Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Gen21222324252627282931323334353637384‑5x
FsNEsRPsSBIsIDs Ti+
Top   in Index   Prev   Next

TS 33.127 (SA3)
Security –
Lawful Interception (LI) Architecture and Functions

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.1.0 (Wzip)2019/09  71 p.
V15.3.0 (PDF)2019/09  55 p.

Rapporteur:  Mr. Jaspers, Koen

The present document specifies both the architectural and functional system requirements for Lawful Interception (LI) in 3GPP networks. The present document provides an LI architecture supporting both network layer based and service layer based Interception.
National regulations determine the specific set of LI functional capabilities that are applicable to a specific 3GPP operator deployment.

full Table of Contents for  TS 33.127  Word version:   16.1.0

 

Here   Top

 

1  ScopeWord-p. 8
2  References
3  Definitions, symbols and abbreviationsWord-p. 9
4  Requirements realisationWord-p. 11
5  Functional architecture
5.1  General
5.2  High-level generic LI architectureWord-p. 12
5.3  Functional entitiesWord-p. 13
5.4  LI interfaces
5.5  LI service discovery
5.6  LI in a virtualised environmentWord-p. 21
6  Network layer based interception
7  Service layer based interception
7.1  General
7.2  Central subscriber management
7.3  LocationUp
7.4  IMSWord-p. 47
7.5  MMS [R16]
8  LI security and deployment considerations
A  5G LI network topology viewsWord-p. 63
Z  Change historyWord-p. 71

Up   Top