away from by following claim and their situation that is equal to the spirit and scope of the present invention that limited, can makes various changes, modifications and variations to it.

Claims (14)

1. media control method of realizing Lawful Interception comprises following step:
1) foundation is monitored the corresponding up shadow end points of end points with described in by eavesdropping target's the context of being monitored the end points place, and described up shadow end points is used for auditing the up Media Stream by the eavesdropping target;
2) set up the descending shadow end points corresponding with described opposite end end points in the context of the described opposite end end points of being monitored end points, described descending shadow end points is used for auditing the downlink media stream by the eavesdropping target; And
3) bridge to same meeting bridge with described up shadow end points and descending shadow end points and with the corresponding monitoring end points of listening center,
Wherein flowed audio mixing on the meeting bridge by the IP of described up shadow end points and descending shadow end points respectively by eavesdropping target's up Media Stream and downlink media stream, realize thus being monitored the monitor function of end points, and the duplicating and network to monitor and set up successfully laggard row at calling and called of Media Stream wherein.
2. the method for claim 1, it is characterized in that: described up shadow end points and descending shadow end points are that attribute is the IP end points of sendonly.
3. method as claimed in claim 1 or 2, wherein said up shadow end points links to each other with the described end points topology of being monitored, and described descending shadow end points links to each other with the opposite end end points topology of being monitored end points.
4. the method for claim 1 also comprises: disconnect and monitored end points and is connected with topology between descending shadow end points, and disconnect by the opposite end end points of monitoring end points and being connected with topology between up shadow end points.
5. the method for claim 1 also comprises: when being monitored the end points change, rebuild up shadow end points and descending shadow end points in the new context of being monitored end points.
6. method as claimed in claim 5 is wherein rebuild up shadow end points in the new context of being monitored end points and descending shadow end points also comprises: the far-end information that the IP corresponding with described shadow end points ordered on the change meeting bridge.
7. method as claimed in claim 6, wherein also comprise: after the far-end information that the IP corresponding with described shadow end points ordered on changing the meeting bridge, disconnect the new end points of being monitored and is connected, and disconnect described new be connected with topology between up shadow end points by the opposite end end points of monitoring end points with topology between descending shadow end points.
8. the method for claim 1 also comprises: when the opposite end end points of being monitored end points changes, disconnect up shadow end points and be connected with the topology of the new opposite end end points of being monitored end points.
9. a media control method comprises the steps:
1) after successfully connecting between the calling and called,, in a new context, sets up the monitoring end points corresponding with the monitored call media bearer by Megaco order Add;
2) by Megaco order Add, in by the context of being monitored the end points correspondence at eavesdropping target place, increase auxiliary up shadow end points, it is used for auditing the up Media Stream by the eavesdropping target;
3) by Megaco order Add, in by the context of being monitored the end points correspondence at eavesdropping target place, increase auxiliary descending shadow end points, it is used for auditing the downlink media stream by the eavesdropping target;
4) set up a tripartite talks bridge by Megaco order Add, comprise first end points, second end points and the 3rd end points that are used for outwards providing service;
5) increasing an auxiliary IP point and join far-end IP at the context of monitoring the end points place by Megaco order Add is the 3rd end points;
6) respectively the far-end IP of up shadow end points and descending shadow end points being joined by Megaco order Mod is first end points and second end points;
7) by Megaco order Mod, the two-way topology that disconnects up shadow end points and the opposite end end points of being monitored end points is connected;
8), disconnect descending shadow end points and be connected with the two-way topology of being monitored end points by Megaco order Mod.
10. method as claimed in claim 9 is characterized in that: described up shadow end points and descending shadow end points are that attribute is the IP end points of sendonly.
11. method as claimed in claim 9 also comprises: when being monitored the end points change, in the new context of being monitored end points, rebuild up shadow end points and descending shadow end points.
12. method as claimed in claim 11 is wherein rebuild up shadow end points in the new context of being monitored end points and descending shadow end points also comprises: the far-end information that the IP corresponding with described shadow end points ordered on the change meeting bridge.
13. method as claimed in claim 12, wherein also comprise: after the far-end information that the IP corresponding with described shadow end points ordered on changing the meeting bridge, disconnect the new end points of being monitored and is connected, and disconnect described new be connected with topology between up shadow end points by the opposite end end points of monitoring end points with topology between descending shadow end points.
14. method as claimed in claim 9 also comprises: when the opposite end end points of being monitored end points changes, disconnect up shadow end points and be connected with the topology of the new opposite end end points of being monitored end points.
CNB2004800424304A 2004-04-29 2004-04-29 Medium control method for realizing legal monitoring using soft exchanging system Expired - Fee Related CN100461715C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2004/000431 WO2005107159A1 (en) 2004-04-29 2004-04-29 A media control method for realizing the lawful interception by using the soft-switch system

Publications (2)

Publication Number Publication Date
CN1926807A CN1926807A (en) 2007-03-07
CN100461715C true CN100461715C (en) 2009-02-11

Family

ID=35242016

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004800424304A Expired - Fee Related CN100461715C (en) 2004-04-29 2004-04-29 Medium control method for realizing legal monitoring using soft exchanging system

Country Status (2)

Country Link
CN (1) CN100461715C (en)
WO (1) WO2005107159A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100527731C (en) * 2006-04-29 2009-08-12 华为技术有限公司 Method for associating conference bridge context and calling leg context
CN100442877C (en) * 2006-08-21 2008-12-10 华为技术有限公司 System and method of implementing cluster communication service
CN111432075B (en) * 2020-03-12 2022-03-08 深圳震有科技股份有限公司 Voice call real-time monitoring method and device based on VOIP network
CN112351145B (en) * 2020-10-27 2021-12-28 山东亚华电子股份有限公司 Monitoring control method and device based on P2P call

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1338173A (en) * 1999-03-12 2002-02-27 诺基亚网络有限公司 Interception system and method
US20030031137A1 (en) * 2000-03-08 2003-02-13 Mecklin Tomas Christian Fredrik Signalling in a telecommunications network
WO2004010649A1 (en) * 2002-07-19 2004-01-29 Nokia Corporation Informing a lawful interception system of the serving system serving an intercepted target

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1338173A (en) * 1999-03-12 2002-02-27 诺基亚网络有限公司 Interception system and method
US20030031137A1 (en) * 2000-03-08 2003-02-13 Mecklin Tomas Christian Fredrik Signalling in a telecommunications network
WO2004010649A1 (en) * 2002-07-19 2004-01-29 Nokia Corporation Informing a lawful interception system of the serving system serving an intercepted target

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
智能网合法侦听技术. 杨国民,孟旭东.现代电信科技,第3期. 2004
智能网合法侦听技术. 杨国民,孟旭东.现代电信科技,第3期. 2004 *
移动通信中的LI(合法侦听)的实现技术. 孟旭东,王隽,陶海.江苏通信技术,第20卷第1期. 2004
移动通信中的LI(合法侦听)的实现技术. 孟旭东,王隽,陶海.江苏通信技术,第20卷第1期. 2004 *

Also Published As

Publication number Publication date
WO2005107159A1 (en) 2005-11-10
CN1926807A (en) 2007-03-07

Similar Documents

Publication Publication Date Title
JP4901197B2 (en) Soft switch call control method and soft switch device using the method
US6754180B1 (en) System, method, and computer program product for support of bearer path services in a distributed control network
CN100375481C (en) Method and system for realizing inter communication of telecommunication business between isomerized networks
CN100531074C (en) Method and system for legally monitoring IP multimedia subsystem network
CN101227533B (en) Apparatus and method for establishing audio conference connection
CN101485172B (en) Method and communication terminal for provision of VOIP
CN105516176A (en) Call center system, communication connection method and device of call center system
CN100450024C (en) Method for monitoring multi-medium sub-system domain
EP2082606B1 (en) A telecommunication system for controlling media gateways
US20070172051A1 (en) Setting up a packet-oriented multimedia connection using an interactive voice response system
CN100571299C (en) A kind of method and system that realize public telephone exchange network simulation service
CN100461715C (en) Medium control method for realizing legal monitoring using soft exchanging system
CN101119292B (en) Method of negotiating data traffic transmission between gateways
CN100463404C (en) Method for implementing telephone conference service by using media resource server
CN100359899C (en) Method of realizing multiplex sound reproduction simultaneously in conference through MEGACO protocol
CN101534264A (en) Method and equipment for realizing intercommunication of IMS domain and CS domain
CN101106611A (en) Voip inter-network switching system based on H323 protocol
CN100550784C (en) Realize system, the methods and applications server of Lawful Interception in the next generation network
CN100417166C (en) Method for implementing simultaneous multichannel playing in session
CN101141273B (en) Method of implementing session blind transferring service and conference service interaction
CN100527727C (en) Method and system for duplicating medium flow in next-generation network
CN100583786C (en) Legal listening system, method, and application server
CN100459542C (en) Method for realizing internet access in next generation network environment
CN100499708C (en) Method for playing individualized ring back tone for calling terminal in low speed
CN101170750A (en) A method for realizing private key call service and mobile switching center

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090211

Termination date: 20150429

EXPY Termination of patent right or utility model