Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and application server for realizing lawful interception in ims network

An application server, lawful interception technology, applied in the field of communication, can solve the problems of copying and transmission, achieve the effect of clear structure, reduce the interaction of messages, performance and efficiency will not decline

Active Publication Date: 2019-12-13
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Aiming at the problem of how to forward, copy and deliver the calling and called media in the current codec conversion call scheme to realize legal interception, the present invention provides a method, device and application server for realizing legal interception in an IMS network. To solve the above technical problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and application server for realizing lawful interception in ims network
  • Method, device and application server for realizing lawful interception in ims network
  • Method, device and application server for realizing lawful interception in ims network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Figure 4 It is a flowchart of a method for implementing lawful interception in an IMS network according to Embodiment 1 of the present invention, as shown in Figure 4 As shown, the method includes the following steps:

[0049] Step S402, after receiving the call request message initiated by the S-CSCF, the AS management entity determines an AS sequence to be triggered based on preset conditions; wherein, the call request message is: initiated by the S-CSCF, passed through the protocol adaptation entity Decode and adapt the call request message.

[0050] Step S404, the AS management entity converts the call request message into an internal call request message, sequentially triggers each AS in the AS sequence to be triggered, and sends the internal call request message to each AS in sequence, after each AS is triggered , receiving the internal call request response message sent back by each AS; the AS management entity converts the received internal call request resp...

Embodiment approach

[0054] 1) If the MO indication is carried in the call request message, the calling application server O-AS is added to the AS sequence to be triggered, and if the MT indication is carried, the called application server T-AS is added to the AS sequence to be triggered;

[0055] 2) If the service on the calling side is a multi-party call service, the codec conversion application server TC-AS is not added to the AS sequence to be triggered, and no judgment is made on whether to perform codec conversion in advance;

[0056] 3) Based on whether the calling user or the called user is monitored, determine whether to trigger the monitoring application server LI-AS, if yes, add the LI-AS to the AS sequence to be triggered, if not, do not add the LI-AS to the AS sequence to be triggered AS sequence;

[0057] 4) Determine whether to trigger codec conversion application server TC-AS based on whether pre-codec conversion is performed, if yes, add LI-AS to the AS sequence to be triggered, if ...

Embodiment 2

[0064] Figure 5 It is a structural block diagram of a device for implementing lawful interception in an IMS network according to Embodiment 2 of the present invention, as shown in Figure 5 As shown, the device is applied to the AS management entity, and the device includes:

[0065] The sequence establishment module 10 is used to determine an AS sequence to be triggered based on preset conditions after receiving the call request message initiated by the S-CSCF;

[0066] The static trigger module 20 converts the call request message into an internal call request message, sequentially triggers each AS in the AS sequence to be triggered, and sends the internal call request message to each AS in turn, after each AS trigger is completed, Receive the internal call request response message sent back by each AS; then convert the received internal call request response message sent back by the last AS into a call request response message, and send it to the S-CSCF;

[0067] The cal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for implementing lawful interception in an IMS (IP Multimedia Subsystem) network and an application server in the IMS network. According to the method and device and the application server, by two static and dynamic triggering management mechanisms of an AS (Application Server) management entity on an O-AS or a T-AS, an LI-AS and a TC-AS, lawful interception in two call scenes of TransCoding in advance and TransCoding after a media negotiation failure is implemented, and an interception range of lawful interception is enlarged. The method, the device and the application server which are disclosed by the invention solve the problem of how to carry out forwarding, copying and transmission on an originating call and a terminating call so as to implement lawful interception in a current coding and decoding transformation calling scheme.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, device and application server for realizing lawful interception in an IMS network. Background technique [0002] The IP Multimedia Subsystem The IMS (IP Multimedia Subsystem) is a subsystem of IP multimedia services proposed by the 3rd Generation Partnership Project (The 3rd Generation Partner Project, 3GPP for short). IMS adopts an architecture independent of access technology, and has the following technical features: session control based on Session Initiation Protocol (SIP), independent of access, separation of service and control, and provision of rich composite services. The feature of separation of service and control is mainly reflected in that they are respectively implemented by two network elements, an application server (Application Server, AS for short) and a call session control function (Call Session Control Function, CSCF for short). SIP AS is an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 魏磊
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products