Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system of data interception

A monitoring method and data technology, which is applied in the field of communication, can solve problems such as the inconvenient implementation of monitoring and increase the difficulty of system maintenance, and achieve the effect of simplifying the implementation of monitoring and reducing the difficulty of maintenance

Active Publication Date: 2014-06-25
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the existing technology, whenever a new monitoring service is derived, LIG ​​needs to be adapted and modified, which increases the difficulty of maintaining the entire system, and the implementation of monitoring is not convenient enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system of data interception
  • Method, device and system of data interception
  • Method, device and system of data interception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In this embodiment, a monitoring management node is introduced on the network element side, and the monitoring management node can be deployed on any network element on the network element side. In this embodiment, the network element on which the monitoring management node is deployed is called a monitoring management network. Yuan. That is, in this embodiment, one network element is configured as a monitoring management network element, and other network elements in the IMS are monitored and managed, and call-related messages reported by other network elements are merged into a set of unified call-related messages, so that the IMS Multiple network elements are virtualized into one network element, and only one network element is presented to the LIG, so that the LIG no longer merges the call-related information reported by each network element, and does not need to adapt and modify various monitoring services.

[0030] image 3 It is a flowchart of Embodiment 1 of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a data interception method, device and system. The method includes: an interception management network element receiving a call relevant message reported by at least one managed network element in an IMS respectively, each call relevant message carrying a charging identifier of a corresponding call thereof respectively; the interception management network element combining each call relevant message according to the charging identifier; and the interception management network element reporting the combined call relevant message to an LIG, and the LIG intercepting the combined call relevant message. The device includes a first receiving module, a first combination module and a reporting module. The system includes a lawful interception gateway (LIG), an interception management network element and at least one managed network element. The interception management network element includes the abovementioned data interception device. As compared to the prior art, the embodiments of the present invention will not increase additional adaptation and modification workload, reducing the maintenance difficulty of the interception system and simplifying the interception implementation.

Description

technical field [0001] The embodiments of the present invention relate to communication technologies, and in particular to a data monitoring method, device and system. Background technique [0002] Lawful interception refers to the national security agency's monitoring of a user's communication process in accordance with the law. The content of the monitoring includes signaling and media-level data. figure 1 It is a schematic diagram of the structural relationship of monitoring functional entities in the prior art, such as figure 1 As shown, the lawful interception in the circuit domain generally adopts a network structure conforming to the interception protocol of The 3rd Generation Partner Project (hereinafter referred to as: 3GPP) and the European Telecommunications Standards Institute (hereinafter referred to as: ETSI). A Lawful Interception Gateway (hereinafter referred to as: LIG) may include a law enforcement monitoring facility (Law Enforcement Monitoring Facility; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W24/04
CPCH04L67/025H04L63/306
Inventor 刘庄田彦峰张小东
Owner HUAWEI TECH CO LTD