• Shopping Cart
    There are no items in your cart

EG 201 781 : 1.1.1

Current

Current

The latest, up-to-date edition.

INTELLIGENT NETWORKS (IN); LAWFUL INTERCEPTION

Available format(s)

Hardcopy , PDF

€35.06
Excluding VAT

Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Introduction
5 General Requirements for Lawful Interception
  5.1 Introduction
  5.2 General LEA Requirements
  5.3 Requirement for Network Functions
  5.4 IN Specific Requirements
6 Functional IN architecture
  6.1 Distributed functional plane model
  6.2 Internetworking
7 LI architecture
  7.1 General
  7.2 Functions and procedures involved in LI for IN calls
  7.3 Distributed functional model
8 Security Aspects of LI for IN
  8.1 Requirements
  8.2 Solutions
Annex A (informative): Lawful Interception Principles for
        Intelligent Networks
      A.1 Introduction
      A.2 Intercepted Target Identities
      A.3 Triggers/Activation of interception
      A.4 Issues
Annex B (informative): Implementation options for the generic
        functional model
      B.1 SCP with no LI related functionality
      B.2 Limited LI functionality in SCP
      B.3 LI functionality in SCP, NO LI related signalling
          between CCFs
      B.4 LI functionality in SCP, LI related signalling
          between CCFs
      B.5 LI functionality in SCP, related signalling
          between CCFs
      B.6 LI functionality in LI Service Application on SCP
      B.7 LI functionality in SCP, NO LI related signalling
          between CCFs
Annex C (informative): Interface Data Description
      C.1 Common Data Type
      C.2 It Interface
      C.3 Ii Interface
      C.4 Ia Interface
      C.5 Ir Interface
      C.6 Ic Interface
      C.7 LI data on the SCP-SSP interface
Annex D (informative): Topics for future work
      D.1 Mutual legal assistance between LEAs
      D.2 Interworking with other countries
      D.3 Interworking with other protocols
      D.4 CS-3
      D.5 CS-4
      D.6 CAMEL
History

Covers the standardisation of functions to allow lawful interception of services running in on IN platform.

Committee
SPAN 6
DocumentType
Standard
Pages
42
PublisherName
European Telecommunications Standards Institute
Status
Current

EG 201 807 : 1.1.1 NETWORK ASPECTS (NA); INTELLIGENT NETWORK (IN); NETWORK OPERATORS' REQUIREMENTS FOR THE DELIVERY OF SERVICE PROVIDER ACCESS
EG 201 897 : 1.2.1 SERVICES AND PROTOCOLS FOR ADVANCED NETWORKS (SPAN); SERVICE PROVIDER ACCESS; SERVICE PROVIDER ACCESS REQUIREMENTS IN A FIXED AND MOBILE ENVIRONMENT
TR 101 943 : 2.2.1 LAWFUL INTERCEPTION (LI); CONCEPTS OF INTERCEPTION IN A GENERIC NETWORK ARCHITECTURE

ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
ETR 330 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
EN 301 140-5 : 1.1.3 INTELLIGENT NETWORK (IN) - INTELLIGENT NETWORK APPLICATION PROTOCOL (INAP) - CAPABILITY SET 2 (CS2) - PART 5: DISTRIBUTED FUNCTIONAL PLANE (DFP) [ITU-T RECOMMENDATION Q.1224 (1997) MODIFIED]
ETR 331 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - DEFINITION OF USER REQUIREMENTS FOR LAWFUL INTERCEPTION OF TELECOMMUNICATIONS
ES 201 671 : 3.1.1 LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC
ETS 300 374-1 : 20001 INTELLIGENT NETWORK (IN) - INTELLIGENT NETWORK CAPABILITY SET 1 (CS1) CORE INTELLIGENT NETWORK APPLICATION PROTOCOL (INAP) - PROTOCOL SPECIFICATION
ES 201 158 : 1.2.1 TELECOMMUNICATIONS SECURITY; LAWFUL INTERCEPTION (LI); REQUIREMENTS FOR NETWORK FUNCTIONS
ETR 164 : 20001 INTEGRATED SERVICES DIGITAL NETWORK (ISDN); INTELLIGENT NETWORK (IN); INTERACTION BETWEEN IN APPLICATION PROTOCOL (INAP) AND ISDN USER PART (ISUP) VERSION 2

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.