Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.827  Word version:  14.0.0

Top   Top   Up   Prev   None
0…   4…

 

4  Assumptions, architecture requirements and protocol requirementsp. 9

5  Key issuesp. 11

5.1  Key issue #1 - IMEI targeted LIp. 11

5.2  Key issue #2 -Tel-URI or SIP-URI targeted LIp. 12

5.3  Key issue #3 - LI targeted S8 GTP selection criteriap. 12

5.4  Key Issue #4 - Obtaining network provided locationp. 12

5.5  Key issue #5 - Intra-access handover or anchor change impactp. 13

5.6  Key issue #6 - Detecting targeted signalling unknown or unrecognized by the VPLMNp. 13

5.7  Key issue #7 - Maintaining intra-PLMN and inter-PLMN LI undetectabilityp. 14

5.8  Key issue #8 - Detecting implicit IMS registrationsp. 14

5.9  Key issue #9 - Retained datap. 15

5.10  Key issue #10 - Prevention of unwanted use of confidentiality mechanismsp. 16

5.11  Key issue #11 - Non-Local Identityp. 16

5.12  Key issue #12 - Non-3GPP codec or 3GPP codec in a non-3GPP mode in CCp. 16

5.13  Key issue #13 - Start of interception with ongoing VoLTE callp. 17

5.14  Key issue #14 - Correlation of CC with IRIp. 17

5.15  Key issue #15 - Signalling Compressionp. 19

6  Solutionsp. 19

6.1  Solution #1 S-GW/BBIFF based GTP tunnel extractionp. 19

6.1.1  Descriptionp. 19

6.1.2  S-GW/BBIFF based GTP tunnel extraction architecture reference modelp. 20

6.1.3  Process Flow for Architectural Approach of Solution #1p. 21

6.1.4  Call Flow for architectural approach of Solution #1p. 24

6.1.5  Solution approach to key issuesp. 25

6.1.5.1  Approach to key issue #1 - IMEI targeted LIp. 25

6.1.5.2  Approach to key issue #2 - Tel-URI or SIP-URI targeted LIp. 26

6.1.5.3  Approach to key issue #3 - LI targeted S8 GTP selection criteriap. 27

6.1.5.4  Approach to key issue #4 - Obtaining network provided locationp. 28

6.1.5.5  Approach to key issue #5 - Intra-access handover or anchor change impactp. 28

6.1.5.6  Approach to key issue #6 - Detecting targeted signalling unknown or unrecognized by the VPLMNp. 29

6.1.5.7  Approach to key issue #7 - Maintaining intra-PLMN and inter-PLMN LI undetectabilityp. 29

6.1.5.8  Approach to key issue #8 -Detecting implicit IMS registrationsp. 30

6.1.5.9  Approach to key issue #9 - Retained Datap. 30

6.1.5.10  Approach to key Issue # 10 - Prevention of unwanted use of confidentiality mechanismsp. 30

6.1.5.11  Approach to key Issue # 11 - Non-Local Identityp. 30

6.1.5.12  Approach to key issue #12 - Non-3GPP codec or 3GPP codec in a non-3GPP mode in CCp. 30

6.1.5.13  Approach to key issue #13 - Start of interception with ongoing VoLTE callp. 31

6.1.5.14  Approach to key issue #14 - Correlation of CC with IRIp. 31

6.1.5.15  Approach to key issue #15 - Signalling Compressionp. 31

6.1.6  Impacts on existing nodes and interfacesp. 31

6.2  Solution #2 - Enhanced Architecturep. 31

6.3  Solution #3 - Data forwarding from HPLMNp. 40

6.4  Solution #4 Retained Data Solution supporting ETSI and VPLMN control requirementsp. 43

7  S8HR Deployment Considerationsp. 44

8  Overall evaluationp. 46

9  Conclusionsp. 49

A  GATS BTS potential impact on LI for S8HRp. 50

B  Lawful Interception scenarios with S8HRp. 50

$  Change Historyp. 52


Up   Top