Interception equipment, method and system
A monitoring method and technology for monitoring equipment, applied in the field of communication, can solve the problems of monitoring data leakage on the NE side, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] figure 2 It is a schematic flow chart of Embodiment 1 of the monitoring method of the present invention. This method may be executed by the NE, such as figure 2 As shown, the monitoring method of this embodiment may include the following steps:
[0042] Step 201, when the communication service performed by the terminal is monitored, obtain the user identification corresponding to the communication service;
[0043] The NE monitors the communication service performed by the terminal. For example, the communication service may be the call service received by the NE, or the user location registration and power-on / off operation service handled by the NE, and the short message sending service obtained by the NE.
[0044] Step 202: Send a monitoring data request message to the monitoring gateway, where the monitoring data request message includes the user identifier, so as to trigger the monitoring gateway to perform monitoring services according to the monitoring data req...
Embodiment 2
[0050] image 3 It is a schematic flow chart of Embodiment 2 of the monitoring method of the present invention. This embodiment is based on Embodiment 1 and further illustrates the operation of the NE after sending the monitoring data request message; image 3 As shown, the method may include the following steps:
[0051] Step 301, when the communication service performed by the terminal is monitored, obtain the user identification corresponding to the communication service;
[0052] Wherein, in addition to obtaining the user identification corresponding to the communication service, when the NE monitors the communication service performed by the terminal, it can also obtain corresponding service information according to different types of communication services.
[0053] For example, if the communication service is a short message service, the user number and content of the short message can be obtained; if the communication service is a location registration and power on / of...
Embodiment 3
[0067] Figure 4 It is a schematic flow chart of Embodiment 3 of the listening method of the present invention, the method may be executed by LIG, such as Figure 4 As shown, the monitoring method of this embodiment may include the following steps:
[0068] Step 401, receiving the monitoring data request message sent by the monitoring device, the monitoring data request message including the user identification corresponding to the communication service;
[0069] The LIG receives the monitoring data request message sent by the NE, and the message carries the user identifier obtained when the NE monitors the communication service of the terminal.
[0070] Step 402, when it is determined according to the user identifier that there is interception data corresponding to the user identifier, obtain interception information corresponding to the user identifier and report to the interception center.
[0071] Specifically, the LIG may query whether the local database stores the inte...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 