Tech-invite3GPP-SpecsReleasesFeaturesEntitiesInterfacesSBIsIdentifiersTi+Search in Tech-invite

21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 23.784SA6
Study on Discreet Listening and Logging
for Mission Critical Services

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V16.0.0 (Wzip)  2019/06  65 p.

Rapporteur:  Mr. Chater-Lea, David

The present document studies solutions to satisfy the requirements for discreet listening and logging for mission critical services. It identifies enhancements to be included in the technical specifications for MCPTT, MCVideo, MCData and in the common functional architecture to support mission critical services.

full Table of Contents for  TR 23.784  Word version:   16.0.0

this ToC is filtered in order to show the essential title levels only
Here   Top
1  ScopeWord-p. 7
2  ReferencesWord-p. 7
3  Definitions and abbreviationsWord-p. 7
4  ScenariosWord-p. 8
4.1  GeneralWord-p. 8
4.2  Scenario 1: Discreet listening of MCPTT and MCVideo private callsWord-p. 8
4.3  Scenario 2: Discreet listening of MCPTT and MCVideo group callsWord-p. 10
4.4  Scenario 3: Discreet listening of MCVideo pullWord-p. 11
4.5  Scenario 4: Discreet listening of MCVideo pushWord-p. 12
4.6  Scenario 5: Discreet listening of MCData SDSWord-p. 14
4.7  Scenario 6: Discreet listening of MCData file distributionWord-p. 15
4.8  Scenario 7: Logging scenariosWord-p. 16
4.9  Scenario 8: Limitations on discreet listening due to regulatory constraints and operator security policiesWord-p. 17
5  Key IssuesWord-p. 18
5.1  Key Issue 1: Selection of MC service for discreet listeningWord-p. 18
5.2  Key issue 2: Group membership of authorized MC user for discreet listeningWord-p. 19
5.3  Key issue 3: Discreet listening for MCVideo push and pull and MCData file upload and downloadUpWord-p. 19
5.4  Key issue 4: Discreet listening of end to end encrypted callsWord-p. 20
5.5  Key issue 5: Logging and replay of end to end encrypted callsWord-p. 20
5.6  Key issue 6: Source MC service server for discreet listening of user in group callWord-p. 21
5.7  Key issue 7: Discreet listening and logging for interconnected MC systemWord-p. 21
5.8  Key issue 8: Discreet listening and logging for migrated MC service userWord-p. 22
5.9  Key Issue 9: Discreet listening and logging for user receiving MC service on multiple devicesWord-p. 22
5.10  Key Issue 10: Logging of MC service users and MC service groupsWord-p. 23
5.11  Key Issue 11: Logging of MCData content server and message store servicesWord-p. 23
5.12  Key Issue 12: Discreet listening of MCData content server and message store servicesWord-p. 24
5.13  Key issue 13: Discreet listening towards an MC service groupUpWord-p. 24
5.14  Key Issue 14: Limitations on discreet listening due to regulatory constraints and operator security policiesWord-p. 24
6  SolutionsWord-p. 25
6.1  Solution 1: Functionality for discreet listeningWord-p. 25
6.2  Solution 2: Discreet listening of MCVideo push and pullWord-p. 28
6.3  Solution 3: Functionality for on-network logging and replayWord-p. 32
6.4  Solution 4: On-network logging for interconnection and migrationWord-p. 37
6.5  Solution 5: Discreet listening for interconnection and migrationWord-p. 40
6.6  Solution 6: Discreet listening to an MCPTT groupWord-p. 43
6.7  Solution 7: Logging of MCData message store and MCData content serverWord-p. 48
6.8  Solution 8: Discreet listening of MCData message store and MCData content serverWord-p. 50
6.9  Solution 9: Functionality for discreet listening with regulatory constraints and operator security policiesUpWord-p. 52
6.10  Solution 10: Functionality for on-network logging and replayWord-p. 56
7  Overall EvaluationWord-p. 58
8  ConclusionsWord-p. 62
A  Reproduction of stage 1 requirementsWord-p. 62
A.1  Requirements for discreet listeningWord-p. 62
A.2  Requirements for recording and auditWord-p. 63
B  Change historyWord-p. 64

Up   Top