Method, device and application server for realizing lawful interception in ims network
An application server, lawful interception technology, applied in the field of communication, can solve the problems of copying and transmission, achieve the effect of clear structure, reduce the interaction of messages, performance and efficiency will not decline
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] Figure 4 It is a flowchart of a method for implementing lawful interception in an IMS network according to Embodiment 1 of the present invention, as shown in Figure 4 As shown, the method includes the following steps:
[0049] Step S402, after receiving the call request message initiated by the S-CSCF, the AS management entity determines an AS sequence to be triggered based on preset conditions; wherein, the call request message is: initiated by the S-CSCF, passed through the protocol adaptation entity Decode and adapt the call request message.
[0050] Step S404, the AS management entity converts the call request message into an internal call request message, sequentially triggers each AS in the AS sequence to be triggered, and sends the internal call request message to each AS in sequence, after each AS is triggered , receiving the internal call request response message sent back by each AS; the AS management entity converts the received internal call request resp...
Embodiment approach
[0054] 1) If the MO indication is carried in the call request message, the calling application server O-AS is added to the AS sequence to be triggered, and if the MT indication is carried, the called application server T-AS is added to the AS sequence to be triggered;
[0055] 2) If the service on the calling side is a multi-party call service, the codec conversion application server TC-AS is not added to the AS sequence to be triggered, and no judgment is made on whether to perform codec conversion in advance;
[0056] 3) Based on whether the calling user or the called user is monitored, determine whether to trigger the monitoring application server LI-AS, if yes, add the LI-AS to the AS sequence to be triggered, if not, do not add the LI-AS to the AS sequence to be triggered AS sequence;
[0057] 4) Determine whether to trigger codec conversion application server TC-AS based on whether pre-codec conversion is performed, if yes, add LI-AS to the AS sequence to be triggered, if ...
Embodiment 2
[0064] Figure 5 It is a structural block diagram of a device for implementing lawful interception in an IMS network according to Embodiment 2 of the present invention, as shown in Figure 5 As shown, the device is applied to the AS management entity, and the device includes:
[0065] The sequence establishment module 10 is used to determine an AS sequence to be triggered based on preset conditions after receiving the call request message initiated by the S-CSCF;
[0066] The static trigger module 20 converts the call request message into an internal call request message, sequentially triggers each AS in the AS sequence to be triggered, and sends the internal call request message to each AS in turn, after each AS trigger is completed, Receive the internal call request response message sent back by each AS; then convert the received internal call request response message sent back by the last AS into a call request response message, and send it to the S-CSCF;
[0067] The cal...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com