Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.107
Word version: 18.0.0
0…
4
5…
5A…
6…
7…
7A…
8…
9…
10…
11…
12…
12.2…
12.3…
12.4…
12.5…
13…
14…
15…
16…
17…
18…
19…
20…
21…
22…
23…
A…
B…
C…
D…
E…
F…
G…
H…
I…
J…
L…
18
Invocation of Lawful Interception for messaging services
18.1
Overview of messaging services interception
18.2
SMS
18.2.1
Introduction
18.2.2
SMS over GPRS/UMTS
18.2.3
SMS over IP
18.2.4
SMS over NAS
18.3
MMS
18.3.1
Background
18.3.2
MMS Architecture IRI/CC Events
18.3.3
MMS Events
...
18
Invocation of Lawful Interception for messaging services
|R13|
p. 205
18.1
Overview of messaging services interception
p. 205
18.2
SMS
p. 206
18.2.1
Introduction
p. 206
18.2.2
SMS over GPRS/UMTS
p. 206
18.2.3
SMS over IP
p. 206
18.2.4
SMS over NAS
|R14|
p. 207
18.2.4.0
Introduction
p. 207
18.2.4.1
Structure of the events
p. 207
18.2.4.2
SMS over NAS Events
p. 207
18.2.4.3
SMS over NAS
p. 208
18.3
MMS
|R14|
p. 209
18.3.1
Background
p. 209
18.3.2
MMS Architecture IRI/CC Events
p. 210
18.3.3
MMS Events
p. 213
18.3.3.1
MMS Send
p. 213
18.3.3.2
MMS Notification & Response
p. 215
18.3.3.3
MMS Retrieval & Acknowledgement
p. 216
18.3.3.4
MMS Forwarding
p. 218
18.3.3.5
MMS Store
p. 219
18.3.3.6
MMS Upload
p. 219
18.3.3.7
MMS Delete (Stored in MMBox or in Proxy-Relay)
p. 220
18.3.3.8
MMS Delivery
p. 220
18.3.3.9
MMS Read Reply
p. 221
18.3.3.10
MMS Cancel
p. 222
18.3.3.12
MMS MMBox Viewing
p. 222