Lawful interception using service-based interfaces in communication systems
11765597 · 2023-09-19
Assignee
Inventors
Cpc classification
International classification
Abstract
In a service provider network of a given communication system configured to support lawful interception functionality, one or more service-based interfaces are provisioned to enable interaction between one or more lawful interception-specific elements and one or more intercepting control elements. In one or more further implementations, methods provide for provisioning an interworking function specific for lawful interception functionality. The interworking function can be configured to support both service-based interfaces and point-to-point interfaces across a control plane and/or a user plane of the service provider network, as needed.
Claims
1. A method comprising: in a service provider network of a given communication system configured to support lawful interception functionality, provisioning one or more service-based interfaces to enable interaction between one or more lawful interception-specific elements and two or more intercepting control elements, wherein the one or more service-based interfaces enable direct interaction with each of the two or more intercepting control elements in the service provider network.
2. The method of claim 1, wherein the one or more lawful interception-specific elements comprise an administration function and one or more delivery functions.
3. The method of claim 2, wherein the administration function and the one or more delivery functions are operatively coupled to a monitoring entity.
4. The method of claim 1, wherein the two or more intercepting control elements comprise two or more network functions of the service provider network.
5. The method of claim 4, wherein at least one of the two or more network functions comprises a network function associated with at least one of a control plane and a user plane of the service provider network.
6. The method of claim 1, further comprising provisioning an interworking function specific for lawful interception functionality, wherein the interworking function comprises: a service-based interface to interact with the two or more intercepting control elements associated with a control plane of the service provider network; and a point-to-point interface to interact with at least a portion of the one or more lawful interception-specific elements.
7. The method of claim 1, further comprising provisioning an interworking function specific for lawful interception functionality, wherein the interworking function comprises: a service-based interface to interact with the two or more intercepting control elements associated with a control plane and a user plane of the service provider network; and a point-to-point interface to interact with at least a portion of the one or more lawful interception-specific elements.
8. The method of claim 1, wherein the one or more lawful interception-specific elements are configured to support the one or more service-based interfaces.
9. The method of claim 1, further comprising provisioning an interworking function specific for lawful interception functionality, wherein the interworking function comprises: a service-based interface to interact with the two or more intercepting control elements associated with a control plane and a user plane of the service provider network; and another service-based interface to interact with at least a portion of the one or more lawful interception-specific elements.
10. The method of claim 1, wherein the two or more intercepting control elements each comprise separate service-based interfaces wherein one of the service-based interfaces is dedicated to the lawful interception functionality.
11. The method of claim 1, further comprising provisioning one or more point-to-point interfaces to enable reference-point based interaction between the one or more lawful interception-specific elements and the two or more intercepting control elements, in addition to the one or more service-based interfaces.
12. The method of claim 1, wherein the communication system comprises a 5G system.
13. Apparatus comprising: in a service provider network of a given communication system configured to support lawful interception functionality, one or more service-based interfaces provisioned to enable interaction between one or more lawful interception-specific elements and two or more intercepting control elements, wherein the one or more service-based interfaces enable direct interaction with each of the two or more intercepting control elements in the service provider network.
14. The apparatus of claim 13, further comprising: an interworking function specific for lawful interception functionality, wherein the interworking function comprises: a service-based interface to interact with the two or more intercepting control elements associated with a control plane of the service provider network; and a point-to-point interface to interact with at least a portion of the one or more lawful interception-specific elements.
15. The apparatus of claim 13, wherein the one or more lawful interception-specific elements comprise an administration function and one or more delivery functions.
16. The apparatus of claim 13, wherein the two or more intercepting control elements comprise two or more network functions of the service provider network.
17. An article of manufacture comprising a non-transitory computer-readable storage medium having embodied therein executable program code that when executed by a processor causes the processor to perform step of: in a service provider network of a given communication system configured to support lawful interception functionality, provisioning one or more service-based interfaces to enable interaction between one or more lawful interception-specific elements and two or more intercepting control elements, wherein the one or more service-based interfaces enable direct interaction with each of the two or more intercepting control elements in the service provider network.
18. The article of claim 17, further configured to: provision an interworking function specific for lawful interception functionality, wherein the interworking function comprises: a service-based interface to interact with the two or more intercepting control elements associated with a control plane of the service provider network; and a point-to-point interface to interact with at least a portion of the one or more lawful interception-specific elements.
19. The article of claim 17, wherein the one or more lawful interception-specific elements comprise an administration function and one or more delivery functions.
20. The article of claim 17, wherein the two or more intercepting control elements comprise one or more network functions of the service provider network.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
DETAILED DESCRIPTION
(24) Embodiments will be illustrated herein in conjunction with example communication systems and associated techniques for providing lawful interception in communication systems. It should be understood, however, that the scope of the claims is not limited to particular types of communication systems and/or processes disclosed. Embodiments can be implemented in a wide variety of other types of communication systems, using alternative processes and operations. For example, although illustrated in the context of wireless cellular systems utilizing 3GPP system elements such as a 3GPP next generation system (5G), the disclosed embodiments can be adapted in a straightforward manner to a variety of other types of communication systems.
(25) In accordance with illustrative embodiments implemented in a 5G communication system environment, one or more 3GPP technical specifications (TS) and technical reports (TR) may provide further explanation of network elements/functions and/or operations that may interact with parts of the inventive solutions, e.g., the above-referenced 3GPP TS 23.501. Further, details relating to lawful interception in a 5G system are described in 3GPP TS 33.126, V15.1.0, entitled “Technical Specification Group Services and System Aspects; Security; Lawful Interception Requirements;” and 3GPP TS 33.127, V15.0.0, entitled “Technical Specification Group Services and System Aspects; Security; Lawful Interception Architecture and Functions,” the disclosures of which are incorporated by reference herein in their entireties. Other 3GPP TS/TR documents may provide other details that one of ordinary skill in the art will realize. However, while well-suited for 5G-related 3GPP standards, embodiments are not necessarily intended to be limited to any particular standards.
(26) Illustrative embodiments are related to lawful interception architectures for 5G networks. Prior to describing such illustrative embodiments, a general description of main components of a 5G network will be described below in the context of
(27)
(28) Accordingly, as shown, communication system 100 comprises user equipment (UE) 102 that communicates via an air interface 103 with an access point (gNB) 104. The UE 102 may be a mobile station, and such a mobile station may comprise, by way of example, a mobile telephone, a computer, or any other type of communication device. The term “user equipment” as used herein is therefore intended to be construed broadly, so as to encompass a variety of different types of mobile stations, subscriber stations or, more generally, communication devices, including examples such as a combination of a data card inserted in a laptop or other equipment such as a smart phone. Such communication devices are also intended to encompass devices commonly referred to as access terminals.
(29) In one embodiment, UE 102 is comprised of a Universal Integrated Circuit Card (UICC) part and a Mobile Equipment (ME) part. The UICC is the user-dependent part of the UE and contains at least one Universal Subscriber Identity Module (USIM) and appropriate application software. The USIM securely stores the permanent subscription identifier and its related key, which are used to identify and authenticate subscribers to access networks. The ME is the user-independent part of the UE and contains terminal equipment (TE) functions and various mobile termination (MT) functions.
(30) Note that, in one example, the permanent subscription identifier is an International Mobile Subscriber Identity (IMSI) of a UE. In one embodiment, the IMSI is a fixed 15-digit length and consists of a 3-digit Mobile Country Code (MCC), a 3-digit Mobile Network Code (MNC), and a 9-digit Mobile Station Identification Number (MSIN). In a 5G communication system, an IMSI is part of a Subscription Permanent Identifier (SUPI). In the case of an IMSI as a SUPI, the MSIN provides the subscriber identity. Thus, only the MSIN portion of the IMSI typically needs to be encrypted. The MNC and MCC portions of the IMSI provide routing information, used by the serving network to route to the correct home network.
(31) The access point 104 is illustratively part of an access network of the communication system 100. Such an access network may comprise, for example, a 5G System having a plurality of base stations and one or more associated radio network control functions. The base stations and radio network control functions may be logically separate entities, but in a given embodiment may be implemented in the same physical network element, such as, for example, a base station router or femto cellular access point.
(32) The access point 104 in this illustrative embodiment is operatively coupled to mobility management functions 106. In a 5G network, the mobility management function is implemented by an Access and Mobility Management Function (AMF). A Security Anchor Function (SEAF) can also be implemented with the AMF connecting a UE with the mobility management function. A mobility management function, as used herein, is the element or function (i.e., entity) in the core network (CN) part of the communication system that manages or otherwise participates in, among other network operations, access and mobility (including authentication/authorization) operations with the UE (through the access point 104). The AMF may also be referred to herein, more generally, as an access and mobility management entity.
(33) The AMF 106 in this illustrative embodiment is operatively coupled to home subscriber functions 108, i.e., one or more functions that are resident in the home network of the subscriber. As shown, some of these functions include the Unified Data Management (UDM) function, as well as an Authentication Server Function (AUSF). The AUSF and UDM (separately or collectively) may also be referred to herein, more generally, as an authentication entity. In addition, home subscriber functions may include, but are not limited to, Network Slice Selection Function (NSSF), Network Exposure Function (NEF), Network Repository Function (NRF), Policy Control Function (PCF), and Application Function (AF).
(34) One important point to note is that in an SBA communication system, such as a 5G system, the control plane uses a services model approach in which components (NFs) query the NRF to discover and communicate with each other over application programming interfaces (APIs).
(35) The access point 104 is also operatively coupled to a serving gateway function, i.e., Session Management Function (SMF) 110, which is operatively coupled to a User Plane Function (UPF) 112. UPF 112 is operatively coupled to a Packet Data Network, e.g., Internet 114. As is known in 5G and other communication networks, the User Plane (UP) or data plane carries network user traffic while the Control Plane (CP) carries signaling traffic. SMF 110 supports functionalities relating to UP subscriber sessions, e.g., establishment, modification and release of protocol data units (PDU) sessions. UPF 112 supports functionalities to facilitate UP operations, e.g., packet routing and forwarding, interconnection to the data network (e.g., 114 in
(36) It is to be appreciated that this particular arrangement of system elements is an example only, and other types and arrangements of additional or alternative elements can be used to implement a communication system in other embodiments. For example, in other embodiments, the system 100 may comprise other elements/functions not expressly shown herein.
(37) Accordingly, the
(38) It is also to be noted that while
(39)
(40) The network element/function 202 comprises a processor 212 coupled to a memory 216 and interface circuitry 210. The processor 212 of the network element/function 202 includes a lawful interception processing module 214 that may be implemented at least in part in the form of software executed by the processor. The processing module 214 performs lawful interception described in conjunction with subsequent figures and otherwise herein. The memory 216 of the network element/function 202 includes a lawful interception storage module 218 that stores data generated or otherwise used during lawful interception operations.
(41) The network element/function 204 comprises a processor 222 coupled to a memory 226 and interface circuitry 220. The processor 222 of the network element/function 204 includes a lawful interception processing module 224 that may be implemented at least in part in the form of software executed by the processor 222. The processing module 224 performs lawful interception described in conjunction with subsequent figures and otherwise herein. The memory 226 of the network element/function 204 includes a lawful interception storage module 228 that stores data generated or otherwise used during lawful interception operations.
(42) The processors 212 and 222 of the respective network elements/functions 202 and 204 may comprise, for example, microprocessors, application-specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs) or other types of processing devices or integrated circuits, as well as portions or combinations of such elements. Such integrated circuit devices, as well as portions or combinations thereof, are examples of “circuitry” as that term is used herein. A wide variety of other arrangements of hardware and associated software or firmware may be used in implementing the illustrative embodiments.
(43) The memories 216 and 226 of the respective network elements/functions 202 and 204 may be used to store one or more software programs that are executed by the respective processors 212 and 222 to implement at least a portion of the functionality described herein. For example, lawful interception operations and other functionality as described in conjunction with subsequent figures and otherwise herein may be implemented in a straightforward manner using software code executed by processors 212 and 222.
(44) A given one of the memories 216 or 226 may therefore be viewed as an example of what is more generally referred to herein as a computer program product or still more generally as a processor-readable storage medium that has executable program code embodied therein. Other examples of processor-readable storage media may include disks or other types of magnetic or optical media, in any combination. Illustrative embodiments can include articles of manufacture comprising such computer program products or other processor-readable storage media.
(45) The memory 216 or 226 may more particularly comprise, for example, an electronic random access memory (RAM) such as static RAM (SRAM), dynamic RAM (DRAM) or other types of volatile or non-volatile electronic memory. The latter may include, for example, non-volatile memories such as flash memory, magnetic RAM (MRAM), phase-change RAM (PC-RAM) or ferroelectric RAM (FRAM). The term “memory” as used herein is intended to be broadly construed, and may additionally or alternatively encompass, for example, a read-only memory (ROM), a disk-based memory, or other type of storage device, as well as portions or combinations of such devices.
(46) The interface circuitries 210 and 220 of the respective network elements/functions 202 and 204 illustratively comprise transceivers or other communication hardware or firmware that allows the associated system elements to communicate with one another in the manner described herein.
(47) It is apparent from
(48) It is to be appreciated that the particular arrangement of components shown in
(49) Other system elements such as UE 102 and gNB 104 may each also be configured to include components such as a processor, memory and network interface. These elements need not be implemented on separate stand-alone processing platforms, but could instead, for example, represent different functional portions of a single common processing platform.
(50) Illustrative embodiments provide lawful interception architectures for 5G systems. The architecture for 5G systems is being standardized in 3GPP. The 3GPP TS 23.501 defines the 5G system architecture as service-based and the interaction between network functions is represented in two ways: (i) service-based representation; and (ii) reference-point based representation.
(51)
(52)
(53) Thus, by way of example, with a service-based interface, one network function/element is able to interact (communicate) with any other network function/element directly. For example, as shown in the point-to-point interface representation of
(54) Illustrative embodiments provide for improving the LI architecture for 5G systems with service-based interfaces.
(55) The LI architecture in pre-5G systems uses point-to-point interfaces.
(56) As shown in system environment 500, with Service Provider Network 501, ADMF (Administration Function) 502, Delivery Function 2 (DF2) 504, and Delivery Function 3 (DF3) 506 are LI specific functional elements and are deployed and managed by the service provider that serves the intercept subject (also referred to as “target”). As used herein, ADMF, DF2 and DF3 are collectively referred to as LI systems or LI system functions. The ADMF, DF2 and DF3 are also examples of “lawful interception-specific elements.” Control Plane Network Function (NF) 508 and User Plane Network Function (NF) 510 are the two Intercept Control Elements (ICE) that are involved in handling the communication traffic of the target. These NFs as well as others are also examples of “intercepting control elements.”
(57) As further shown, the Law Enforcement Monitoring Function (LEMF) 512 is part of a Law Enforcement Agency (LEA) that is responsible for sending an LI request (over the Handover Interface 1 or HI1) to the service provider (501) and then collecting the LI-data. LI-data consists of two parts: (1) Intercept Related Information or IRI that is derived from the signaling information (or control plane data) associated with the target's communication; and (2) Communication Content or CC that is derived from the user plane packets. Note that the terms LEMF and LEA may occasionally be used interchangeably throughout the description and figures without any loss of distinction.
(58) ADMF 502 provisions the target information, intercept information and the delivery interface information to the ICEs 508 and 510 over the X1_1 reference point.
(59) Note that in certain figures (i.e.,
(60) ADMF 502 also provisions the DF2 504 (over X1_2 reference point) and DF3 506 (over X1_3 reference point) with the intercept related information. The Control Plane NF 508 intercepts and delivers the IRI events associated with the target's communication to the DF2 504 over X2 reference point. The User Plane NF 510 intercepts and delivers the CC associated with the target's communication to the DF3 506 over X3 reference point. The DF2 504 delivers the IRI to the LEMF 512 over HI2. The DF3 506 delivers the CC to the LEMF 512 over HI3.
(61) It is to be understood that illustrative embodiments described herein apply to a service provider network (e.g., 501).
(62) To explain the one or more problems and then illustrative solutions that address the problems, some hypothetical network functions are considered which are illustrated in
(63) In
(64) In
(65) However, since the service-based interfaces are only used for the Control Plane in this example, Control Plane NF-1 808-1 still uses a point-to-point interface (PP-iu) to interact with User Plane NF 810. Also, in this example, the LI specific functions (ADMF 802, DF2 804, and DF3 806) within Service Provider Network 801 have point-to-point interfaces with the ICEs 808-1, 808-2, and 810 (X1_1, X2, X3, respectively).
(66) It is to be appreciated that the nomenclature generally used herein for service-based interfaces includes a letter in uppercase (e.g., S, N, or L) followed by the acronym of the function in lowercase (e.g., Snf1, Sdf2, Sdmf, Nsmf, Nausf, Ldf2, Llif, etc.).
(67) As shown in
(68) As 5G systems evolve, it is realized herein that service providers may opt for service-based interfaces to replace the point-to-point interfaces X1_1 and X2 as shown in
(69) Simply adding the service-based interfaces to the LI systems (i.e. ADMF, DF2) can make those functions more complex since those functions will not only require changes to support the new architecture but also must keep supporting the older networks that continue to use the point-to-point interfaces. So far, the standardization of LI for 5G has not reached a stage of evaluating the possible solutions to accomplish having service-based interfaces for LI. Since service-based interfaces are only considered for the control plane data, the X3 remains as point-to-point.
(70) In summary, a main problem that illustrative embodiments solve is the provision of solutions that allow service providers to utilize service-based interfaces for lawful interception purposes.
(71)
(72) In
(73) Illustrative embodiments will now be described that provide improved lawful interception architectures and methodologies using service-based interfaces.
(74)
(75) In this illustrative embodiment, ADMF 1002 and DF2 1004 are configured to have service-based interfaces. The service-based interface to ADMF 1002 is shown in
(76) As in 5G network architecture (shown in
(77) X1_1 from ADMF 1002 to Control Plane NF-1 1008-1 goes via Sdmf and Snf1.
(78) X1_1 from ADMF 1002 to Control Plane NF-2 1008-2 goes via Sdmf and Snf2.
(79) X2 from Control Plane NF-1 1008-1 to DF2 1004 goes via Snf1 and Sdf2.
(80) X2 from Control Plane NF-2 1008-2 to DF2 1004 goes via Snf2 and Sdf2.
(81) In some embodiments, e.g.,
(82) The User Plane NF 1010 in
(83)
(84) In this embodiment, ADMF 1102 and DF2 1104 do not require any changes. As shown in
(85) As in 5G network architecture (shown in
(86) X1_1 related data from LIF 1114 to Control Plane NF-1 1108-1 goes via Slif and Snf1.
(87) X1_1 related data from LIF 1114 to Control Plane NF-2 1108-2 goes via Slif and Snf2.
(88) X2 related data from Control Plane NF-1 1108-1 to DF2 1104 goes via Snf1 and Slif.
(89) X2 related data from Control Plane NF-2 1108-2 to DF2 1104 goes via Snf2 and Slif.
(90) LIF 1114 receives the X1_1 related data from ADMF 1102 and sends the data to the appropriate ICEs. In addition, LIF 1114 receives the X2 related data from the ICEs and forwards the data to DF2 1104. The information transfer of LI related data on service-based interfaces may require additional security measures to ensure that the information thus transferred is not visible to unauthorized personnel. Such measures can be implemented in this embodiment. The User Plane NF 1110 does not have a service-based interface and, therefore, continues to use the point-to point interface for X1_1. This approach does not require any changes to ADMF 1102 and DF2 1104 and thus makes it easier to have a backward compatible LI system.
(91) Illustrative embodiments are now described that accommodate possible 5G system architecture changes.
(92) In the event 5G system architecture is enhanced to have a service-based interface to represent the reference point N4 (see
(93) As shown in system environment 1200, Service Provider Network 1201 includes ADMF 1202, DF2 1204, and DF3 1206, which function similarly to the similarly named elements described above. ADMF 1202, DF2 1204, and DF3 1206 are operatively coupled to LEMF 1212. Control Plane NF-1 1208-1 and Control Plane NF-2 1208-2 are ICEs for IRI events (Control Plane NF-3 1208-3 does not function as an ICE in this example) and User Plane NF 1210 is an ICE for CC. The new network function LIF is denoted as LIF 1214.
(94) In this embodiment, User Plane NF 1210 has a service-based interface (for Control Plane data transfer) and, as such, the point-to-point interface for X1_1 between ADMF 1202 and User Plane NF 1210 is eliminated. The service-based interface to User Plane NF 1210 is denoted in
(95) As in the 5G network architecture shown in
(96) X1_1 related data from LIF 1214 to Control Plane NF-1 1208-1 goes via Slif and Snf1.
(97) X1_1 related data from LIF 1214 to Control Plane NF-2 1208-2 goes via Slif and Snf2.
(98) X1_1 related data from LIF 1214 to User Plane NF 1210 goes via Slif and Sunf.
(99) X2 related data from Control Plane NF-1 1208-1 to DF2 1204 goes via Snf1 and Slif.
(100) X2 related data from Control Plane NF-2 1208-2 to DF2 1204 goes via Snf2 and Slif.
(101) N4 related data between Control Plane NF-1 1208-1 and User Plane NF 1210 goes via Snf1 and Sunf.
(102) LIF 1214 receives the X1_1 related data from ADMF 1202 and sends the data to the appropriate ICEs. In addition, LIF 1214 receives the X2 related data from the ICEs and forwards the data to DF2 1204. The information transfer of LI related data on service-based interfaces may require additional security measures to ensure that the information thus transferred is not visible to unauthorized personnel. Such measures can be implemented in this embodiment. Advantageously, as in the embodiment of
(103)
(104) As shown in system environment 1300, Service Provider Network 1301 includes ADMF 1302, DF2 1304, and DF3 1306, which function similarly to the similarly named elements described above. ADMF 1302, DF2 1304, and DF3 1306 are operatively coupled to LEMF 1312. Control Plane NF-1 1308-1 and Control Plane NF-2 1308-2 are ICEs for IRI events (Control Plane NF-3 1308-3 does not function as an ICE in this example) and User Plane NF 1310 is an ICE for CC.
(105) More particularly, in
(106) As in the 5G network architecture (shown in
(107) X1_1 related data from ADMF 1302 to Control Plane NF-1 1308-1 goes via Sdmf and Snf1.
(108) X1_1 related data from ADMF 1302 to Control Plane NF-2 1308-2 goes via Sdmf and Snf2.
(109) X1_2 related data from ADMF 1302 to DF2 1308-2 goes via Sdmf and Sdf2.
(110) X1_3 related data from ADMF 1302 to DF3 1306 goes via Sdmf and Sdf3.
(111) X2 related data from Control Plane NF-1 1308-1 to DF2 1304 goes via Snf1 and Sdf2.
(112) X2 related data from Control Plane NF-2 1308-2 to DF2 1304 goes via Snf2 and Sdf2.
(113) The User Plane data (i.e., CC) continues to be delivered via the point-to-point interface X2 from User Plane NF 1310 to DF3 1306. The information transfer of LI related data on service-based interfaces may require additional security measures to ensure that the information thus transferred is not visible to unauthorized personnel. Such measures can be implemented in this embodiment.
(114) As mentioned above in the context of the embodiment of
(115) Thus, to summarize,
(116)
(117)
(118) Illustrative embodiments are now described that address backward compatibility.
(119)
(120) As shown in system environment 1400, Service Provider Network 1401 includes ADMF 1402, DF2 1404, and DF3 1406, which function similarly to the similarly named elements described above. ADMF 1402, DF2 1404, and DF3 1406 are operatively coupled to LEMF 1412. Control Plane NF-1 1408-1 and Control Plane NF-2 1408-2 are ICEs for IRI events (Control Plane NF-3 1408-3 does not function as an ICE in this example) and User Plane NF 1410-1 is an ICE for CC. The new network function LIF is denoted as LIF 1414.
(121) Further as shown in
(122)
(123) In this embodiment, ADMF 1502 and DF2 1504 are enhanced to have service-based interfaces. They still support the point-to-point interface to interact with the legacy (e.g., pre-5G) systems that use point-to-point interfaces. In
(124)
(125) In
(126)
(127) In
(128)
(129) In
(130) It is realized herein that service providers may adopt service-based interfaces to LI systems (ADMF, DF2 and DF3) but may not integrate to the 5G core system.
(131)
(132) As an example:
(133) LI provisioning information from ADMF 1902 to Control Plane NF-1 1908-1 goes through Ldmf, Llif, Slif and Snf1.
(134) LI provisioning information from ADMF 1902 to DF2 1904 goes through Ldmf and Ldf2.
(135) X2 data from Control Plane NF-2 1908-2 goes through Snf2, Slif, Llif, Ldf2. In this embodiment, LI systems (ADMF 1902, DF2 1904, DF3 1906) still support the point-to-point interface to interact with the legacy (e.g., pre-5G) systems that use point-to-point interfaces.
(136)
(137) Not that, in
(138) As an example:
(139) LI provisioning information from ADMF 2002 to Control Plane NF-1 2008-1 goes through Ldmf and Lnf1.
(140) LI provisioning information from ADMF 2002 to DF2 2004 goes through Ldmf and Ldf2.
(141) X2 data from Control Plane NF-2 2008-2 goes through Lnf2, Ldf2.
(142) In this embodiment, LI systems (ADMF, DF2, DF3) still support the point-to-point interface to interact with the legacy (e.g., pre-5G) systems that use point-to-point interfaces.
(143)
(144) As shown in
(145)
(146) In this embodiment, ADMF 2202, DF2 2204, and SX3LIF 2232 have service-based interfaces Ldmf, Ldf2, and Lsx3, respectively. AMF 2226, SMF 2228, and UDM 2230 have LI-specific service-based interfaces Lamf, Lsmf, and Ludm respectively. ADMF 2202 provisions: AMF 2226 using Ldmf and Lamf; SMF 2228 using Ldmf and Lsmf; UDM 2230 using Ldmf and Ludm; and SX3LIF 2232 using Ldmf and Lsx3.
(147) AMF 2226, SMF 2228 and SX3LIF 2232 deliver IRI events to DF2 2204 using Ldf2 (AMF 2226 uses Lamf and Ldf2; SMF 2228 uses Lsmf and Ldf2; and SX3LIF 2232 uses Lsx3 and Ldf2). The user-plane traffic as per the 5G SBA model is delivered using point-to-point interface X3. Likewise, UPF 2224 forwards the duplicated packets to SX3LIF 2232 via point-to-point interface X3u.
(148) In this approach, SMF 2228 sends intercept related control information to SX3LIF 2232 via point-to-point interface X3c. As an alternative embodiment, point-to-point interface X3c is eliminated by SMF 2226 sending the intercept related information to SX3LIF 2232 using Lsx3. In some embodiments, SX3LIF 2232 is collocated with UPF 2224 or SMF 2228. However, SX3LIF 2232 is a standalone entity in other embodiments.
(149)
(150) In this embodiment, ADMF 2302 and DF2 2304 have point-to-point interfaces to LIF 2314, and LIF 2314 provides the service-based interface Llif to interact with the 5G network. LIF 2314 passes on provisioning information from ADMF 2302 to: AMF 2326 using Llif and Lamf; SMF 2328 using Llif and Lsmf; UDM 2330 using Llif and Ludm; and SX3LIF 2332 using Llif and Lsx3.
(151) AMF 2326, SMF 2328, and SX3LIF 2332 deliver IRI events to LIF 2314 using Llif (AMF 2326 uses Lamf and Llif; SMF 2328 uses Lsmf and Llif; and SX3LIF 2332 uses Lsx3 and Llif). The user-plane traffic as per the 5G SBA model is delivered using point-to-point interface X3. Likewise, UPF 2324 forwards the duplicated packets to SX3LIF 2332 via point-to-point interface X3u.
(152) In this approach, SMF 2328 sends intercept related information to SX3LIF 2332 via point-to-point interface X3c. As an alternative embodiment, point-to-point interface X3c is eliminated by SMF 2326 sending the intercept related information to SX3LIF 2332 using Lsx3. In some embodiments, SX3LIF 2332 is collocated with UPF 2324 or SMF 2328. However, SX3LIF 2332 is a standalone entity in other embodiments.
(153) It is also to be appreciated that while LI functionality is illustrated in the figures with respect to certain illustrative NFs (e.g., as ICEs), LI functionality can be implemented in any existing NFs and/or newly introduced NFs.
(154) Below is a summary of abbreviations referenced in the text and/or figures or otherwise related to lawful interception and/or communication systems:
(155) 3GPP 3rd Generation Partnership Project
(156) ADMF Administration Function
(157) AF Application Function
(158) AMF Access and Mobility Management Function
(159) AUSF Authentication Server Function
(160) BBIFF Bearer Binding Intercept and Forwarding Function
(161) CALEA Communications Assistance for Law Enforcement Act
(162) CC Call Content (or Communication Content)
(163) CP Control Plane
(164) CSP Communication Service Provider
(165) DF Delivery Function
(166) DF2 Delivery Function 2 (for IRI)
(167) DF3 Delivery Function 3 (for CC)
(168) DN Data Network
(169) EPC Evolved Packet Core
(170) HI1 Handover Interface 1 (for admin)
(171) HI2 Handover Interface 2 (for IRI)
(172) HI3 Handover Interface 3 (for CC)
(173) IAP Internet Access Point
(174) ICE Intercepting Control Element
(175) ID Identity or Identifier
(176) IRI Intercept Related Information
(177) LEA Law Enforcement Agency
(178) LEMF Law Enforcement Monitoring Facility
(179) LI Lawful Interception
(180) LIF LI Interworking Function
(181) NEF Network Exposure Function
(182) NFV Network Function Virtualization
(183) NRF Network Repository Function
(184) NSSF Network Slice Selection Function
(185) PCF Policy Control Function
(186) PDP Packet Data Protocol
(187) (R)AN (Radio) Access Network
(188) SA3 Services and Systems Aspects TSG 3
(189) SDN Software Defined Network
(190) SMF Session Management Function
(191) SX3LIF Split X3 LI Interworking Function
(192) UDM Unified Data Management
(193) UDSF Unstructured Data Storage Function
(194) UPF User Plane Function
(195) X1 Interface (for admin between ADMF and access function)
(196) X2 Interface (for IRI between access function and DF2)
(197) X3 X3 Interface (for CC between access function and DF3
(198) It should therefore again be emphasized that the various embodiments described herein are presented by way of illustrative example only, and should not be construed as limiting the scope of the claims. For example, alternative embodiments can utilize different communication system configurations, user equipment configurations, base station configurations, key pair provisioning and usage processes, messaging protocols and message formats than those described above in the context of the illustrative embodiments. These and numerous other alternative embodiments within the scope of the appended claims will be readily apparent to those skilled in the art.