TP273 - Pravilnik o opremi in vmesnikih za zakonito prestrezanje komunikacij
Pravilnik o opremi in vmesnikih za zakonito prestrezanje komunikacij
Pravilnik o opremi in vmesnikih za zakonito prestrezanje komunikacij
General Information
The present document defines a dictionary of parameters that are commonly used in multiple TC LI specifications.
Aside from defining a dictionary, the present document aims to provide technical means for other specifications to use.
It is encouraged to use the present document in the development of new specifications.
It is foreseen that regular maintenance of the present document is required. As such, release management requirements will be defined.
Before accepting any new common parameter, the present document will provide a set of requirements the parameter has to comply to in order to become a common parameter.
- Standard37 pagesEnglish languagesale 15% off
- Technical specification37 pagesEnglish languagesale 10% offe-Library read for1 day
The present document contains a stage 1 description of the interception information in relation to the process of binding
a "target identity" to an IP address when providing Internet access and a stage 2 description of when Intercept Related
Information (IRI) and Content of Communication (CC) need to be sent, and what information it needs to contain.
The present document includes but is not restricted to IRI based on application of Dynamic Host Configuration Protocol
(DHCP) and Remote Authentication Dial-In User Service (RADIUS) technology for binding a "target identity" to an IP
address and CC for the intercepted IP packets.
The definition of the Handover Interface 2 (HI2) and Handover Interface 3 (HI3) is outside the scope of the present
document. For the handover interface is referred to ETSI TS 102 232-1 [2].
- Standard62 pagesEnglish languagesale 15% off
- Technical specification62 pagesEnglish languagesale 10% offe-Library read for1 day
The present document specifies the general aspects of HI2 and HI3 interfaces for handover via IP based networks.
The present document:
• specifies the modular approach used for specifying IP based handover interfaces;
• specifies the header(s) to be added to IRI and CC sent over the HI2 and HI3 interfaces respectively;
• specifies protocols for the transfer of IRI and CC across the handover interfaces;
• specifies protocol profiles for the handover interface.
The present document is designed to be used where appropriate in conjunction with other deliverables that define the
service-specific IRI data formats (including ETSI TS 102 227 [i.1], ETSI TS 101 909-20-1 [33], ETSI
TS 101 909-20-2 [34], ETSI TS 102 232-2 [5], ETSI TS 102 232-3 [6], ETSI TS 102 232-4 [32], ETSI
TS 102 232-5 [37], ETSI TS 102 232-6 [36] and ETSI TS 102 232-7 [38]). Where possible, the present document aligns
with 3GPP TS 33.108 [9] and ETSI TS 101 671 [4] and supports the requirements and capabilities defined in ETSI
TS 101 331 [i.9] and ETSI TR 101 944 [i.4].
For the handover of intercepted data within GSM/UMTS PS and CS domains, the present document does not override
or supersede any specifications or requirements in 3GPP TS 33.108 [9] and ETSI TS 101 671 [4].
For the handover of services defined in 3GPP TS 33.128 [46], in the event of conflict between the present document
and 3GPP TS 33.128 [46], the terms of 3GPP TS 33.128 [46] apply.
- Standard64 pagesEnglish languagesale 15% off
- Technical specification64 pagesEnglish languagesale 10% offe-Library read for1 day
The present document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session
Initiation Protocol (SIP) and Realtime Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IP
MM services as described by the Recommendations ITU-T H.323 [6] and H.248-1 [i.3].
The present document is consistent with the definition of the Handover Interface, as described in ETSI
TS 102 232-1 [2].
The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 [9] and
ETSI TS 101 671 [1].
- Standard30 pagesEnglish languagesale 15% off
- Technical specification30 pagesEnglish languagesale 10% offe-Library read for1 day
The present document specifies Lawful Interception for an Access Provider that has access to layer 2 session
information and that is not required to have layer 3 information. In this case, the focus of Lawful Interception (LI) for IP
Network Access is on the portion of the network, commonly referred to as "layer 2 interception", that facilitates
subscriber access to the Public IP network.
The present document describes the LI at the interception domain of the access network.
The present document contains:
• a stage 1 description of the Lawful Interception service;
• a stage 2 description of the information flows between the functional entities (including the information
elements involved) and triggering events; and
• a stage 3 description of the protocol and procedures to be used in mapping from stage 2 information flows and
elements to Intercept Related Information (IRI) and Content of Communication (CC).
The present document is consistent with the definition of the Handover Interface, as described in ETSI
TS 102 232-1 [2].
NOTE 1: Layer 3 interception is described in ETSI TS 102 232-3 [12].
NOTE 2: Layer 2 interception is not applicable to the PS domain of the GSM/UMTS networks (ETSI
TS 123 060 [15]).
- Standard29 pagesEnglish languagesale 15% off
- Technical specification29 pagesEnglish languagesale 10% offe-Library read for1 day
- Technical specification29 pagesEnglish languagesale 10% offe-Library read for1 day
The present document contains a stage 1 like description of the interception information in relation to the process of
sending and receiving asynchronous messages. The present document also contains a stage 2 like description of when
Intercept Related Information (IRI) and Content of Communication (CC) need to be sent, and what information it needs
to contain.
Examples of asynchronous messages include email, unified messaging and chat applications.
The definition of handover transport and encoding of HI2 and HI3 is outside the scope of the present document. Refer
to ETSI TS 102 232-1 [3].
The present document is designed to be used where appropriate in conjunction with other deliverables that define the
service specific IRI data formats. The present document aligns with 3GPP TS 33.108 [5], ETSI TS 101 671 [i.3], ETSI
TS 101 331 [1] and ETSI TR 101 944 [i.1].
- Standard57 pagesEnglish languagesale 15% off
- Technical specification57 pagesEnglish languagesale 10% offe-Library read for1 day
The present document contains service-specific details for the handover of the lawfully intercepted PSTN/ISDN
Services (including emulated services such as those defined in ETSI ES 282 002 [i.3]) using packet-based techniques as
defined in ETSI TS 102 232-1 [2].
- Standard13 pagesEnglish languagesale 15% off
- Technical specification13 pagesEnglish languagesale 10% offe-Library read for1 day
The present document specifies an approach for the handover of the lawfully-intercepted information that is defined in
the two standards: 3GPP TS 33.108 [3] and 3GPP TS 33.128 [6]. The present document uses the handover techniques
defined in ETSI TS 102 232-1 [2]. In this way, the present document allows additional services to be delivered through
a common interface.
3GPP TS 33.108
The scope of the present document includes the handover of lawfully-intercepted information from the following parts
of 3GPP TS 33.108 [3]:
• Intercept Related Information (IRI) and the Content of Communication (CC) from the mobile circuit-switched
domain (3GPP TS 33.108 [3], clause 5).
• IRI and CC from the mobile packet-switched domain (3GPP TS 33.108 [3], clause 6).
• IRI and CC from the multi-media domain (3GPP TS 33.108 [3], clause 7).
• IRI and CC from the EPS domain (3GPP TS 33.108 [3], clause 10).
• IRI and CC from the IMS Conference domain (3GPP TS 33.108 [3], clause 11).
• IRI and CC from the IMS-based VoIP domain (3GPP TS 33.108 [3], clause 12).
• IRI from the Proximity Services domain (3GPP TS 33.108 [3], clause 13).
• IRI and CC from the Group Communication System Enablers domain (3GPP TS 33.108 [3], clause 14).
The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 [3].
3GPP TS 33.128
The scope of the present document includes the handover of lawfully-intercepted information in accordance with 3GPP TS 33.128 [6].
- Standard19 pagesEnglish languagesale 15% off
- Technical specification19 pagesEnglish languagesale 10% offe-Library read for1 day
The present document is step 3 of a three-step approach to describe a generic Handover Interface (HI) for the provision
of lawful interception from a Network Operator, an Access Provider or a Service Provider (NWO/AP/SvP) to the
Law Enforcement Agencies (LEAs). The provision of lawful interception is a requirement of national law, which is
usually mandatory for the operation of any telecommunication service.
Step 1 contains the requirements for lawful interception from a users (LEAs) point of view and is published in ETSI
TS 101 331 [1].
Step 2 describes the derived network functions and the general architecture (or functional model) and is published in
ETSI ES 201 158 [2].
The present document specifies:
• the generic flow of information as well as the procedures and information elements, which are applicable to
any future telecommunication network or service;
• the network/service specific protocols relating to the provision of lawful interception at the Handover Interface
(HI), for the following networks/services:
- switched circuit; and
- packet data.
The technologies covered in the present document are: GSM, TETRA, GPRS, ISDN, PSTN, fixed NGN (including
PSTN/ISDN emulation) and fixed IMS PSTN simulation.
NOTE: As new networks and/or services are developed, the present document will be expanded as the relevant
standards become available.
- Standard128 pagesEnglish languagesale 15% off
- Standard128 pagesEnglish languagesale 15% off
- Standardization document128 pagesEnglish languagesale 10% offe-Library read for1 day