TS 133 107 : 13.2.0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; LAWFUL INTERCEPTION ARCHITECTURE AND FUNCTIONS (3GPP TS 33.107 VERSION 14.5.0 RELEASE 14)
Hardcopy , PDF
23-04-2022
English
Intellectual Property Rights
Foreword
Modal verbs terminology
Foreword
Introduction
1 Scope
2 References
3 Definitions, symbols and abbreviations
4 Functional architecture
5 Activation, deactivation and interrogation
6 Invocation of Lawful Interception (LI) for Circuit
Switched (CS) Services
7 Invocation of Lawful Interception for GSN
Packet Data services
7A Invocation of Lawful Interception for Packet Data
Multi-media Service
8 Security
9 Invocation of Lawful Interception (LI) for 3GPP WLAN
Interworking Services
10 Interception of Multimedia Broadcast/MultiCast
Service (MBMS)
11 IMS Conference Services
12 Lawful Interception for Evolved Packet System
13 Lawful Interception for 3GPP H(e)NBs
14 Interception of Generic Bootstrapping Architecture
(GBA) Secured Communications
15 Invocation of Lawful Interception for IMS-based
VoIP
16 LI for Group Communications using GCSE
17 Interception for Proximity Services
18 Invocation of Lawful Interception for
messaging services
19 Lawful Access Location Service (LALS)
20 Lawful interception in the VPLMN with S8HR
Roaming Architecture
21 Invocation of Lawful Interception for Push to talk
over Cellular services
Annex A (informative) - Information flows for Lawful
Interception invocation of circuit switched
services
Annex B (informative) - Information flows for Lawful
Interception invocation of GSN Packet Data
services
Annex C (informative) - Information flows for the
invocation of Lawful Interception for Packet
Data with multimedia
Annex D (informative) - Information flows for Lawful
Interception invocation at the MGW using H.248
Annex E (informative) - IMS-based VoIP Lawful
Interception Call Scenarios
Annex F (informative) - Examples of IMS-based
VoIP Lawful Interception (LI) Call Flows
Annex G (informative) - Examples of CC Interception for
transcoded Media
Annex H (informative) - Location only warrant
Annex I (informative) - Interception of Targets with
Non-Local IDs
Annex J (informative) - Lawful Interception Illustrations
in VPLMN with S8HR
Annex L (informative) - IP-based Handover Interface
for CC of CS Intercepts
Annex M (informative) - Change history
History
Specifies the architecture and functional requirements within a Third Generation Mobile Communication System (3GMS) and the Evolved Packet System (EPS).
Committee |
3GPP SA 3
|
DocumentType |
Standard
|
Pages |
263
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Superseded
|
SupersededBy |
SR 003 292 : 1.1.1 | LAWFUL INTERCEPTION (LI); IMS AND LTE FAQ AND GUIDANCE |
ES 201 671 : 3.1.1 | LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC |
TS 103 221-1 : 1.2.1 | LAWFUL INTERCEPTION (LI); PART 1: INTERNAL NETWORK INTERFACE X1 FOR LAWFUL INTERCEPTION |
TR 102 528 : 1.1.1 | LAWFUL INTERCEPTION (LI); INTERCEPTION DOMAIN ARCHITECTURE FOR IP NETWORKS |
TS 101 671 : 3.14.1 | LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC |
TS 187 005 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN LAWFUL INTERCEPTION; STAGE 1 AND STAGE 2 DEFINITION |
TR 101 567 : 1.1.1 | LAWFUL INTERCEPTION (LI); CLOUD/VIRTUAL SERVICES FOR LAWFUL INTERCEPTION (LI) AND RETAINED DATA (RD) |
GR NFV-SEC 011 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY; REPORT ON NFV LI ARCHITECTURE |
TR 101 943 : 2.2.1 | LAWFUL INTERCEPTION (LI); CONCEPTS OF INTERCEPTION IN A GENERIC NETWORK ARCHITECTURE |
TR 102 519 : 1.2.1 | LAWFUL INTERCEPTION (LI); LAWFUL INTERCEPTION OF PUBLIC WIRELESS LAN INTERNET ACCESS |
TR 101 772 : 1.1.2 | TIPHON RELEASE 3; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; LAWFUL INTERCEPTION - TOP LEVEL REQUIREMENTS |
ANSI J STD 025 : B | LAWFULLY AUTHORIZED ELECTRONIC SURVEILLANCE |
ES 201 671 : 3.1.1 | LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC |
ES 201 158 : 1.2.1 | TELECOMMUNICATIONS SECURITY; LAWFUL INTERCEPTION (LI); REQUIREMENTS FOR NETWORK FUNCTIONS |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.