TR 102 053 : 1.1.1
Current
The latest, up-to-date edition.
TELECOMMUNICATIONS SECURITY; LAWFUL INTERCEPTION (LI); NOTES ON ISDN LAWFUL INTERCEPTION FUNCTIONALITY
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Introduction
5 Typical message sequence diagrams for IRI
5.1 General remarks
5.2 Remarks to tables
5.3 Remarks to scenarios
5.4 Originating target, basic cal
5.4.1 Initial LI procedures
5.4.2 Set up of an additional call leg
5.4.3 IRI-CONTINUE records (general)
5.4.4 Answer by other party
5.4.5 Call release (originating or terminating target)
5.5 Terminating target, basic call
5.5.1 Initial LI procedure
5.5.2 Answer by target
5.5.3 Call release
5.6 Originating target call, invocation of LI relevant services
5.6.1 Call forwarded by called party
5.7 Terminating target call, invocation of LI relevant services
5.7.1 Terminating call at target is a forwarded call
5.7.2 Call forwarded by target
5.7.3 Target invokes Call Waiting (CW)
5.8 Target actions during a call in progress
5.8.1 Call HOLD by target
5.8.2 Call RETRIEVE by target
5.9 Three Party Service (3PTY)
5.9.1 Target establishes Three Party Conference (3PTY)
5.9.2 Target: Private communication with Active-Idle party
5.9.3 Target: Private communication with Active-Held party
5.9.4 Release of 3 PTY conference by Active-Held party
5.9.5 Release of 3 PTY conference by Active-Idle party
5.10 Add on conference (CONF)
5.10.1 Mapping of PartyId/ConferenceId to Communication
Identifiers
5.10.2 Beginning a conference from the Idle call state
5.10.3 Beginning a conference from the Active call state
5.10.4 Adding a remote user
5.10.5 Splitting a remote user
5.10.6 Further actions during a conference
5.10.7 Target clears the conference
5.10.8 Option B (CC link only for active call)
5.10.9 Add on conference using other protocols
5.11 Target exchange receives notification related to other party
5.12 Service activation (not call related)
5.13 Service activation/invocation during a call
5.13.1 ISDN accesses
5.13.2 Analogue accesses
5.14 Unsuccessful calls from target (originating), IRI-BEGIN
record sent
5.15 Unsuccessful calls from/to target, IRI-BEGIN record not
sent
6 State model for an ISDN (overview description for CC
link and IRI delivery)
Annex A: Bibliography
History
Provides detailed guidance on network functionality, beyond that provided in [1], on lawful interception as it applies to an ISDN. The handover interface remains as specified in [1].
Committee |
SECLI
|
DocumentType |
Standard
|
Pages |
39
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
TS 102 232-6 : 3.3.1 | LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE AND SERVICE-SPECIFIC DETAILS (SSD) FOR IP DELIVERY; PART 6: SERVICE-SPECIFIC DETAILS FOR PSTN/ISDN SERVICES |
ES 201 671 : 3.1.1 | LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.