Unlock instant, AI-driven research and patent intelligence for your innovation.

Interception equipment, method and system

A monitoring method and technology of monitoring equipment, applied in the communication field, can solve problems such as NE side monitoring data leakage, and achieve the effect of ensuring security

Active Publication Date: 2013-08-28
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide a monitoring device, monitoring method and system to solve the problem of the risk of monitoring data leakage on the NE side and ensure the security of user monitoring data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interception equipment, method and system
  • Interception equipment, method and system
  • Interception equipment, method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 2 It is a schematic flow chart of Embodiment 1 of the monitoring method of the present invention. This method may be executed by the NE, such as figure 2 As shown, the monitoring method of this embodiment may include the following steps:

[0042] Step 201, when the communication service performed by the terminal is monitored, obtain the user identification corresponding to the communication service;

[0043] The NE monitors the communication service performed by the terminal. For example, the communication service may be the call service received by the NE, or the user location registration and power-on / off operation service handled by the NE, and the short message sending service obtained by the NE.

[0044] Step 202: Send a monitoring data request message to the monitoring gateway, where the monitoring data request message includes the user identifier, so as to trigger the monitoring gateway to perform monitoring services according to the monitoring data req...

Embodiment 2

[0050] image 3 It is a schematic flow chart of Embodiment 2 of the monitoring method of the present invention. This embodiment is based on Embodiment 1 and further illustrates the operation of the NE after sending the monitoring data request message; image 3 As shown, the method may include the following steps:

[0051] Step 301, when the communication service performed by the terminal is monitored, obtain the user identification corresponding to the communication service;

[0052] Wherein, in addition to obtaining the user identification corresponding to the communication service, when the NE monitors the communication service performed by the terminal, it can also obtain corresponding service information according to different types of communication services.

[0053] For example, if the communication service is a short message service, the user number and content of the short message can be obtained; if the communication service is a location registration and power on / of...

Embodiment 3

[0067] Figure 4 It is a schematic flow chart of Embodiment 3 of the listening method of the present invention, the method may be executed by LIG, such as Figure 4 As shown, the monitoring method of this embodiment may include the following steps:

[0068] Step 401, receiving the monitoring data request message sent by the monitoring device, the monitoring data request message including the user identification corresponding to the communication service;

[0069] The LIG receives the monitoring data request message sent by the NE, and the message carries the user identifier obtained when the NE monitors the communication service of the terminal.

[0070] Step 402, when it is determined according to the user identifier that there is interception data corresponding to the user identifier, obtain interception information corresponding to the user identifier and report to the interception center.

[0071] Specifically, the LIG may query whether the local database stores the inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide an interception apparatus, an interception method, and a system. The interception method comprises: when a communication service implemented at a terminal is detected, acquiring a user identifier corresponding to the communication service; and sending an interception data request message to an interception gateway, the interception data request message comprising the user identifier and a service type of the communication service, so as to trigger the inception gateway to perform service interception according to the interception data request message. For the interception apparatus, interception method, and system according to the embodiments of the present invention, an NE sends an interception data request message to an LIG to query whether a user identifier is intercepted, and the NE performs interception according to interception data returned by the LIG, so that the NE side no longer needs to store interception data of a user and solves the problem of the leakage risk of interception data at the NE side, thereby guaranteeing the safety of the interception data of the user.

Description

technical field [0001] The embodiments of the present invention relate to communication technologies, and in particular to a monitoring device, a monitoring method and a system. Background technique [0002] Lawful interception refers to the monitoring of a user's communication process by national security agencies in accordance with the law. Lawful interception in the circuit domain generally adopts a network structure that conforms to the 3GPPETSI interception protocol. [0003] In the prior art, the monitoring function can usually be implemented through signaling interaction between a Lawful Interception Gateway (LIG for short) and a Network Element (NE for short). Specifically, the LIG receives the monitoring data and stores the monitoring data in a local database; the monitoring data can be used to set and control the monitored user. Then, the LIG sets the monitoring data to the NE, and the NE stores the monitoring data locally. Then, the NE can monitor the controlle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W24/00H04W12/03
CPCH04W12/00H04M15/43H04M15/47H04L63/30H04M15/62H04M3/2281H04L63/306
Inventor 刘庄王宏磊曹广传
Owner HUAWEI TECH CO LTD