CN101123784B - Processing method and device for legal monitoring under mobile communication system network environment - Google Patents

Processing method and device for legal monitoring under mobile communication system network environment Download PDF

Info

Publication number
CN101123784B
CN101123784B CN2006101121206A CN200610112120A CN101123784B CN 101123784 B CN101123784 B CN 101123784B CN 2006101121206 A CN2006101121206 A CN 2006101121206A CN 200610112120 A CN200610112120 A CN 200610112120A CN 101123784 B CN101123784 B CN 101123784B
Authority
CN
China
Prior art keywords
user
lawful interception
sgsn
pdp context
face
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2006101121206A
Other languages
Chinese (zh)
Other versions
CN101123784A (en
Inventor
吴问付
胡伟华
周四红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2006101121206A priority Critical patent/CN101123784B/en
Publication of CN101123784A publication Critical patent/CN101123784A/en
Application granted granted Critical
Publication of CN101123784B publication Critical patent/CN101123784B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a processing method of lawful interception in the network environment of a mobile communication system, comprising: a network element implementing lawful interception receives processing instruction for lawful interception; if the lawful interception processing instruction carries communication content and interception setting information and a user surface routing of the user does not get through the network element implementing lawful interception, the user surface routing of the user can be revised as getting through the network element implementing lawful interception; if the lawful interception processing instruction asks for the abolition of lawful interception of the user and the user surface routing of the user gets through the network element implementing lawful interception, the user surface routing can be revised as canceling from getting through the network element implementing lawful interception. The invention also provides a processing device of lawful interception in the network environment of mobile communication system.

Description

The processing method of the Lawful Interception under the mobile communication system network environment and device
Technical field
The present invention relates to mobile communication technology, relate in particular to the treatment technology of the Lawful Interception under the mobile communication system network environment.
Background technology
Existing GPRS (General Package Radio Service, GPRS)/UMTS (Universal Mobile Telecommunications System, universal mobile telecommunications system) adopted and the similar network configuration of second generation mobile communication system, as shown in Figure 1, comprise UMTS Terrestrial radio access network (UMTS Territorial Radio Access Network, UTRAN), GSM EDGE Radio Access Network (GSM/EDGE Radio Access Network, GERAN), core net (Core Network, CN) and user terminal (User Equipment, UE).Wherein, GERAN/UTRAN is used to realize be connected all and wireless function associated, and be used to realize and the exchange of external network and the function of route with data and CN is used to handle voice calls all in the GPRS/UMTS system.
CN from be divided in logic circuit commutative field (Circuit Switched Domain, CS) and packet-switched domain (Packet Switched Domain PS), supports speech and data service respectively.
The CS territory comprises Mobile Switching Center Server (MSC Server), media gateway (MGW) and Gateway Mobile Switching Center server nodes such as (GMSC Server).Wherein, MSC Server is used to transmit the chain of command data in CS territory, realize mobile management, call out functions such as control and authentication ciphering, GMSC Server is used to realize the calling control of GMSC and the chain of command function that mobility is controlled, and MGW is used to realize the transmission of user face data.
The PS territory comprises service universal grouping wireless business supporting node (SGSN) and ggsn nodes such as (GGSN).Wherein, GGSN is for to carry out mutual interface with external network, and simultaneously, GGSN also is responsible for realizing the transmission of user face data.Position and the MSC Server in CS territory of SGSN in the PS territory is similar, and its Core Feature is to realize functions such as routing forwarding, mobile management, session management and user profile storage.
(Home Location Register HLR) is used for storing user subscription information to attaching position register, and this equipment is all used in CS and PS territory.
Lawful Interception be meant the monitoring mobile subscriber that mobile communication system provides to legal monitor centers Content of Communication (Content of Communication, CC) and Intercept related information (Intercept RelatedInformation, ability IRI).PS territory Lawful Interception functional frame composition as shown in Figure 2.Wherein, (Law Enforcement Monitoring Facility LEMF) realizes that management of monitor is operated and concrete enforcement monitored to legal monitor centers, comprises setting, cancellation, modification intercept target, and collects and store monitored result etc.; (Administration Function ADMF) be responsible for to receive the monitoring instruction that LEMF initiates to management entity, and to DF2, DF3 and monitor network element and send management information about intercept target, comprises activation, deexcitation monitoring etc.; (Delivery Function DF) finishes collection and the forwarding of IRI and CC to Delivery Function, comprises two logical functional entities, be DF2 and DF3, wherein, DF2 receives the IRI that produces the snoop procedure and is transmitted to LEMF from network element, and DF3 receives CC and is transmitted to LEMF from network element; Monitoring network element and be responsible for the collection of IRI and CC monitoring information and be transmitted to DF2 and the DF3 entity, is SGSN in the PS territory.For the PS territory, IRI is meant the movable relevant information of monitoring users, as GPRS adhere to, the information of contents such as attachment removal, PDP (Packet Data Protocol, packet data protocol) context activation, deexcitation; CC is meant the user face process information of user in the PS territory.
In existing 3GPP protocol processes, UMTS user's face treatment mechanism is Two Tunnels (two a sections tunnels) mechanism, as shown in Figure 3, in the UMTS system, (RadioNetwork Controller, radio network controller are the network elements of UTRAN to the processing of user's face at RNC, be used to control the Radio Resource of UTRAN) and SGSN between, carry out between SGSN and the GGSN, interface is respectively Iu interface and gn interface.For Two Tunnels mechanism, not only need the process user face on the SGSN, also need processing controls face, so the processing of chain of command and user's face does not separate.
Along with the introducing of HSPA (High Speed Packet Access, HRPD (high rate packet data) inserts) and IMS (IPMultimedia Subsystem, IP Multimedia System) technology, following 3GPP network traffic data will phenomenal growth.At present, the 3GPP network is in order to improve the data-handling capacity of UMTS system, a kind of new UMTS user's face treatment mechanism has been proposed, be Direct Tunnel (directly tunnel) mechanism, as shown in Figure 3, under this mechanism, user's face is directly handled between RNC and GGSN in the UMTS system, and need not to handle by SGSN.For Direct Tunnel mechanism, the last function that only needs processing controls face of SGSN is so chain of command and user's face are separate processes in the UMTS system.
Now in conjunction with Fig. 4 and Fig. 5, respectively the activation Lawful Interception stipulated in 3GPP TS 33.107 agreements and the processing procedure of deexcitation Lawful Interception are described, wherein, 33.107 protocol descriptions the framework and the function of Lawful Interception.
The processing procedure of activation Lawful Interception shown in Figure 4 comprises the steps:
Step S401:ADMF sends and activates Lawful Interception (lawful interception activation) message to SGSN, and request is carried out Lawful Interception to the user;
Step S402:SGSN returns and activates Lawful Interception affirmation (lawful interception activationack) message to ADMF, monitors according to activating the information setting IRI or the CC that carry in the Lawful Interception message simultaneously;
Step S403:SGSN collects the monitoring information of IRI and CC and is transmitted to corresponding Delivery Function, for example DF2 or DF3.
The processing procedure of deexcitation Lawful Interception shown in Figure 5 comprises the steps:
Step S501:ADMF sends deexcitation Lawful Interception (lawful interception deactivation) message to SGSN, the Lawful Interception that the request cancellation is carried out the user;
Step S502:SGSN returns the deexcitation Lawful Interception and confirms (lawful interceptiondeactivation ack) message to ADMF, cancellation user's Lawful Interception.
Under Direct Tunnel mechanism, the processing of user's face is directly carried out between RNC and GGSN, do not carry out the processing of user's face on the SGSN, in this case, SGSN just can't collect user's CC monitoring information, CC monitors and can't handle on SGSN, so Fig. 4 and Lawful Interception processing procedure shown in Figure 5 also not exclusively are applicable to Direct Tunnel mechanism.If the user uses TwoTunnels mechanism conversely speaking,, and monitor the processing that is cancelled back user's face at user's CC and still carry out, then can weaken user's face disposal ability of user via SGSN.
Therefore,, then can not solve CC and monitor problem when the user uses Direct Tunnel when mechanism, and if the user uses Two Tunnels mechanism, then can weaken user's face disposal ability of user.
Summary of the invention
The technical problem to be solved in the present invention is to provide the processing method and the device of the Lawful Interception under a kind of mobile communication system network environment, uses CC after the Direct Tunnel mechanism to monitor the problem that problem and user use the weakening user face disposal ability after the Two Tunnels mechanism to solve the user.
For solving the problems of the technologies described above, the invention provides the processing method of the Lawful Interception under a kind of mobile communication system network environment, comprising: the network element of implementing Lawful Interception receives Lawful Interception and handles indication; If described Lawful Interception is handled indication and carried the network element that user's face route of Content of Communication monitoring configuration information and user is not passed through described enforcement Lawful Interception, then the route of user's face is revised as the network element of the described enforcement Lawful Interception of process; If described Lawful Interception processing indication requirement cancellation user's Lawful Interception and user's face route of user are through the network element of described enforcement Lawful Interception, then the route with user's face is revised as the network element of cancelling through described enforcement Lawful Interception.
The network element of described enforcement Lawful Interception is service universal grouping wireless business supporting node SGSN.
The process that the route of user's face is revised as through the network element of described enforcement Lawful Interception comprises: SGSN sends RAB RAB assignment request message to radio network controller (RNC); RNC is revised as the GTP tunnel identifier of SGSN with the up GTP tunnel identifier in the RAB context, and returns RAB and assign response message to give SGSN; SGSN is revised as the GTP tunnel identifier of RNC with the descending GTP tunnel identifier in the PDP Context, and sends the PDP context modification request message to GGSN; GGSN is revised as the GTP tunnel identifier of described SGSN with the descending GTP tunnel identifier in the PDP Context, and returns the PDP context modification response message and give SGSN; SGSN is revised as the up GTP tunnel identifier in the PDP Context GTP tunnel identifier of GGSN.
The route of user's face is revised as cancellation to be comprised through the process of the network element of described enforcement Lawful Interception: SGSN sends the RAB assignment request message to RNC; RNC is revised as the GTP tunnel identifier of GGSN with the up GTP tunnel identifier in the RAB context, and returns RAB and assign response message to give SGSN; SGSN sends the PDP context modification request message to GGSN; GGSN is revised as the GTP tunnel identifier of RNC with the descending GTP tunnel identifier in the PDP Context, and returns the PDP context modification response message and give SGSN.
Described GTP tunnel identifier comprises IP address and tunnel endpoint identifier TEID.
Whether user's face route of determining the user comprises through the process of the network element of described enforcement Lawful Interception: SGSN determines the value of the tunneling mechanism service marking symbol in user's the PDP Context, if be True, then user's face route of determining the user is not passed through described SGSN, otherwise user's face route of determining the user is through described SGSN.
Whether user's face route of determining the user comprises through the process of the network element of described enforcement Lawful Interception: SGSN determines the value of the tunnel endpoint identifier TEID in user's the PDP Context, if be particular value, then user's face route of determining the user is not passed through described SGSN, otherwise user's face route of determining the user is through described SGSN.
The process that the value of tunneling mechanism service marking symbol or TEID is set comprises: the user sends and activates the PDP Context request message to SGSN; SGSN sends and creates the PDP Context request message to GGSN; GGSN returns and creates the PDP Context response message to SGSN; If user's face route of described user is not passed through described SGSN, then the value of the tunneling mechanism service marking in user's the PDP Context symbol value that is set to True or TEID is set to particular value, otherwise the value that the value of tunneling mechanism service marking symbol is set to False or TEID is set to nonspecific value.
The present invention also provides the processing unit of the Lawful Interception under a kind of mobile communication system network environment, comprising: implement the network element of Lawful Interception, be used to receive Lawful Interception and handle indication; The instruction content judging unit is used for judging described Lawful Interception handles to indicate whether carry Content of Communication monitoring configuration information, and/or, judge whether to require cancellation to activate Lawful Interception; Tunneling mechanism type judging unit is used to judge whether user's face route of user passes through the network element of described enforcement Lawful Interception; User's face route is revised the unit, is used to revise the route of user's face; If described Lawful Interception is handled indication and carried the network element that user's face route of Content of Communication monitoring configuration information and user is not passed through described enforcement Lawful Interception, then the route of user's face is revised as the network element of the described enforcement Lawful Interception of process; Require cancellation to activate the network element of user's face route of Lawful Interception and user through described enforcement Lawful Interception if described Lawful Interception is handled indication, then the route with user's face is revised as the network element of cancellation through described enforcement Lawful Interception.
The network element of described enforcement Lawful Interception is service universal grouping wireless business supporting node SGSN.
Compared with prior art, the present invention has the following advantages:
In the present invention, if require monitoring CC and user to use Direct Tunnel mechanism, then the route with user's face is revised as through SGSN, this uses the CC after the Direct Tunnel mechanism to monitor problem with regard to having solved the user, in like manner, use Two Tunnels mechanism if ask for disappear Lawful Interception and user, then the route of user's face is revised as cancellation through SGSN, and this has just strengthened the disposal ability of user's face.
How the present invention judges for SGSN whether the mechanism that user's PDP Context uses has proposed two kinds of methods as DirectTunnel mechanism, a kind of method is that a sign is set in PDP Context, another kind method is that a TEID value is set separately, the mechanism type that the PDP Context that any method can make SGSN determine the user uses, so those of ordinary skills can implement the present invention by multiple means.
Description of drawings
Fig. 1 is the schematic network structure of existing GPRS/UMTS;
Fig. 2 is a PS territory Lawful Interception functional frame composition;
Fig. 3 is that the user's face under the Two Tunnels mechanism is handled schematic diagram;
Fig. 4 is the flow chart of the activation Lawful Interception processing method under the Two Tunnels mechanism;
Fig. 5 is the flow chart of the deexcitation Lawful Interception processing method under the Two Tunnels mechanism;
Fig. 6 is the flow chart of activation Lawful Interception processing method of the present invention;
Whether Fig. 7 is the flow chart of a kind of method of Direct Tunnel mechanism for SGSN of the present invention judges tunneling mechanism that the user uses;
Whether Fig. 8 is the flow chart of the another kind of method of Direct Tunnel mechanism for SGSN of the present invention judges tunneling mechanism that the user uses;
Fig. 9 is the flow chart of deexcitation Lawful Interception processing method of the present invention.
Embodiment
Below we will be in conjunction with the accompanying drawings, optimum implementation of the present invention is described in detail.At first it is to be noted, the implication of the term of using among the present invention, words and claim can not only only limit to its literal and common implication and go to understand, the implication and the notion that also comprise and then conform to technology of the present invention, this is because we are as the inventor, to suitably provide the definition of term, so that the most appropriate description is carried out in our invention.Therefore, the configuration that provides in this explanation and the accompanying drawing is first-selected embodiment of the present invention, rather than will enumerates all technical characteristics of the present invention.We will recognize to also have the various equivalent scheme or the modifications that can replace our scheme.
Lawful Interception of the present invention is handled indication and is comprised activation Lawful Interception and deexcitation Lawful Interception.
At first, the processing method that activates Lawful Interception is described.
If SGSN receives the activation Lawful Interception message that ADMF sends, SGSN just judges whether comprised the configuration information that CC monitors in this message, if do not comprise, then according to the normal process that requires of Direct Tunnel mechanism or Two Tunnels mechanism, otherwise SGSN need judge the tunneling mechanism that the user uses.If the tunneling mechanism that the user uses is Two Tunnels mechanism, then according to the normal process that requires of Two Tunnels mechanism, otherwise, SGSN uses RAB Assignment (Radio Access BearerAssignment, RAB is assigned) flow process and contextual modifications flow process, be revised as Two Tunnels mechanism with user's tunnel employment mechanism, so, the processing of user's face is through SGSN, and CC monitors and just can handle on SGSN.
Said process can be realized by following step:
As shown in Figure 6, step S601:ADMF sends and activates Lawful Interception message to SGSN, and request is carried out Lawful Interception to the user.
SGSN receives to activate and carries out following processing after the Lawful Interception message:
SGSN judges that whether having carried CC in this message monitors configuration information, if finding not to be provided with CC monitors, then do not need execution in step S602, S603, S604, S605, otherwise, SGSN judges user's PDP (Packet Data Protocol, packet data protocol) whether the tunneling mechanism used of context is Direct Tunnel mechanism, if not, then do not need execution in step S602, S603, S604, S605.
Step S602:SGSN gives this user's PDP Context distribution T EID (Tunnel EndpointIDentifier, tunnel endpoint identifier), and send the RAB assignment request message to RNC, carry GTP (the GPRS Tunnel Protocol of SGSN side in this message, GPRS Tunnel Protocol) tunnel identifier, i.e. IP address and the TEID of SGSN.
Step S603:RNC receives RAB (Radio Access Bearer, RAB) assignment request message, and the up GTP tunnel identifier in the PDP Context is revised as the GTP tunnel identifier of SGSN, returns RAB and assigns response message to give SGSN.
Step S604:SGSN is revised as the descending GTP tunnel identifier in the PDP Context GTP tunnel identifier of RNC, be IP address and the TEID of RNC, send the PDP context modification request message to GGSN, carry the GTP tunnel identifier of SGSN side in this message.
Step S605:GGSN receives the PDP context modification request message, and the descending GTP tunnel identifier in the PDP Context is revised as the GTP tunnel identifier of SGSN, returns the PDP context modification response message and gives SGSN.
Step S606:SGSN receives the PDP context modification response message, and the up GTP tunnel identifier in the PDP Context is revised as the GTP tunnel identifier of GGSN, i.e. IP address and the TEID of GGSN return and activate the Lawful Interception acknowledge message and give ADMF.
Now SGSN is judged that whether tunneling mechanism that the user uses describes as the method for Direct Tunnel mechanism.SGSN judges whether the tunneling mechanism that the user uses can take two kinds of methods as Direct Tunnel mechanism:
1, Direct Tunnel mechanism service marking processing method: have a sign in user's the PDP Context, it is Direct Tunnel mechanism service marking, when this value of statistical indicant is True, identify this PDP Context and use Direct Tunnel mechanism, when value is False, identifies this PDP Context and do not use Direct Tunnel mechanism.When activating or revise PDP Context,, then this identifier in user's the PDP Context is changed to True, otherwise is changed to False if the user uses Direct Tunnel mechanism.
Said process can specifically be implemented by following step:
As shown in Figure 7, step S701: the user sends and activates the PDP Context request message to SGSN.
Step S702:SGSN sends and creates the PDP Context request message to GGSN.
Step S703:GGSN returns and creates the PDP Context response message to SGSN.
Step S704: if this user's PDP Context uses Direct Tunnel mechanism, then the mechanism of the Direct Tunnel in user's PDP Context service marking is set to True, otherwise, be set to False.
SGSN is after receiving activation Lawful Interception message, read DirectTunnel mechanism service marking field value in user's the PDP Context, if this field value is True, shows that then the mechanism that this PDP Context uses is Direct Tunnel mechanism, otherwise be Two Tunnels mechanism.
2, specific T EID processing method: set in advance a specific TEID value, this specific value is used when the user uses Direct Tunnel mechanism, the PDP Context that identifies this user uses DirectTunnel mechanism, and the present invention's value that this is specific is called particular value.When activating or revise PDP Context,, then distribute this particular value to give the PDP Context that activates, and be saved in user's the PDP Context if the user uses Direct Tunnel mechanism.
Said process can specifically be implemented by following step:
As shown in Figure 8, step S801: the user sends and activates the PDP Context request message to SGSN.
Step S802:SGSN sends and creates the PDP Context request message to GGSN.
Step S803:GGSN returns and creates the PDP Context response message to SGSN.
Step S804: if this user's PDP Context uses Direct Tunnel mechanism, then the TEID field value in user's the PDP Context is set to particular value, and for example particular value is 0, otherwise is other value.
SGSN receive activate Lawful Interception message after, read the TEID field value in user's the PDP Context, if this field value is a particular value, shows that then the mechanism that this PDP Context uses is Direct Tunnel mechanism, otherwise be Two Tunnels mechanism.
Need to prove, under Direct Tunnel mechanism, user's face route of user is handled without SGSN, under Two Tunnels mechanism, user's face route of user is handled through SGSN, so, determine that the method for the tunneling mechanism type that the user uses can be used to also judge whether user's face route of user is handled through SGSN.
Processing method to the deexcitation Lawful Interception describes now.Processing method as shown in Figure 9.
Step S901:ADMF sends deexcitation Lawful Interception message to SGSN, and the request cancellation is to user's Lawful Interception.
After SGSN receives deexcitation Lawful Interception message, judge that can the user use Direct Tunnel mechanism, for example, the user is not that SGSN and the GGSN that roamer and user use supports DirectTunnel mechanism.If the user can not use Direct Tunnel mechanism, then do not need execution in step S902, S903, S904, S905.
Step S902:SGSN sends the RAB assignment request message to RNC, carries the GTP tunnel identifier of GGSN side in this message, i.e. IP address and the TEID of GGSN.
Step S903:RNC receives the RAB assignment request message, and the up GTP tunnel identifier in the RAB context is revised as the GTP tunnel identifier of GGSN, returns RAB and assigns response message to give SGSN.
Step S904:SGSN sends the PDP context modification request message to GGSN, carries the GTP tunnel identifier of RNC side in this message, i.e. IP address and the TEID of RNC.
Step S905:GGSN receives the PDP context modification request message, and the descending GTP tunnel identifier in the PDP Context is revised as the GTP tunnel identifier of RNC, returns the PDP context modification response message to SGSN.
Step S906:SGSN receives the PDP context modification response message, returns deexcitation Lawful Interception acknowledge message and gives ADMF.
The invention allows for the processing unit of the Lawful Interception under a kind of mobile communication system network environment, comprising: implement the Lawful Interception network element, be used to receive Lawful Interception and handle indication; The instruction content judging unit be used for judging described Lawful Interception handles to indicate whether carry Content of Communication monitoring configuration information, and/or it is legal to judge whether to require cancellation to activate; Tunneling mechanism type judging unit is used to judge whether user's face route of user passes through described enforcement Lawful Interception network element; User's face route is revised the unit, is used to revise the route of user's face; Indicate user's face route of carrying Content of Communication monitoring configuration information and user not pass through described enforcement Lawful Interception network element if described Lawful Interception is handled, then the route of user's face is revised as the network element of the described enforcement Lawful Interception of process; If described Lawful Interception is handled user's face route of indication requirement cancellation activation Lawful Interception and user through described enforcement Lawful Interception network element, then the route of user's face is revised as the network element of the described enforcement Lawful Interception of cancellation process.
Wherein, described enforcement Lawful Interception network element can be service universal grouping wireless business supporting node SGSN.
The process that the route of user's face is revised as through the network element of described enforcement Lawful Interception comprises: SGSN sends the RAB assignment request message to radio network controller (RNC); RNC is revised as the GTP tunnel identifier of SGSN with the up GTP tunnel identifier in the RAB context, and returns RAB and assign response message to give SGSN; SGSN is revised as the GTP tunnel identifier of RNC with the descending GTP tunnel identifier in the PDP Context, and sends the PDP context modification request message to GGSN; GGSN is revised as the GTP tunnel identifier of described SGSN with the descending GTP tunnel identifier in the PDP Context, and returns the PDP context modification response message and give SGSN; SGSN is revised as the up GTP tunnel identifier in the PDP Context GTP tunnel identifier of GGSN.
The route of user's face is revised as cancellation to be comprised through the process of the network element of described enforcement Lawful Interception: SGSN sends the RAB assignment request message to RNC; RNC is revised as the GTP tunnel identifier of GGSN with the up GTP tunnel identifier in the RAB context, and returns RAB and assign response message to give SGSN; SGSN sends the PDP context modification request message to GGSN; GGSN is revised as the GTP tunnel identifier of RNC with the descending GTP tunnel identifier in the PDP Context, and returns the PDP context modification response message and give SGSN.
Described GTP tunnel identifier comprises IP address and TEID.
Whether user's face route of determining the user comprises through the process of the network element of described enforcement Lawful Interception: SGSN determines the value of the tunneling mechanism service marking symbol in user's the PDP Context, if be True, then user's face route of determining the user is not passed through described SGSN, otherwise user's face route of determining the user is through described SGSN.
Whether user's face route of determining the user comprises through the process of the network element of described enforcement Lawful Interception: SGSN determines the value of the tunnel endpoint identifier TEID in user's the PDP Context, if be particular value, then user's face route of determining the user is not passed through described SGSN, otherwise user's face route of determining the user is through described SGSN.
The process that the value of tunneling mechanism service marking symbol or TEID is set comprises: the user sends and activates the PDP Context request message to SGSN; SGSN sends and creates the PDP Context request message to GGSN; GGSN returns and creates the PDP Context response message to SGSN; If user's face route of described user is not passed through SGSN, then the value of the tunneling mechanism service marking in user's the PDP Context symbol value that is set to True or TEID is set to particular value, otherwise the value that the value of tunneling mechanism service marking symbol is set to False or TEID is set to nonspecific value.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (7)

1. the processing method of the Lawful Interception under the mobile communication system network environment is characterized in that comprising:
The network element of implementing Lawful Interception receives Lawful Interception and handles indication; Wherein, the network element of described enforcement Lawful Interception is service universal grouping wireless business supporting node SGSN;
If described Lawful Interception is handled indication and is carried the network element that user's face route of Content of Communication monitoring configuration information and user is not passed through described enforcement Lawful Interception, then the route of user's face is revised as the network element of the described enforcement Lawful Interception of process, specifically comprises: SGSN sends RAB RAB assignment request message to radio network controller (RNC); RNC is revised as the GTP tunnel identifier of SGSN with the up GTP tunnel identifier in the RAB context, and returns RAB and assign response message to give SGSN; SGSN is revised as the GTP tunnel identifier of RNC with the descending GTP tunnel identifier in the PDP Context, and sends the PDP context modification request message to GGSN; GGSN is revised as the GTP tunnel identifier of described SGSN with the descending GTP tunnel identifier in the PDP Context, and returns the PDP context modification response message and give SGSN; SGSN is revised as the up GTP tunnel identifier in the PDP Context GTP tunnel identifier of GGSN;
If described Lawful Interception processing indication requirement cancellation user's Lawful Interception and user's face route of user are through the network element of described enforcement Lawful Interception, then the route with user's face is revised as the network element of cancelling through described enforcement Lawful Interception.
2. the processing method of the Lawful Interception under the mobile communication system network environment as claimed in claim 1 is characterized in that route with user's face is revised as cancellation and comprises through the process of the network element of described enforcement Lawful Interception:
SGSN sends the RAB assignment request message to RNC;
RNC is revised as the GTP tunnel identifier of GGSN with the up GTP tunnel identifier in the RAB context, and returns RAB and assign response message to give SGSN;
SGSN sends the PDP context modification request message to GGSN;
GGSN is revised as the GTP tunnel identifier of RNC with the descending GTP tunnel identifier in the PDP Context, and returns the PDP context modification response message and give SGSN.
3. the processing method of the Lawful Interception under the mobile communication system network environment as claimed in claim 1 is characterized in that: described GTP tunnel identifier comprises IP address and tunnel endpoint identifier TEID.
4. the processing method of the Lawful Interception under the mobile communication system network environment as claimed in claim 1, whether the user's face route that it is characterized in that determining the user comprises through the process of the network element of described enforcement Lawful Interception: SGSN determines the value of the tunneling mechanism service marking symbol in user's the PDP Context, if be True, then user's face route of determining the user is not passed through described SGSN, otherwise user's face route of determining the user is through described SGSN.
5. the processing method of the Lawful Interception under the mobile communication system network environment as claimed in claim 1, whether the user's face route that it is characterized in that determining the user comprises through the process of the network element of described enforcement Lawful Interception: SGSN determines the value of the tunnel endpoint identifier TEID in user's the PDP Context, if be particular value, then user's face route of determining the user is not passed through described SGSN, otherwise user's face route of determining the user is through described SGSN.
6. as the processing method of the Lawful Interception under claim 4 or the 5 described mobile communication system network environments, the process that it is characterized in that being provided with the value of tunneling mechanism service marking symbol or TEID comprises:
The user sends and activates the PDP Context request message to SGSN;
SGSN sends and creates the PDP Context request message to GGSN;
GGSN returns and creates the PDP Context response message to SGSN;
If user's face route of described user is not passed through described SGSN, then the value of the tunneling mechanism service marking in user's the PDP Context symbol value that is set to True or TEID is set to particular value, otherwise the value that the value of tunneling mechanism service marking symbol is set to False or TEID is set to nonspecific value.
7. the processing unit of the Lawful Interception under the mobile communication system network environment is characterized in that comprising:
Implement the network element of Lawful Interception, be used to receive Lawful Interception and handle indication;
The instruction content judging unit is used for judging described Lawful Interception handles to indicate whether carry Content of Communication monitoring configuration information, and/or, judge whether to require cancellation to activate Lawful Interception;
Tunneling mechanism type judging unit is used to judge whether user's face route of user passes through the network element of described enforcement Lawful Interception; Wherein, the network element of described enforcement Lawful Interception is service universal grouping wireless business supporting node SGSN;
User's face route is revised the unit, is used to revise the route of user's face;
If described Lawful Interception is handled indication and is carried the network element that user's face route of Content of Communication monitoring configuration information and user is not passed through described enforcement Lawful Interception, then the route of user's face is revised as the network element of the described enforcement Lawful Interception of process, specifically comprises: SGSN sends RAB RAB assignment request message to radio network controller (RNC); RNC is revised as the GTP tunnel identifier of SGSN with the up GTP tunnel identifier in the RAB context, and returns RAB and assign response message to give SGSN; SGSN is revised as the GTP tunnel identifier of RNC with the descending GTP tunnel identifier in the PDP Context, and sends the PDP context modification request message to GGSN; GGSN is revised as the GTP tunnel identifier of described SGSN with the descending GTP tunnel identifier in the PDP Context, and returns the PDP context modification response message and give SGSN; SGSN is revised as the up GTP tunnel identifier in the PDP Context GTP tunnel identifier of GGSN;
Require cancellation to activate the network element of user's face route of Lawful Interception and user through described enforcement Lawful Interception if described Lawful Interception is handled indication, then the route with user's face is revised as the network element of cancellation through described enforcement Lawful Interception.
CN2006101121206A 2006-08-11 2006-08-11 Processing method and device for legal monitoring under mobile communication system network environment Active CN101123784B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101121206A CN101123784B (en) 2006-08-11 2006-08-11 Processing method and device for legal monitoring under mobile communication system network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101121206A CN101123784B (en) 2006-08-11 2006-08-11 Processing method and device for legal monitoring under mobile communication system network environment

Publications (2)

Publication Number Publication Date
CN101123784A CN101123784A (en) 2008-02-13
CN101123784B true CN101123784B (en) 2011-04-13

Family

ID=39085912

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101121206A Active CN101123784B (en) 2006-08-11 2006-08-11 Processing method and device for legal monitoring under mobile communication system network environment

Country Status (1)

Country Link
CN (1) CN101123784B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130272136A1 (en) * 2012-04-17 2013-10-17 Tektronix, Inc. Session-Aware GTPv1 Load Balancing

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719788A (en) * 2004-07-07 2006-01-11 中兴通讯股份有限公司 Method for call controlling and service monitoring of soft exchange monitoring

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719788A (en) * 2004-07-07 2006-01-11 中兴通讯股份有限公司 Method for call controlling and service monitoring of soft exchange monitoring

Also Published As

Publication number Publication date
CN101123784A (en) 2008-02-13

Similar Documents

Publication Publication Date Title
JP4628990B2 (en) Subscriber record generation method and apparatus
CN1291611C (en) Method for tracking and monitoring calling in mobile communication system
US7535848B2 (en) System and method for associating IP services to mobile subscribers
EP2115964B1 (en) Mechanism to uniquely identify and unify a user's set of packet bearer contexts in a mobile telecommunications network
EP1523827B1 (en) Informing a lawful interception system of the serving system serving an intercepted target
US20080117870A1 (en) Setting a communication channel
US8270942B2 (en) Method for the interception of GTP-C messages
CN107484224A (en) A kind of data transmission method and device
US9042388B2 (en) Lawful interception for 2G/3G equipment interworking with evolved packet system
CN100397831C (en) System and method for realizing IP multimedia business monitoring
WO2016082553A1 (en) Method, device and system for distributing mobile network content
WO2013139791A1 (en) Lawful intercepts
US8942174B2 (en) Reducing packet loss in a mobile data network with data breakout at the edge
CN101588548A (en) Method and system for accessing communication data and access gateway
US8848614B2 (en) Cooperative mobility management in a mobile data network with data breakout at the edge
CN103959714B (en) Configure method, monitor method, device and the entity of monitoring users data path
US10225191B2 (en) Service packet distribution method and apparatus
CN101123784B (en) Processing method and device for legal monitoring under mobile communication system network environment
US20040085925A1 (en) Method and system for managing a connection of a mobile element to a network
WO2016082475A1 (en) Network handover method, network system, and storage medium
JP4624325B2 (en) Packet data network subscriber record creation method and apparatus
CN104081821B (en) The method and apparatus of the reverse switching of video call
GB2437346A (en) Establishing a packet switched radio bearer session with an emergency service
AU2010336217B2 (en) Mobile Communication Method, First Node and Second Node

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant