Methods and apparatuses for correlating intercept related information with call content
11019154 · 2021-05-25
Assignee
Inventors
Cpc classification
H04L67/146
ELECTRICITY
H04L63/306
ELECTRICITY
H04L65/1076
ELECTRICITY
H04M3/2281
ELECTRICITY
International classification
Abstract
Systems, methods, and apparatuses for correlating intercept related information (IRI) with call content (CC) for S8HR lawful interception are provided. The method may include generating at a network entity a correlation identifier. The method may also include adding the correlation identifier to a session initiation protocol message. In addition, the method may include delivering the session initiation protocol message including the correlation identifier from the network entity to another network entity.
Claims
1. A method comprising: generating at a network entity a correlation identifier, wherein the correlation identifier comprises an S8 home routing access point name; adding the correlation identifier to a session initiation protocol message at the network entity; and delivering the session initiation protocol message including the correlation identifier from the network entity to another network entity, wherein the method is associated with correlating media packets flowing through an evolved packet system bearer for media of an internet protocol multimedia subsystem to corresponding session initiation protocol sessions where the session initiation protocol sessions' packets are flowing through an internet protocol multimedia system signaling bearer.
2. The method according to claim 1, further comprising: receiving the media packets from the another network entity associated with the internet protocol multimedia subsystem signaling bearer established using the correlation identifier, and wherein the media packets are related to intercept related information.
3. The method according to claim 2, wherein the bearer is established using an S8 home routing access point name.
4. The method according to claim 2, further comprising: correlating at the network entity the received intercept related information and the correlation identifier for lawful interception.
5. The method according to claim 1, further comprising: performing at the network entity a deep packet inspection of the media packets to verify whether information included in the media packets matches previously received or stored intercept related information.
6. The method according to claim 5, wherein the inspection of the media packets includes inspecting a header comprising at least one of an internet protocol address or a port number of a real time protocol stream.
7. The method according to claim 5, further comprising: determining based on the deep packet inspection an internet protocol multimedia subsystem session to which the media packets are related.
8. The method according to claim 5, wherein the previously stored intercept related information is received from an administration function.
9. The method according to claim 8, wherein the intercept related information includes at least one of a session initiation protocol uniform resource identifier, a telephone uniform resource identifier, and international mobile equipment identity.
10. The method according to claim 1, further comprising: transmitting from the network entity at least one of the media packets or the correlation identity to a law enforcement monitoring function.
11. The method according to claim 10, wherein the transmitting of the at least one of the media packets or the correlation identity to the law enforcement monitoring function occurs through a DF3 interface.
12. The method according to claim 1, wherein the network entity is a lawful interception mirror internet protocol multimedia system state function.
13. The method according to claim 1, wherein the another network entity is a bearer binding intercept and forwarding function.
14. A method comprising: receiving at a network entity a session initiation protocol message including a correlation identifier from another network entity, wherein the correlation identifier comprises an S8 home routing access point name; and transmitting media packets associated with an internet protocol multimedia subsystem signaling bearer established using the correlation identifier from the network entity to the another network entity, wherein the media packets are related to intercept related information, wherein the method is associated with correlating the media packets flowing through an evolved packet system bearer for media of an internet protocol multimedia subsystem to corresponding session initiation protocol sessions where the session initiation protocol sessions' packets are flowing through the internet protocol multimedia system signaling bearer.
15. The method according to claim 14, further comprising: determining at the network entity whether or not the media packets of the internet protocol multimedia subsystem signaling bearer are related to the intercept related information.
16. The method according to claim 14, wherein the network entity is a bearer binding intercept and forwarding function.
17. The method according to claim 14, wherein the another network entity is a lawful interception mirror internet protocol multimedia system state function.
18. The method according to claim 14, wherein the intercept related information includes at least one of a session initiation protocol uniform resource identifier, a telephone uniform resource identifier, and an international mobile equipment identity.
19. An apparatus comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to perform a process according to claim 1.
20. A computer program product embodied on a non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process according to claim 1.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) For proper understanding of the invention, reference should be made to the accompanying drawings, wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
DETAILED DESCRIPTION
(21) It will be readily understood that the components of the invention, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of embodiments of systems, methods, apparatuses, and computer program products for correlating intercept related information with the call content, as represented in the attached figures, is not intended to limit the scope of the invention, but is merely representative of some selected embodiments of the invention.
(22) The features, structures, or characteristics of the invention described throughout this specification may be combined in any suitable manner in one or more embodiments. For example, the usage of the phrases “certain embodiments,” “some embodiments,” or other similar language, throughout this specification refers to the fact that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present invention. Thus, appearances of the phrases “in certain embodiments,” “in some embodiments,” “in other embodiments,” or other similar language, throughout this specification do not necessarily all refer to the same group of embodiments, and the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
(23) Additionally, if desired, the different functions discussed below may be performed in a different order and/or concurrently with each other. Furthermore, if desired, one or more of the described functions may be optional or may be combined. As such, the following description should be considered as merely illustrative of the principles, teachings and embodiments of this invention, and not in limitation thereof.
(24) Certain embodiments of the invention relate to Lawful Interception (LI) of inbound roamer's voice services in the visited network, for example, when S8HR based approach is used as the VoLTE roaming architecture. LI refers to a legally authorized process of intercepting the communication of private individuals. VoLTE roaming means that a VoLTE subscriber of an operator (referred to as Home Operator or HPLMN) is accessing the voice related services while roaming in another operator's network (referred to as Visited Operator VPLMN).
(25) Two approaches are defined for VoLTE roaming: Local Breakout (LBO) and S8 based Home Routing (S8HR). In the LBO case, the Packet Data Network (PDN) connectivity is done within the Visited Operator's Network (i.e., VPLMN) and some IMS network nodes of VPLMN are used in the handling of calls.
(26) In the case of S8HR, the PDN connectivity is established to the Home Network (i.e., HPLMN) and IMS nodes involved in handling the call reside only in the HPLMN. Therefore, S8HR is a roaming model where both the P-CSCF and the P-GW are located in the HPLMN of the user and LBO is not used when the user is roaming outside HPLMN. The S8HR architecture includes the following technical characteristics: (1) bearers for IMS services are established on the S8 reference point; (2) all IMS nodes are located in the HPLMN, and all session initiation protocol (SIP) signalling and media traffic for the VoLTE roaming service are routed through HPLMN; (3) IMS transactions are performed directly between the terminal and P-CSCF at the HPLMN.
(27)
(28) It is noted that the rules that govern lawful interception are strongly regulated by national laws and telecommunications acts in each country/region. All Law Enforcement Agencies (LEAs) demand that the ability to perform the lawful interception of voice services is a must even for inbound roamers (in the VPLMN) independent of which roaming approach is used.
(29) The 3GPP technical specifications (TS) 33.107 and TS 33.108 define LI configuration, internal and external LI interfaces for 3GPP network architectures and 3GPP defined services. 3GPP TS 33.106, TS 33.107, and TS 33.108 are hereby incorporated by reference in their entirety. Standards in North America define the external LI interface to networks deployed in North America. The LI functions to perform the lawful interception in the VPLMN when the LBO approach is used as the roaming architecture is already defined in those standards.
(30) 3GPP TS 33.106 defines the stage 1 requirements of lawful interception for 3GPP based systems, 3GPP TS 33.107 defines the stage 2 requirements for lawful interception for 3GPP based systems, and 3GPP TS 33.108 defines the stage 3 requirements for lawful interception for 3GPP based systems.
(31)
(32)
(33) The stage 2 definitions specified in 3GPP TS 33.107 includes the architectural concepts for performing lawful interception for various 3GPP defined services to which lawful interception applies. A general architectural concept as applicable to VoIP calls is illustrated in
(34) 3GPP TS 33.107 and 3GPP TS 33.108 define the methods used to establish a correlation between IRI and the CC for VoIP sessions of scenarios other than the S8HR. As shown in
(35) 3GPP TS 33.107 states that the CC Intercept Trigger at the minimum shall contain: Media Identifier and Correlation Identifier. The Media Identifier identifies the media and the Correlation Identifier identifies the Correlation Number to be used for the corresponding media. The CC Intercept Function includes the Correlation Identifier within the CC delivered to the LEMF through interface DF3, as shown in
(36) With the S8HR based approach, none of the network nodes mentioned above (i.e., P-GW, IMS-AGW, or P-CSCF) reside in the VPLMN (see
(37)
(38) In some other embodiments, the LMISF may inform another functional entity, such as a LI Policy Control Function (LPCF) or any other network entity, about the IMS session that is being intercepted. In embodiment involving the LPCF, the LMISF may communicate with the LPCF via interface Xic, and the LPCF may communication with the BBIFF via interface Xib. The LPCF or the any other network entity, including the LMISF, may then inform the BBIFF to deliver the Media packets of the call associated with that IMS session to DF3, which in turn would deliver the CC to the LEMF. Although an LPCF is shown in
(39) One of the criteria considered within the SA3 LI study is to make sure any new architecture/concept defined to provide the LI functions in the VPLMN when the S8HR based approach is used as the roaming architecture is comparable to the similar functions provided when the LBO approach is used as the roaming architecture. 3GPP TR 33.827 identifies quite a few open issues and one such issue is to develop an approach to allow the correlation of IRI and CC. Certain embodiments of the invention address the problem of this correlation issue and provide appropriate solutions.
(40) As discussed in the foregoing, when a S8HR based approach is used as the VoLTE roaming architecture, none of the network nodes that are involved in performing the lawful interception of voice services reside in the VPLMN. The S-GW and MME that reside in the VPLMN (see
(41) The SIP URI or TEL URI used to identify the Intercept Subject may only be available within the SIP messages. Therefore, in order to provide the LI functions for voice services, the SIP messages have to be looked into to determine whether a particular IMS session being established involves the Intercept Subject.
(42) Within the evolved packet core (EPC) network, the IMS Signalling packets flow through the IMS Signalling Bearer and Media packets flow through the Media Bearer.
(43) One approach is to do a deep packet interception of IMS Signalling packets and the Media packets to detect whether those packets relate to an Intercept Subject, and if so, deliver those packets to the LEAs using the same protocol defined in the LI standards (e.g., 3GPP TS 33.108). The SIP messages that correspond to an Intercept Subject can be delivered to the LEA as IRI messages and the Media packets from the Media Bearer established for the associated IMS Signalling Bearer can be delivered to the LEA as CC messages.
(44) Since an Intercept Subject may be involved in more than one IMS session (e.g., hold, conferencing) at a given time, there can be multiple media streams present within the Media Bearer.
(45) The network nodes within the VPLMN may be able to tell which Media Bearer is related to which IMS Signalling Bearer. However, knowing which Media packet is associated with which IMS session is not easy. And, as a consequence, the correlation between the IRI and CC of a particular IMS session can become a challenge. SA3 LI, within the study (3GPP TR 33.827), has identified this as an issue that requires further analysis and research. As mentioned above, certain embodiments of the invention provide a method to correlate the IRI and the CC of a particular IMS session.
(46) It is noted that, within the EPC (S8HR approach), only an association of a Media Bearer to an IMS Signalling Bearer can be done (through the use of Linked Bearer Identity), but an association of media path within a Media Bearer to an IMS session requires an additional process as described herein.
(47)
(48) The strategy of the architecture illustrated in
(49) Thus, according to certain embodiments, a method is provided to associate each Media packet flowing through an EPS Bearer for Media of an IMS session, to the corresponding SIP session where its packets are flowing through an EPS Bearer for IMS Signalling. And, according to some embodiments, this may be done only for those IMS sessions that involve the inbound roamers within the VPLMN, when S8HR approach is used as the roaming architecture.
(50)
(51) 3GPP TS 33.108 includes an IMS-VoIP related section on the Correlation Number, which provides that, for a given target, the Correlation Number is unique per VoIP session and used to correlate CC with IRI or correlate different IRI records and different CC data within one VoIP session. For IMS-based VoIP, the S-CSCF and optionally, the P-CSCF provide the IRI events. For IMS-based VoIP, the functional element that provides the CC interception depends on the call scenario and network configuration. As described in TS 33.107, CC interception is done by one of the following functional elements (referred to as CC Intercept Function): PDN-GW/GGSN, IMS-AGW, TrGW, IM-MGW, or MRF. The trigger to perform the CC interception at the above functional elements may be provided by the following functional elements (referred to as CC Interception Triggering Function): P-CSCF for PDN-GW/GGSN, P-CSCF for IMS-AGW, IBCF for TrGW, MGCF for IM-MGW, or S-CSCF or AS for MRF. For the delivery of CC, the CC Intercept Triggering Function provides the Correlation Number to the CC Intercept Function. This Correlation Number is delivered to the LEMF on the handover interface HI3 and is also delivered to the LEMF on the handover interface HI2. The IMS-VoIP-Correlation delivered to the LEMF on the HI2, contains the Correlation Number(s) used for the IRI messages as IMS-IRI (IRI-to-IRI-Correlation) and Correlation Number(s) used for the CC data as IMS-CC (IRI-to-CC-Correlation). The LEMF shall interpret that the IRI messages and the CC data containing those Correlation Number values belong to the one single IMS VoIP session. On the HI2 and HI3 (interfaces from the DF2 and DF3 to LEMF), the correlation information is delivered using the ASN.1 parameters introduced in section 12.1.4 of 3GPP TS 33.108.
(52) However, the above-described concepts from the 3GPP specifications are not applicable for the interception of voice services in the VPLMN when an S8HR based approach is used as a roaming architecture.
(53)
(54) Continuing with
(55)
(56) Some embodiments may focus on the correlation aspects of an S8HR architecture. According to an embodiment, in step 4 of
(57) As illustrated in
(58) Continuing with
(59)
(60) The example shown in
(61) The two GTP-U tunnels (used for IMS Signalling Bearer and Media Bearer) use the same IP address and port numbers but have two different tunnel identifiers (not shown in
(62) When BBIFF is asked to deliver the packets from the IMS Signalling Bearers to LMISF, it delivers everything above the GTP-U layer. BBIFF does not look into the IMS packets above the GTP-U layer. Similarly, when the BBIFF is asked to deliver the packets from the Media Bearer to the LMISF, it delivers everything above the GTP-U layer. It does not look into the Media packets above the GTP-U layer. However, the BBIFF knows that the Media Bearer and the IMS Signalling Bearer are related through the GTP protocol concepts defined in 3GPP TS 29.274.
(63) LMISF receives the IMS Signalling packets and Media packets from the BBIFF and
(64) Once it is determined that a SIP message involves an Intercept Subject, the LMISF may allocate a Correlation Number and store it locally against that IMS session. When the Media packets are received, the LMISF may examine IP address and UDP port numbers used to carry the RTP streams to determine the associated IMS session. Once a match is made, the LMISF may use the Correlation Number that it had used while delivering the SIP messages to the DF2 as the Correlation Number delivered to the DF3.
(65)
(66) In the United States, the LI standards require the delivery of an IRI message referred to as CCOpen when the CC delivery begins. With the modified architecture of
(67) In a further embodiment, whenever the LMISF determines that an IMS session involves an Intercept Subject, it may pass on a token to BBIFF and BBIFF may include this token whenever the Media packets are delivered to the LMISF. In some embodiments, a token may be passed from the LMISF to the BBIFF either directly or indirectly through any other network entity. In embodiments that include the LPCF, the token may be passed through the LPCF. In certain other embodiments that do not include the LPCF, the token may be passed directly to the BBIFF or indirectly to the BBIFF through any other network entity. The use of such a token may improve the LMISF implementation in determining the association of Media packets to the IMS session. However, it should be noted that certain embodiments do not necessarily need to use the token.
(68) As mentioned above, in an embodiment, the implementation of BBIFF may be improved since the BBIFF delivers the packets (of IMS Signalling Bearer and Media Bearer) to only one destination point (i.e., LMISF). According to an embodiment, the LMISF has X2 and X3 interfaces to DF2 and DF3, respectively. It can be ensured that LMISF (being a new functional entity) takes the burden of ensuring the information delivered over X2 and X3 are in the same format as that used for other VoIP scenarios (non-roaming, LBO case). This may ensure that the DF2 and DF3 used for other VoIP call scenarios can be used with S8HR as well. In the current approaches, BBIFF has the X3 interface to DF3 and with BBIFF simply delivering the Media packets to DF3, it will be a burden of DF3 to receive the Media packets in the format that BBIFF delivers. This will impact the DF3.
(69) Unlike the 3GPP standards, the United States LI regulations require to map the SIP messages to call state events such as “Origination”, “TerminationAttempt”, “Answer”, “Release”, etc. While in most of the LI implementations, the DF2 provides the required mapping, there are certain IRI events that are closely coupled with the CC. A few examples include: the sending of CCOpen when the CC delivery begins, the sending of CCClose when the CC delivery ends, collecting the post-cut through DTMF digits from the content of Intercept Subject, and reporting those digits using the message DialedDigitExtraction. With Media packets available, the LMISF will be able to generate those events rather easily.
(70)
(71) When
(72)
(73) As illustrated in
(74) Continuing with
(75) At step 9, the BBIFF delivers the Media packets to the DF3. The BBIFF knows that the Media packets are related to an IMS Signalling Bearer, but does not know which Media packet is related to which IMS session in the event Intercept Subject is involved in multiple sessions. In this approach, BBIFF need not know that association. At step 10, the DF3 performs a deep packet inspection of the Media packets that it receives and examines the IP address and the port number associated with the RTP stream. Then, DF3 compares it with the Media Identifier supplied earlier by the DF2. When a match is found, the DF3 would deliver the CC to the LEMF using the Correlation Number that it has received from the DF2.
(76) According to yet another embodiment, the embodiment described in
(77) In a further embodiment, correlation may be performed within the LEMF. In this embodiment, no correlation is done by the VPLMN. Instead, if the entire Media packets (including the IP address and the port numbers) are sent to the LEMF, the LEMF may perform a deep packet inspection and correlate the IRI with the CC.
(78)
(79) As illustrated in
(80) Processor 22 may perform functions associated with the operation of apparatus 10 which may include, for example, precoding of antenna gain/phase parameters, encoding and decoding of individual bits forming a communication message, formatting of information, and overall control of the apparatus 10, including processes related to management of communication resources.
(81) Apparatus 10 may further include or be coupled to a memory 14 (internal or external), which may be coupled to processor 22, for storing information and instructions that may be executed by processor 22. Memory 14 may be one or more memories and of any type suitable to the local application environment. For instance, memory14 may be implemented using any suitable volatile or nonvolatile data storage technology, such as a semiconductor-based memory device, a magnetic memory device or system, an optical memory device or system, fixed memory, or removable memory. As an example, memory 14 can be comprised of any combination of random access memory (RAM), read only memory (ROM), static storage such as a magnetic or optical disk, or any other type of non-transitory machine or computer readable media. The instructions stored in memory 14 may include program instructions or computer program code that, when executed by processor 22, enable the apparatus 10 to perform tasks as described herein.
(82) In some embodiments, apparatus 10 may also include or be coupled to one or more antennas 25 for transmitting and receiving signals and/or data to and from apparatus 10. Apparatus 10 may further include or be coupled to a transceiver 28 configured to transmit and receive information. The transceiver 28 may include, for example, a plurality of radio interfaces that may be coupled to the antenna(s) 25. The radio interfaces may correspond to a plurality of radio access technologies including one or more of LTE, WLAN, Bluetooth, BT-LE, NFC, radio frequency identifier (RFID), ultra-wideband (UWB), and the like. The radio interface may include components, such as filters, converters (for example, digital-to-analog converters and the like), mappers, a Fast Fourier Transform (FFT) module, and the like, to generate symbols for a transmission via one or more downlinks and to receive symbols (for example, via an uplink). As such, transceiver 28 may be configured to modulate information on to a carrier waveform for transmission by the antenna(s) 25 and demodulate information received via the antenna(s) 25 for further processing by other elements of apparatus 10. In other embodiments, transceiver 28 may be capable of transmitting and receiving signals or data directly.
(83) In an embodiment, memory 14 may store software modules that provide functionality when executed by processor 22. The modules may include, for example, an operating system that provides operating system functionality for apparatus 10. The memory may also store one or more functional modules, such as an application or program, to provide additional functionality for apparatus 10. The components of apparatus 10 may be implemented in hardware, or as any suitable combination of hardware and software.
(84) In some embodiments, an apparatus, such as a user equipment or a network node, may include means for carrying out embodiments described above in relation to
(85) In one embodiment, apparatus 10 may be a network entity, a network node, or a network access node, such as a BBIFF, LMISF, ADMF, DF2, DF3, and/or LEMF, for example, or any other network entity. According to one embodiment, apparatus 10 may be controlled by memory 14 and processor 22 to perform the functions associated with embodiments described herein. For instance, in an embodiment, apparatus 10 may be a LMISF as shown in
(86) In an embodiment, apparatus 10 may then be controlled by memory 14 and processor 22 to perform a deep packet inspection to look at the packets (e.g., SIP messages) and examine the headers (e.g., SIP headers) that carry the calling party identity and/or called party identity to verify whether any of those match with the intercept subject information/identity previously received and stored locally by apparatus 10. If a packet (or SIP message) corresponds to an Intercept Subject, then apparatus 10 may be controlled by memory 14 and processor 22 to deliver those packets to the DF2, along with a correlation number generated by apparatus 10. The DF2 may generate and deliver the IRI to the LEMF. According to an embodiment, apparatus 10 may be controlled by memory 14 and processor 22 to inform the LPCF or any other network entity about the identity of the IMS Signalling Bearer that is being intercepted. In turn, the LPCF or any other network entity may instruct the BBIFF to deliver the packets of the Media Bearers linked to that IMS Signalling Bearer to apparatus 10.
(87) Accordingly, in one embodiment, apparatus 10 may be controlled by memory 14 and processor 22 to receive the Media packets from the BBIFF. In an embodiment, the BBIFF may know that the Media packets are related to an IMS Signalling Bearer, but does not know which Media packet is related to which IMS session in the event Intercept Subject is involved in multiple sessions. In certain embodiments, apparatus 10 may then be controlled by memory 14 and processor 22 to perform a deep packet inspection of the Media packets that it receives and examines the IP address and the port number associated with the RTP stream. Then, apparatus 10 may then be controlled by memory 14 and processor 22 to determine the associated IMS session comparing the IP address/port number of the RTP stream with the similar information from the IMS session. In one embodiment, apparatus 10 may be further controlled by memory 14 and processor 22 to deliver the Media packets to DF3 along with the Correlation Number it has used while delivering the packets (e.g., SIP messages) to DF2. DF3 may then generate and deliver the CC to the LEMF.
(88) Another embodiment may be directed to a method for correlating intercept related information (IRI) with call content (CC) for S8HR lawful interception. In certain embodiments, the method may be performed by a LMISF. In one embodiment, the method may include receiving intercept subject information/identity from an ADMF or other network node. For example, for Voice Services, the intercept subject information/identity may be SIP URI, TEL URI or IMEI. According to an embodiment, a LPCF or any other network entity may instruct a BBIFF to deliver the packets of all IMS Signalling Bearers established for S8HR APNs to the LMISF. In an embodiment, the LPCF or any other network entity may supply the S8HR APNs to the BBIFF, and the method may further include receiving the packets of the IMS Signalling Bearers established for S8HR from the BBIFF. The BBIFF may not know whether the packets of an IMS Signalling Bearer are related to an Intercept Subject or not, but just sends all of the packets to LMISF.
(89) In an embodiment, the method may also include performing a deep packet inspection to look at the packets (e.g., SIP messages) and examining the headers (e.g., SIP headers) that carry the calling party identity and/or called party identity to verify whether any of those match with the intercept subject information/identity previously received and stored locally by LMISF. If a packet (or SIP message) corresponds to an Intercept Subject, then the method may include delivering those packets to the DF2, along with a correlation number generated by the LMISF. The DF2 may generate and deliver the IRI to the LEMF. According to an embodiment, the method may then include informing the LPCF or any other network entity about the identity of the IMS Signalling Bearer that is being intercepted. In turn, the LPCF or any other network entity may instruct the BBIFF to deliver the packets of the Media Bearers linked to that IMS Signalling Bearer to the LMISF.
(90) Accordingly, in one embodiment, the method may also include receiving the Media packets from the BBIFF. In an embodiment, the BBIFF may know that the Media packets are related to an IMS Signalling Bearer, but does not know which Media packet is related to which IMS session in the event Intercept Subject is involved in multiple sessions. In certain embodiments, the method may include performing a deep packet inspection of the Media packets that it receives and examines the IP address and the port number associated with the RTP stream. Then, the LMISF may determine the associated IMS session comparing the IP address/port number of the RTP stream with the similar information from the IMS session. In one embodiment, the method may include delivering the Media packets to DF3 along with the Correlation Number it has used while delivering the packets (e.g., SIP messages) to DF2. DF3 may then generate and deliver the CC to the LEMF.
(91) In some embodiments, the functionality of any of the methods, processes, signaling diagrams, or flow charts described herein may be implemented by software and/or computer program code or portions of code stored in memory or other computer readable or tangible media, and executed by a processor. In some embodiments, the apparatus may be, included or be associated with at least one software application, module, unit or entity configured as arithmetic operation(s), or as a program or portions of it (including an added or updated software routine), executed by at least one operation processor. Programs, also called program products or computer programs, including software routines, applets and macros, may be stored in any apparatus-readable data storage medium and they include program instructions to perform particular tasks. A computer program product may comprise one or more computer-executable components which, when the program is run, are configured to carry out embodiments. The one or more computer-executable components may be at least one software code or portions of it. Modifications and configurations required for implementing functionality of an embodiment may be performed as routine(s), which may be implemented as added or updated software routine(s). Software routine(s) may be downloaded into the apparatus.
(92) Software or a computer program code or portions of it may be in a source code form, object code form, or in some intermediate form, and it may be stored in some sort of carrier, distribution medium, or computer readable medium, which may be any entity or device capable of carrying the program. Such carriers include a record medium, computer memory, read-only memory, photoelectrical and/or electrical carrier signal, telecommunications signal, and software distribution package, for example. Depending on the processing power needed, the computer program may be executed in a single electronic digital computer or it may be distributed amongst a number of computers. The computer readable medium or computer readable storage medium may be a non-transitory medium.
(93) In other embodiments, the functionality may be performed by hardware, for example through the use of an application specific integrated circuit (ASIC), a programmable gate array (PGA), a field programmable gate array (FPGA), or any other combination of hardware and software. In yet another embodiment, the functionality may be implemented as a signal, a non-tangible means that can be carried by an electromagnetic signal downloaded from the Internet or other network.
(94) According to an embodiment, an apparatus, such as a node, device, or a corresponding component, may be configured as a computer or a microprocessor, such as single-chip computer element, or as a chipset, including at least a memory for providing storage capacity used for arithmetic operation and an operation processor for executing the arithmetic operation.
(95) One having ordinary skill in the art will readily understand that the invention as discussed above may be practiced with steps in a different order, and/or with hardware elements in configurations which are different than those which are disclosed. Therefore, although the invention has been described based upon these preferred embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions would be apparent, while remaining within the spirit and scope of the invention.
Partial Glossary
(96) 3GPP 3rd Generation Partnership Project
(97) ADMF Administration Function
(98) AGW Access Gateway
(99) ASN.1 Abstract Syntax Notation One
(100) ATIS Alliance for Telecommunications Industry Solutions
(101) BBIFF Bearer Binding Intercept and Forwarding Function
(102) BCF Border Control Function
(103) CALEA Communications Assistance for Law Enforcement Act
(104) CC Call Content (or Communication Content)
(105) CII Call Identifying Information (aka IRI)
(106) CS Circuit Switched
(107) CSCF Call State Control Function
(108) CSP Communication Service Provider
(109) DF Delivery Function
(110) DF2 Delivery Function 2 (for IRI)
(111) DF3 Delivery Function 3 (for CC)
(112) DTMF Dual Tone Multi Frequency
(113) EPC Evolved Packet Core
(114) EPS Evolved Packet System
(115) ETSI European Telecommunications Standards Institute
(116) GGSN Gateway GPRS Support Node
(117) GPRS Generic Packet Radio Service
(118) GSM Global Systems Mobile
(119) GSMA GSM Association
(120) GSN GPRS Support Nodes
(121) GTP GPRS Tunnelling Protocol
(122) HI1 Handover Interface 1 (for admin)
(123) HI2 Handover Interface 2 (for IRI)
(124) HI3 Handover Interface 3 (for CC)
(125) HPLMN Home PLMN
(126) IBCF Interworking BCF
(127) I-CSCF Interrogating CSCF
(128) IAP Internet Access Point
(129) ICE Intercepting Control Element
(130) ID Identity or Identifier
(131) IMEI International Mobile Equipment Identity
(132) IMSI International Mobile Subscriber Identity
(133) IM-MGW IMS Media Gateway
(134) IMS IP Multimedia System
(135) IMS-AGW IMS Access Gateway
(136) IP Internet Protocol
(137) IP-CAN IP Carrier Access Network
(138) IRI Intercept Related Information
(139) LBO Local Breakout
(140) LEA Law Enforcement Agency
(141) LEMF Law Enforcement Monitoring Facility
(142) LI Lawful Interception
(143) LMISF LI Mirror IMS State Function
(144) LPCF LI Policy Control Function
(145) LTE Long Term Evolution
(146) MF Mediation Function
(147) MGCF Media Gateway Control Function
(148) MGWMedia Gateway
(149) MME Mobility Management Entity
(150) MRF Media Resource Function
(151) MSISDN Mobile Station Integrated Services Digital Number
(152) P-CSCF Proxy CSCF
(153) PCRF Policy and Charging Rules Function
(154) PDN Packet Data Network
(155) P-GWPDN-Gateway
(156) PDN-GW PDN-Gateway
(157) PDP Packet Data Protocol
(158) PLMN Public Land Mobile Network
(159) RTCP Real Time Control Protocol
(160) RTP Real Time Protocol
(161) S-CSCF Serving CSCF
(162) TrGW Transit Gateway
(163) S8HR S8 based Home Routing
(164) S-GWServing Gateway
(165) SIP Session Initiation Protocol
(166) SA3 Services and Systems Aspects TSG 3
(167) SDP Session Description Protocol
(168) SIP Session Initiation Protocol
(169) SIP URI SIP URI (URI in SIP format)
(170) TEL Telephone
(171) TEL URI Telephone URI (URI in telephone number format)
(172) UDP User Datagram Protocol
(173) URI Uniform Resource Identifier
(174) VoIP Voice over IP
(175) VoLTE Voice over LTE
(176) VPLMN Visited PLMN
(177) X1 Interface (for admin between ADMF and access function)
(178) X2 Interface (for IRI between access function and DF2)