Lawful interception for 2g/3g equipment interworking with evolved packet system

作者: Raffaele De Santis , Maurizio Iovieno

DOI:

关键词:

摘要: A method for reducing consumption of resources lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected telecommunications network interworking with Evolved Packet System, comprises the steps of: at first node, detecting least parameter value in which has been activated; based on value, evaluating whether is intercepted retained second node crossed by same network; filtering out requests if located downstream node.

参考文章(32)
Manoj Sindhwani, Chander Raja, Shwu-Yan Scoggins, Surveillance implementation in a voice over packet network ,(2006)
András Császár, Jacob Österling, Anne-Marie Bosneag, Method and apparatus for influencing the selection of peer data sources in a p2p network ,(2008)
Rajesh Velandy, Rajesh Ramankutty, Sanil Kumar Puthiyandyil, Combined gateway for network communications ,(2009)
Antti Laurila, Jorma Seurujarvi, Seppo Kallio, Markus Martin, Martti Lumme, Method and system allowing lawful interception of connections such a voice-over-internet-protocol calls ,(2001)
Shiyong Tan, Weihua Wei, Yuxin Mao, Shibi Huang, Yan Li, Peng Zhao, Control method, system and function entity for reporting bearer event of signaling ip flow ,(2008)
Xavier Aubry, Martin Dahlstrand, Kimberly Lei, Frederik Andersson, Alex Cabrera, Method and system for wireless distribution of local information ,(2002)
Roberto Cicco, Rita Di Donato, Raffaele De Santis, Luca Di Serio, One activity report for interception purposes ,(2008)