Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.033
Word version: 13.0.0
1…
4…
A…
4
Functional architecture
5
Activation, deactivation and interrogation
6
Invocation of Lawful Interception
7
Security
4
Functional architecture
p. 8
5
Activation, deactivation and interrogation
p. 9
5.1
Activation
p. 10
5.1.1
X1_1-interface
p. 10
5.1.2
X1_2-interface (IRI)
p. 11
5.1.3
X1_3-interface (IP)
p. 11
5.2
Deactivation
p. 12
5.2.1
X1_1-interface
p. 12
5.2.2
X1_2-interface (IRI)
p. 13
5.2.3
X1_3-interface (IP)
p. 13
5.3
Interrogation
p. 14
5.3.1
Interrogation of the MSC/VLR and the GMSC
p. 14
5.3.2
Interrogation of Delivery Functions
p. 14
6
Invocation of Lawful Interception
p. 15
6.1
Provision of Intercept Product - Circuit Switched
p. 16
6.1.1
Void
6.1.2
Two stubline configuration (circuit switched data or speech) to LEA
p. 17
6.1.3
X3-interface
p. 17
6.2
Provision of Intercept Product - Short Message Service
p. 18
6.3
Provision of Intercept Related Information
p. 18
6.3.1
X2-interface
p. 19
6.3.2
Structure of the events
p. 19
6.3.3
Call Related events
p. 21
6.3.3.1
Call establishment
p. 21
6.3.3.2
Answer
p. 21
6.3.3.3
Supplementary Services
p. 22
6.3.3.4
Handover
p. 22
6.3.3.5
Release
p. 22
6.3.4
Non Call Related events
p. 23
6.3.4.1
SMS
p. 23
6.3.4.2
Location update
p. 23
6.3.4.3
Subscriber Controlled Input (SCI)
p. 23
6.4
Intercept cases for supplementary services
p. 24
6.4.1
Interception of Multiparty call
p. 24
6.4.1.1
Intercept Product only for Multiparty
p. 24
6.4.1.2
Intercept Related Information for Multiparty
p. 25
6.4.2
Interception for Call Forwarding / Call Deflection
p. 25
6.4.3
Interception on Call Hold / Call Waiting
p. 25
6.4.4
Interception after ECT
p. 25
7
Security
p. 26
7.1
Security
p. 26
7.1.1
Administration security
p. 26
7.1.2
IRI security
p. 26
7.1.2.1
Normal operation
p. 26
7.1.2.2
Communication failure
p. 26
7.1.3
IP security
p. 27
7.1.4
Security aspects of Lawful Interception charging
p. 27
7.1.5
Other security issues
p. 27
7.1.5.1
Log files
p. 27
7.1.5.2
Data consistency
p. 27