Credit card payment only is accepted for this order because it contains a mix of both publications and training products.
Invalid username/password. Please try again.
xyz
TELECOMMUNICATIONS SECURITY; LAWFUL INTERCEPTION (LI); REQUIREMENTS FOR NETWORK FUNCTIONS
:
Available format(s): Hardcopy, PDF
Language(s): English
Published date:
Publisher: European Telecommunications Standards Institute
Intellectual Property RightsForeword1 Scope2 References3 Definitions and abbreviations 3.1 Definitions 3.2 Abbreviations4 General requirements 4.1 Basic principles for the HI 4.2 Legal requirements 4.3 Example of typical functional role model and process 4.3.1 Overview 4.3.2 Players 4.3.3 Process 4.4 Co-operation 4.4.1 Co-operation between NWO/AP/SvP 4.4.2 Co-operation between SvPs 4.5 International aspects 4.5.1 International provision of service 4.5.2 Co-operation and co-ordination across borders5 Handover interface 5.1 General 5.2 Functional block diagram 5.3 HI1 - interface for administrative information 5.4 HI2 - interface for IRI 5.4.1 Types of records 5.4.2 Formatting and coding of IRI 5.5 HI3 - interface for CC 5.6 Correlation of HI2 and HI3 5.7 Testing7 Performance and quality 7.1 Timing 7.2 Fault reporting 7.3 Quality8 Security aspects 8.1 General 8.2 Transmission to LEAs 8.3 Verification or authentication of LEMF and NWO/AP/SvP facility 8.4 Storage of information 8.5 Control of interception 8.5.1 Internal Interception Function (IIF) 8.5.2 Security of internal interfaces 8.6 Discretion of interception functions 8.7 Remote application of lawful interception9 Billing and charging 9.1 Relating to the interception subject and their correspondents 9.2 Relating to the intercept itselfAnnex A (informative): Quantitative aspects A.1 Networks A.2 Recipient LEMFs A.3 Number of simultaneous interceptsAnnex B (informative): Typical interface implementations B.1 PrinciplesAnnex C (informative): Example direct delivery interface from an ISDN C.1 IRI records contentAnnex D (informative): Testing D.1 Simple test D.2 Enhanced testAnnex E (informative): BibliographyHistory
Specifies the general requirements of Network Operators (NWOs), Service Providers (SvPs) and Access Providers (APs) relating to the provision of lawful interception, with particular reference to the Handover Interface (HI).
AUD CAD CHF CNY DKK EUR GBP HKD IDR INR JPY KRW MXN NOK NZD SEK SGD USD ZAR
Unfortunately, this product is not available for purchase in your region.
Features
Get in touch with us
Loading..
A free alerting service to track changes to standards.
Once you've completed your purchase you'll get a link to My Orders on: -the Confirmation page of check out -and by email You'll be able to access your Multi User Orders to add Users.
You have selected more than three (3) participants. Please contact our Customer Service team.
You have already added this product in the cart. If you would like to add additional copies of this product please adjust the Quantity in the cart. For more than 10 copies, please contact our Customer Support team on +353 (0)1 857 6730.
You have selected more than three (3) trainings. Please contact our Customer Service team.Please contact our Customer Service team on Email: sales@saiglobal.com Phone: 131 242 (Within Australia)
You have already added a product with different Currency. Please change the currency.
This product cannot be added to your cart right now. Please contact our Customer Service team on Email: info@standards.iePhone: +353(0)1 857 6730
You have already saved 6 Quotes. Please contact our Customer Service Team.