• TS 133 107 : 13.2.0

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; LAWFUL INTERCEPTION ARCHITECTURE AND FUNCTIONS (3GPP TS 33.107 VERSION 14.5.0 RELEASE 14)

    Available format(s):  Hardcopy, PDF

    Superseded date:  23-04-2022

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    Modal verbs terminology
    Foreword
    Introduction
    1 Scope
    2 References
    3 Definitions, symbols and abbreviations
    4 Functional architecture
    5 Activation, deactivation and interrogation
    6 Invocation of Lawful Interception (LI) for Circuit
       Switched (CS) Services
    7 Invocation of Lawful Interception for GSN
       Packet Data services
    7A Invocation of Lawful Interception for Packet Data
       Multi-media Service
    8 Security
    9 Invocation of Lawful Interception (LI) for 3GPP WLAN
       Interworking Services
    10 Interception of Multimedia Broadcast/MultiCast
       Service (MBMS)
    11 IMS Conference Services
    12 Lawful Interception for Evolved Packet System
    13 Lawful Interception for 3GPP H(e)NBs
    14 Interception of Generic Bootstrapping Architecture
       (GBA) Secured Communications
    15 Invocation of Lawful Interception for IMS-based
       VoIP
    16 LI for Group Communications using GCSE
    17 Interception for Proximity Services
    18 Invocation of Lawful Interception for
       messaging services
    19 Lawful Access Location Service (LALS)
    20 Lawful interception in the VPLMN with S8HR
       Roaming Architecture
    21 Invocation of Lawful Interception for Push to talk
       over Cellular services
    Annex A (informative) - Information flows for Lawful
            Interception invocation of circuit switched
            services
    Annex B (informative) - Information flows for Lawful
            Interception invocation of GSN Packet Data
            services
    Annex C (informative) - Information flows for the
            invocation of Lawful Interception for Packet
            Data with multimedia
    Annex D (informative) - Information flows for Lawful
            Interception invocation at the MGW using H.248
    Annex E (informative) - IMS-based VoIP Lawful
            Interception Call Scenarios
    Annex F (informative) - Examples of IMS-based
            VoIP Lawful Interception (LI) Call Flows
    Annex G (informative) - Examples of CC Interception for
            transcoded Media
    Annex H (informative) - Location only warrant
    Annex I (informative) - Interception of Targets with
            Non-Local IDs
    Annex J (informative) - Lawful Interception Illustrations
            in VPLMN with S8HR
    Annex L (informative) - IP-based Handover Interface
            for CC of CS Intercepts
    Annex M (informative) - Change history
    History

    Abstract - (Show below) - (Hide below)

    Specifies the architecture and functional requirements within a Third Generation Mobile Communication System (3GMS) and the Evolved Packet System (EPS).

    General Product Information - (Show below) - (Hide below)

    Committee 3GPP SA 3
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Superseded
    Superseded By

    Standards Referenced By This Book - (Show below) - (Hide below)

    SR 003 292 : 1.1.1 LAWFUL INTERCEPTION (LI); IMS AND LTE FAQ AND GUIDANCE
    ES 201 671 : 3.1.1 LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC
    TS 103 221-1 : 1.2.1 LAWFUL INTERCEPTION (LI); PART 1: INTERNAL NETWORK INTERFACE X1 FOR LAWFUL INTERCEPTION
    TR 102 528 : 1.1.1 LAWFUL INTERCEPTION (LI); INTERCEPTION DOMAIN ARCHITECTURE FOR IP NETWORKS
    TS 101 671 : 3.14.1 LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC
    TS 187 005 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN LAWFUL INTERCEPTION; STAGE 1 AND STAGE 2 DEFINITION
    TR 101 567 : 1.1.1 LAWFUL INTERCEPTION (LI); CLOUD/VIRTUAL SERVICES FOR LAWFUL INTERCEPTION (LI) AND RETAINED DATA (RD)
    GR NFV-SEC 011 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY; REPORT ON NFV LI ARCHITECTURE
    TR 101 943 : 2.2.1 LAWFUL INTERCEPTION (LI); CONCEPTS OF INTERCEPTION IN A GENERIC NETWORK ARCHITECTURE
    TR 102 519 : 1.2.1 LAWFUL INTERCEPTION (LI); LAWFUL INTERCEPTION OF PUBLIC WIRELESS LAN INTERNET ACCESS
    TR 101 772 : 1.1.2 TIPHON RELEASE 3; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; LAWFUL INTERCEPTION - TOP LEVEL REQUIREMENTS

    Standards Referencing This Book - (Show below) - (Hide below)

    ANSI J STD 025 : B LAWFULLY AUTHORIZED ELECTRONIC SURVEILLANCE
    ES 201 671 : 3.1.1 LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC
    ES 201 158 : 1.2.1 TELECOMMUNICATIONS SECURITY; LAWFUL INTERCEPTION (LI); REQUIREMENTS FOR NETWORK FUNCTIONS
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective