• There are no items in your cart

TR 102 053 : 1.1.1

Current

Current

The latest, up-to-date edition.

TELECOMMUNICATIONS SECURITY; LAWFUL INTERCEPTION (LI); NOTES ON ISDN LAWFUL INTERCEPTION FUNCTIONALITY

Available format(s)

Hardcopy , PDF

Language(s)

English

€17.53
Excluding VAT

Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Introduction
5 Typical message sequence diagrams for IRI
  5.1 General remarks
  5.2 Remarks to tables
  5.3 Remarks to scenarios
  5.4 Originating target, basic cal
       5.4.1 Initial LI procedures
       5.4.2 Set up of an additional call leg
       5.4.3 IRI-CONTINUE records (general)
       5.4.4 Answer by other party
       5.4.5 Call release (originating or terminating target)
  5.5 Terminating target, basic call
       5.5.1 Initial LI procedure
       5.5.2 Answer by target
       5.5.3 Call release
  5.6 Originating target call, invocation of LI relevant services
       5.6.1 Call forwarded by called party
  5.7 Terminating target call, invocation of LI relevant services
       5.7.1 Terminating call at target is a forwarded call
       5.7.2 Call forwarded by target
       5.7.3 Target invokes Call Waiting (CW)
  5.8 Target actions during a call in progress
       5.8.1 Call HOLD by target
       5.8.2 Call RETRIEVE by target
  5.9 Three Party Service (3PTY)
       5.9.1 Target establishes Three Party Conference (3PTY)
       5.9.2 Target: Private communication with Active-Idle party
       5.9.3 Target: Private communication with Active-Held party
       5.9.4 Release of 3 PTY conference by Active-Held party
       5.9.5 Release of 3 PTY conference by Active-Idle party
  5.10 Add on conference (CONF)
       5.10.1 Mapping of PartyId/ConferenceId to Communication
              Identifiers
       5.10.2 Beginning a conference from the Idle call state
       5.10.3 Beginning a conference from the Active call state
       5.10.4 Adding a remote user
       5.10.5 Splitting a remote user
       5.10.6 Further actions during a conference
       5.10.7 Target clears the conference
       5.10.8 Option B (CC link only for active call)
       5.10.9 Add on conference using other protocols
  5.11 Target exchange receives notification related to other party
  5.12 Service activation (not call related)
  5.13 Service activation/invocation during a call
       5.13.1 ISDN accesses
       5.13.2 Analogue accesses
  5.14 Unsuccessful calls from target (originating), IRI-BEGIN
       record sent
  5.15 Unsuccessful calls from/to target, IRI-BEGIN record not
       sent
6 State model for an ISDN (overview description for CC
  link and IRI delivery)
Annex A: Bibliography
History

Provides detailed guidance on network functionality, beyond that provided in [1], on lawful interception as it applies to an ISDN. The handover interface remains as specified in [1].

Committee
SECLI
DocumentType
Standard
Pages
39
PublisherName
European Telecommunications Standards Institute
Status
Current

TS 102 232-6 : 3.3.1 LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE AND SERVICE-SPECIFIC DETAILS (SSD) FOR IP DELIVERY; PART 6: SERVICE-SPECIFIC DETAILS FOR PSTN/ISDN SERVICES

ES 201 671 : 3.1.1 LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.