Lawful Interception (LI) - Retained data handling - Handover interface for the request and delivery of retained data

RTS/LI-00231

Zakonito prestrezanje (LI) - Ravnanje z zadržanimi podatki - Izročilni vmesnik za zahtevo in izročanje zadržanih podatkov

General Information

Status
Published
Publication Date
12-Jan-2023
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
12-Jan-2023
Due Date
19-Mar-2023
Completion Date
13-Jan-2023

Buy Standard

Standard
ETSI TS 102 657 V1.29.1 (2022-12) - Lawful Interception (LI); Retained data handling; Handover interface for the request and delivery of retained data
English language
102 pages
sale 15% off
Preview
sale 15% off
Preview
Technical specification
SIST-TS ETSI/TS 102 657 V1.29.1:2023 - BARVE
English language
102 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

ETSI TS 102 657 V1.29.1 (2022-12)
TECHNICAL SPECIFICATION
Lawful Interception (LI);
Retained data handling;
Handover interface for the request and
delivery of retained data
---------------------- Page: 1 ----------------------
2 ETSI TS 102 657 V1.29.1 (2022-12)
Reference
RTS/LI-00231
Keywords
handover, retention
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx

If you find a security vulnerability in the present document, please report it through our

Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

No representation or warranty is made that this deliverable is technically accurate or sufficient or conforms to any law

and/or governmental rule and/or regulation and further, no representation or warranty is made of merchantability or fitness

for any particular purpose or against infringement of intellectual property rights.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2022.
All rights reserved.
ETSI
---------------------- Page: 2 ----------------------
3 ETSI TS 102 657 V1.29.1 (2022-12)
Contents

Intellectual Property Rights ................................................................................................................................ 9

Foreword ............................................................................................................................................................. 9

Modal verbs terminology .................................................................................................................................... 9

1 Scope ...................................................................................................................................................... 10

2 References .............................................................................................................................................. 10

2.1 Normative references ....................................................................................................................................... 10

2.2 Informative references ...................................................................................................................................... 13

3 Definition of terms, symbols and abbreviations ..................................................................................... 13

3.1 Terms ................................................................................................................................................................ 13

3.2 Symbols ............................................................................................................................................................ 14

3.3 Abbreviations ................................................................................................................................................... 14

4 Overview of handover interface ............................................................................................................. 17

4.1 Reference model ............................................................................................................................................... 17

4.2 Structure of document and applicable communication domains ...................................................................... 18

4.3 Categories of retained data ............................................................................................................................... 19

4.4 Handover Interface port 1 (HI-A) and Handover Interface port 2 (HI-B) ........................................................ 19

4.5 Model used for the RDHI ................................................................................................................................. 20

5 Handover interface message flows ......................................................................................................... 20

5.1 Overview .......................................................................................................................................................... 20

5.1.1 Summary of this clause ............................................................................................................................... 20

5.1.2 Message flow modes ................................................................................................................................... 20

5.1.3 Delivery cases ............................................................................................................................................. 21

5.1.4 "Active" requests and "closed" requests ..................................................................................................... 21

5.1.5 Errors and failure situations ........................................................................................................................ 21

5.1.5.1 Error and failure types ........................................................................................................................... 21

5.1.5.2 Request process failure feedback .......................................................................................................... 22

5.1.5.3 Other errors ........................................................................................................................................... 22

5.1.5.4 Missing messages .................................................................................................................................. 22

5.1.6 Cancelling a request .................................................................................................................................... 23

5.1.7 Delivery of results ....................................................................................................................................... 23

5.1.8 State diagram .............................................................................................................................................. 24

5.1.9 Supplementary Messages ............................................................................................................................ 25

5.2 Message flows for general situation ................................................................................................................. 25

5.2.1 Delivery of a response ................................................................................................................................ 25

5.2.2 Cancellation of request ............................................................................................................................... 26

5.2.3 Multi-part delivery ...................................................................................................................................... 27

5.3 Message flows for Authorized-Organization-initiated scenario ....................................................................... 28

5.3.1 Delivery of results or a failure response ..................................................................................................... 28

5.3.2 Cancellation of request ............................................................................................................................... 29

5.3.3 Multi-part delivery ...................................................................................................................................... 30

5.4 Message types for HI-A and HI-B .................................................................................................................... 31

5.5 HI-A and HI-B addressing................................................................................................................................ 32

6 Definition of the elements for retained data messages ........................................................................... 32

6.1 Header information........................................................................................................................................... 32

6.1.1 Use of header information .......................................................................................................................... 32

6.1.2 RequestID field specification ...................................................................................................................... 32

6.1.3 CSP Identifiers ............................................................................................................................................ 33

6.1.3.1 Use of CSP identifiers (CSPID) ............................................................................................................ 33

6.1.3.2 Third Party CSP Identifier (thirdPartyCSPID) ...................................................................................... 33

6.1.4 Timestamp (timeStamp) ............................................................................................................................. 33

6.1.5 RequestType (requestType) ........................................................................................................................ 33

6.1.6 RequestFlag (requestFlag) .......................................................................................................................... 33

6.2 Retained Data response .................................................................................................................................... 33

ETSI
---------------------- Page: 3 ----------------------
4 ETSI TS 102 657 V1.29.1 (2022-12)

6.2.1 General ........................................................................................................................................................ 33

6.2.2 Additional information in response messages............................................................................................. 34

6.2.2.1 Record number (recordNumber) ........................................................................................................... 34

6.2.2.2 Response status (ResponseStatus) ......................................................................................................... 34

6.2.3 Volatile information .................................................................................................................................... 34

6.2.4 Unavailable parameters ............................................................................................................................... 34

6.3 Retained Data requests ..................................................................................................................................... 35

6.3.1 Information contained within a request ...................................................................................................... 35

6.3.2 Format of a request ..................................................................................................................................... 35

6.3.3 Additional information in requests ............................................................................................................. 36

6.3.3.1 Priority of a request ............................................................................................................................... 36

6.3.3.2 Maximum hits ....................................................................................................................................... 36

6.3.3.3 Maximum records per batch .................................................................................................................. 36

6.3.3.4 Number of records limit ........................................................................................................................ 37

6.4 Error messages ................................................................................................................................................. 37

7 Data exchange techniques ...................................................................................................................... 37

7.1 General ............................................................................................................................................................. 37

7.2 HTTP data exchange ........................................................................................................................................ 37

7.2.1 Basic configuration ..................................................................................................................................... 37

7.2.2 Single client/server ..................................................................................................................................... 38

7.2.3 Mutual client/server .................................................................................................................................... 38

7.2.4 Details common to both single and mutual cases ....................................................................................... 38

7.3 Direct TCP data exchange ................................................................................................................................ 38

7.3.0 General ........................................................................................................................................................ 38

7.3.1 Application layer ........................................................................................................................................ 39

7.3.2 Transport layer ............................................................................................................................................ 39

7.3.2.1 Introduction ........................................................................................................................................... 39

7.3.2.2 TCP settings .......................................................................................................................................... 39

7.3.3 Network layer ............................................................................................................................................. 39

7.3.4 Delivery networks ....................................................................................................................................... 39

8 Security Measures .................................................................................................................................. 40

8.1 General ............................................................................................................................................................. 40

8.2 Connection Level Security ............................................................................................................................... 40

8.3 Application Level Security ............................................................................................................................... 40

8.4 Technical Security Measures ............................................................................................................................ 41

8.4.1 General ........................................................................................................................................................ 41

8.4.2 Connection Level ........................................................................................................................................ 41

8.4.3 Application Level ....................................................................................................................................... 41

8.4.3.1 Hashes ................................................................................................................................................... 41

8.4.3.2 Digital Signatures .................................................................................................................................. 41

8.4.3.3 HI-B Non-Repudiation .......................................................................................................................... 41

8.4.3.4 Digital Signatures and Message Structure ............................................................................................. 42

Annex A (normative): Data fields ....................................................................................................... 43

A.1 Summary ................................................................................................................................................ 43

A.1.1 Introduction to data fields ................................................................................................................................. 43

A.1.2 Choice of data modelling language .................................................................................................................. 43

A.1.3 Overview .......................................................................................................................................................... 43

A.2 Parameter definition for common fields ................................................................................................. 44

A.2.1 RetainedDataHeader ......................................................................................................................................... 44

A.2.1.1 Parameters................................................................................................................................................... 44

A.2.1.2 RequestID parameters ................................................................................................................................. 44

A.2.2 RetainedDataPayload ....................................................................................................................................... 44

A.2.2.1 RequestMessage parameters ....................................................................................................................... 44

A.2.2.2 RequestAcknowledgement parameters ....................................................................................................... 45

A.2.2.3 ResponseMessage parameters ..................................................................................................................... 45

A.2.2.4 GetStatusMessage parameters .................................................................................................................... 45

A.2.2.5 StatusMessage parameters .......................................................................................................................... 45

A.2.2.6 ErrorMessage parameters ........................................................................................................................... 46

ETSI
---------------------- Page: 4 ----------------------
5 ETSI TS 102 657 V1.29.1 (2022-12)

A.2.3 GenericSubscriberInfo ...................................................................................................................................... 46

A.2.3.1 Parameters................................................................................................................................................... 46

A.2.3.2 OrganizationInfo parameters ...................................................................................................................... 46

A.2.3.3 IndividualInfo parameters ........................................................................................................................... 47

A.2.3.4 ContractInformation parameters ................................................................................................................. 47

A.2.4 PaymentDetails ................................................................................................................................................. 48

A.3 ASN.1 definitions ................................................................................................................................... 48

A.3.1 General ............................................................................................................................................................. 48

A.3.1.1 ASN.1 syntax tree ....................................................................................................................................... 48

A.3.1.2 General remarks on ASN.1 ......................................................................................................................... 48

A.3.2 ASN.1 Definitions for message headers ........................................................................................................... 49

A.3.2.1 Message wrappers ....................................................................................................................................... 49

A.3.2.2 Message headers ......................................................................................................................................... 49

A.3.3 ASN.1 definitions for common fields............................................................................................................... 49

A.3.4 Void .................................................................................................................................................................. 49

Annex B (normative): Service-specific details for telephony services ............................................. 50

B.1 Scope ...................................................................................................................................................... 50

B.2 Telephony fields ..................................................................................................................................... 50

B.2.1 General ............................................................................................................................................................. 50

B.2.2 Telephony Subscriber ....................................................................................................................................... 50

B.2.2.0 General ........................................................................................................................................................ 50

B.2.2.1 subscriber ID ............................................................................................................................................... 50

B.2.2.2 genericSubscriberInfo ................................................................................................................................. 51

B.2.2.3 telephonySubscriberInfo ............................................................................................................................. 51

B.2.2.4 subscribedTelephonyServices ..................................................................................................................... 51

B.2.2.4.1 Description ............................................................................................................................................ 51

B.2.3 Telephony Billing Details ................................................................................................................................ 52

B.2.3.0 General ........................................................................................................................................................ 52

B.2.3.1 BillingRecords ............................................................................................................................................ 52

B.2.4 TelephonyServiceUsage ................................................................................................................................... 53

B.2.4.1 Parameters................................................................................................................................................... 53

B.2.4.2 PartyInformation ......................................................................................................................................... 53

B.2.4.3 SMSInformation ......................................................................................................................................... 54

B.2.4.4 MmsInformation ......................................................................................................................................... 54

B.2.5 TelephonyDevice.............................................................................................................................................. 55

B.2.5.1 General ........................................................................................................................................................ 55

B.2.6 TelephonyNetworkElement .............................................................................................................................. 55

B.2.6.1 General ........................................................................................................................................................ 55

B.2.6.2 Location parameters .................................................................................................................................... 55

B.2.6.2.1 General .................................................................................................................................................. 55

B.2.6.2.2 GSM Location Information ................................................................................................................... 57

B.2.6.2.3 UMTS Location Information ................................................................................................................ 57

B.2.6.2.4 Extended Location ................................................................................................................................ 57

B.2.6.3 TransmitterDetails parameters .................................................................................................................... 58

B.2.6.3.1 General .................................................................................................................................................. 58

B.3 ASN.1 definitions for telephony ............................................................................................................ 58

B.4 Void ........................................................................................................................................................ 58

Annex C (normative): Service-specific details for asynchronous message services ....................... 59

C.1 Scope ...................................................................................................................................................... 59

C.2 Descriptions ............................................................................................................................................ 59

C.2.1 General ...................................................................................................................................................

...

SLOVENSKI STANDARD
SIST-TS ETSI/TS 102 657 V1.29.1:2023
01-marec-2023

Zakonito prestrezanje (LI) - Ravnanje z zadržanimi podatki - Izročilni vmesnik za

zahtevo in izročanje zadržanih podatkov

Lawful Interception (LI) - Retained data handling - Handover interface for the request and

delivery of retained data
Ta slovenski standard je istoveten z: ETSI TS 102 657 V1.29.1 (2022-12)
ICS:
33.040.40 Podatkovna komunikacijska Data communication
omrežja networks
35.200 Vmesniška in povezovalna Interface and interconnection
oprema equipment
SIST-TS ETSI/TS 102 657 V1.29.1:2023 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST-TS ETSI/TS 102 657 V1.29.1:2023
---------------------- Page: 2 ----------------------
SIST-TS ETSI/TS 102 657 V1.29.1:2023
ETSI TS 102 657 V1.29.1 (2022-12)
TECHNICAL SPECIFICATION
Lawful Interception (LI);
Retained data handling;
Handover interface for the request and
delivery of retained data
---------------------- Page: 3 ----------------------
SIST-TS ETSI/TS 102 657 V1.29.1:2023
2 ETSI TS 102 657 V1.29.1 (2022-12)
Reference
RTS/LI-00231
Keywords
handover, retention
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx

If you find a security vulnerability in the present document, please report it through our

Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

No representation or warranty is made that this deliverable is technically accurate or sufficient or conforms to any law

and/or governmental rule and/or regulation and further, no representation or warranty is made of merchantability or fitness

for any particular purpose or against infringement of intellectual property rights.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2022.
All rights reserved.
ETSI
---------------------- Page: 4 ----------------------
SIST-TS ETSI/TS 102 657 V1.29.1:2023
3 ETSI TS 102 657 V1.29.1 (2022-12)
Contents

Intellectual Property Rights ................................................................................................................................ 9

Foreword ............................................................................................................................................................. 9

Modal verbs terminology .................................................................................................................................... 9

1 Scope ...................................................................................................................................................... 10

2 References .............................................................................................................................................. 10

2.1 Normative references ....................................................................................................................................... 10

2.2 Informative references ...................................................................................................................................... 13

3 Definition of terms, symbols and abbreviations ..................................................................................... 13

3.1 Terms ................................................................................................................................................................ 13

3.2 Symbols ............................................................................................................................................................ 14

3.3 Abbreviations ................................................................................................................................................... 14

4 Overview of handover interface ............................................................................................................. 17

4.1 Reference model ............................................................................................................................................... 17

4.2 Structure of document and applicable communication domains ...................................................................... 18

4.3 Categories of retained data ............................................................................................................................... 19

4.4 Handover Interface port 1 (HI-A) and Handover Interface port 2 (HI-B) ........................................................ 19

4.5 Model used for the RDHI ................................................................................................................................. 20

5 Handover interface message flows ......................................................................................................... 20

5.1 Overview .......................................................................................................................................................... 20

5.1.1 Summary of this clause ............................................................................................................................... 20

5.1.2 Message flow modes ................................................................................................................................... 20

5.1.3 Delivery cases ............................................................................................................................................. 21

5.1.4 "Active" requests and "closed" requests ..................................................................................................... 21

5.1.5 Errors and failure situations ........................................................................................................................ 21

5.1.5.1 Error and failure types ........................................................................................................................... 21

5.1.5.2 Request process failure feedback .......................................................................................................... 22

5.1.5.3 Other errors ........................................................................................................................................... 22

5.1.5.4 Missing messages .................................................................................................................................. 22

5.1.6 Cancelling a request .................................................................................................................................... 23

5.1.7 Delivery of results ....................................................................................................................................... 23

5.1.8 State diagram .............................................................................................................................................. 24

5.1.9 Supplementary Messages ............................................................................................................................ 25

5.2 Message flows for general situation ................................................................................................................. 25

5.2.1 Delivery of a response ................................................................................................................................ 25

5.2.2 Cancellation of request ............................................................................................................................... 26

5.2.3 Multi-part delivery ...................................................................................................................................... 27

5.3 Message flows for Authorized-Organization-initiated scenario ....................................................................... 28

5.3.1 Delivery of results or a failure response ..................................................................................................... 28

5.3.2 Cancellation of request ............................................................................................................................... 29

5.3.3 Multi-part delivery ...................................................................................................................................... 30

5.4 Message types for HI-A and HI-B .................................................................................................................... 31

5.5 HI-A and HI-B addressing................................................................................................................................ 32

6 Definition of the elements for retained data messages ........................................................................... 32

6.1 Header information........................................................................................................................................... 32

6.1.1 Use of header information .......................................................................................................................... 32

6.1.2 RequestID field specification ...................................................................................................................... 32

6.1.3 CSP Identifiers ............................................................................................................................................ 33

6.1.3.1 Use of CSP identifiers (CSPID) ............................................................................................................ 33

6.1.3.2 Third Party CSP Identifier (thirdPartyCSPID) ...................................................................................... 33

6.1.4 Timestamp (timeStamp) ............................................................................................................................. 33

6.1.5 RequestType (requestType) ........................................................................................................................ 33

6.1.6 RequestFlag (requestFlag) .......................................................................................................................... 33

6.2 Retained Data response .................................................................................................................................... 33

ETSI
---------------------- Page: 5 ----------------------
SIST-TS ETSI/TS 102 657 V1.29.1:2023
4 ETSI TS 102 657 V1.29.1 (2022-12)

6.2.1 General ........................................................................................................................................................ 33

6.2.2 Additional information in response messages............................................................................................. 34

6.2.2.1 Record number (recordNumber) ........................................................................................................... 34

6.2.2.2 Response status (ResponseStatus) ......................................................................................................... 34

6.2.3 Volatile information .................................................................................................................................... 34

6.2.4 Unavailable parameters ............................................................................................................................... 34

6.3 Retained Data requests ..................................................................................................................................... 35

6.3.1 Information contained within a request ...................................................................................................... 35

6.3.2 Format of a request ..................................................................................................................................... 35

6.3.3 Additional information in requests ............................................................................................................. 36

6.3.3.1 Priority of a request ............................................................................................................................... 36

6.3.3.2 Maximum hits ....................................................................................................................................... 36

6.3.3.3 Maximum records per batch .................................................................................................................. 36

6.3.3.4 Number of records limit ........................................................................................................................ 37

6.4 Error messages ................................................................................................................................................. 37

7 Data exchange techniques ...................................................................................................................... 37

7.1 General ............................................................................................................................................................. 37

7.2 HTTP data exchange ........................................................................................................................................ 37

7.2.1 Basic configuration ..................................................................................................................................... 37

7.2.2 Single client/server ..................................................................................................................................... 38

7.2.3 Mutual client/server .................................................................................................................................... 38

7.2.4 Details common to both single and mutual cases ....................................................................................... 38

7.3 Direct TCP data exchange ................................................................................................................................ 38

7.3.0 General ........................................................................................................................................................ 38

7.3.1 Application layer ........................................................................................................................................ 39

7.3.2 Transport layer ............................................................................................................................................ 39

7.3.2.1 Introduction ........................................................................................................................................... 39

7.3.2.2 TCP settings .......................................................................................................................................... 39

7.3.3 Network layer ............................................................................................................................................. 39

7.3.4 Delivery networks ....................................................................................................................................... 39

8 Security Measures .................................................................................................................................. 40

8.1 General ............................................................................................................................................................. 40

8.2 Connection Level Security ............................................................................................................................... 40

8.3 Application Level Security ............................................................................................................................... 40

8.4 Technical Security Measures ............................................................................................................................ 41

8.4.1 General ........................................................................................................................................................ 41

8.4.2 Connection Level ........................................................................................................................................ 41

8.4.3 Application Level ....................................................................................................................................... 41

8.4.3.1 Hashes ................................................................................................................................................... 41

8.4.3.2 Digital Signatures .................................................................................................................................. 41

8.4.3.3 HI-B Non-Repudiation .......................................................................................................................... 41

8.4.3.4 Digital Signatures and Message Structure ............................................................................................. 42

Annex A (normative): Data fields ....................................................................................................... 43

A.1 Summary ................................................................................................................................................ 43

A.1.1 Introduction to data fields ................................................................................................................................. 43

A.1.2 Choice of data modelling language .................................................................................................................. 43

A.1.3 Overview .......................................................................................................................................................... 43

A.2 Parameter definition for common fields ................................................................................................. 44

A.2.1 RetainedDataHeader ......................................................................................................................................... 44

A.2.1.1 Parameters................................................................................................................................................... 44

A.2.1.2 RequestID parameters ................................................................................................................................. 44

A.2.2 RetainedDataPayload ....................................................................................................................................... 44

A.2.2.1 RequestMessage parameters ....................................................................................................................... 44

A.2.2.2 RequestAcknowledgement parameters ....................................................................................................... 45

A.2.2.3 ResponseMessage parameters ..................................................................................................................... 45

A.2.2.4 GetStatusMessage parameters .................................................................................................................... 45

A.2.2.5 StatusMessage parameters .......................................................................................................................... 45

A.2.2.6 ErrorMessage parameters ........................................................................................................................... 46

ETSI
---------------------- Page: 6 ----------------------
SIST-TS ETSI/TS 102 657 V1.29.1:2023
5 ETSI TS 102 657 V1.29.1 (2022-12)

A.2.3 GenericSubscriberInfo ...................................................................................................................................... 46

A.2.3.1 Parameters................................................................................................................................................... 46

A.2.3.2 OrganizationInfo parameters ...................................................................................................................... 46

A.2.3.3 IndividualInfo parameters ........................................................................................................................... 47

A.2.3.4 ContractInformation parameters ................................................................................................................. 47

A.2.4 PaymentDetails ................................................................................................................................................. 48

A.3 ASN.1 definitions ................................................................................................................................... 48

A.3.1 General ............................................................................................................................................................. 48

A.3.1.1 ASN.1 syntax tree ....................................................................................................................................... 48

A.3.1.2 General remarks on ASN.1 ......................................................................................................................... 48

A.3.2 ASN.1 Definitions for message headers ........................................................................................................... 49

A.3.2.1 Message wrappers ....................................................................................................................................... 49

A.3.2.2 Message headers ......................................................................................................................................... 49

A.3.3 ASN.1 definitions for common fields............................................................................................................... 49

A.3.4 Void .................................................................................................................................................................. 49

Annex B (normative): Service-specific details for telephony services ............................................. 50

B.1 Scope ...................................................................................................................................................... 50

B.2 Telephony fields ..................................................................................................................................... 50

B.2.1 General ............................................................................................................................................................. 50

B.2.2 Telephony Subscriber ....................................................................................................................................... 50

B.2.2.0 General ........................................................................................................................................................ 50

B.2.2.1 subscriber ID ............................................................................................................................................... 50

B.2.2.2 genericSubscriberInfo ................................................................................................................................. 51

B.2.2.3 telephonySubscriberInfo ............................................................................................................................. 51

B.2.2.4 subscribedTelephonyServices ..................................................................................................................... 51

B.2.2.4.1 Description ............................................................................................................................................ 51

B.2.3 Telephony Billing Details ................................................................................................................................ 52

B.2.3.0 General ........................................................................................................................................................ 52

B.2.3.1 BillingRecords ............................................................................................................................................ 52

B.2.4 TelephonyServiceUsage ................................................................................................................................... 53

B.2.4.1 Parameters................................................................................................................................................... 53

B.2.4.2 PartyInformation ......................................................................................................................................... 53

B.2.4.3 SMSInformation ......................................................................................................................................... 54

B.2.4.4 MmsInformation ......................................................................................................................................... 54

B.2.5 TelephonyDevice.............................................................................................................................................. 55

B.2.5.1 General ........................................................................................................................................................ 55

B.2.6 TelephonyNetworkElement .............................................................................................................................. 55

B.2.6.1 General ........................................................................................................................................................ 55

B.2.6.2 Location parameters .................................................................................................................................... 55

B.2.6.2.1 General .................................................................................................................................................. 55

B.2.6.2.2 GSM Location Information ................................................................................................................... 57

B.2.6.2.3 UMTS Location Information ................................................................................................................ 57

B.2.6.2.4 Extended Location ................................................................................................................................ 57

B.2.6.3 TransmitterDetails parameters .................................................................................................................... 58

B.2.6.3.1 General ..........................
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.