Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 General Introduction
5 User (LEA) requirements for Lawful Interception
5.1 General requirements
5.2 Result of interception
5.3 Location information
5.4 Time Constraints
5.5 Non disclosure
5.6 Information Transmission and Information
Protection Requirements
5.7 Internal Security
5.8 Unchanged State of Service, etc
5.9 Technical Interface(s) and Format Requirements
5.10 Independence of the Network
Operator/Access Provider/Service Provider
5.11 Temporary obstacles to transmission
5.12 Identification of the identity to be intercepted
5.13 Multiple interception
6 TIPHON scenarios and role model
6.1 TIPHON scenarios
6.2 Functional block diagram
7 Further work
History