Methods and nodes in lawful interception system
A lawful interception and node technology, which is applied in the field of LI systems and can solve problems such as the impact of the core network
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031]In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular circuits, circuit components, techniques, etc., in order to provide a thorough understanding of the present technology for addressing at least one of the stated problems. It will be apparent, however, to one skilled in the art that the present techniques for solving the problems may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known methods, devices, and circuits are omitted so as not to obscure the description of the technology with unnecessary detail.
[0032] figure 1 The communication system and LI core network 100 are shown, where MC 180 is served by CS network 110 .
[0033] The system and network 100 includes a number of entities. An exemplary LI system includes a monitoring center MC 180 . The MC preferably involves a Law Enforcement Management Function (...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


