For the purposes of the present document, the terms and definitions given in
TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in
TR 21.905.
Content of Communication (CC):
The content of communication as forwarded from the Mediation and Delivery Function 3 (over the LI_HI3 interface) to the Law Enforcement Monitoring Facility.
Control Plane (CP) Entity:
The network elements or network functions responsible for handling the Control Plane Functions. These include the SGW and PGW in EPS without CUPS, the SGW-C and PGW-C in EPS with CUPS and the SMF in 5GS.
CUPS:
As defined in
TS 23.214, represents PLMN with architecture enhancements for control and user plane separation of EPC nodes.
Intercept Related Information (IRI):
The intercept related information as forwarded from the Mediation and Delivery Function 2 (over the LI_HI2 interface) to the Law Enforcement Monitoring Facility.
IRI event:
The network procedure or event that created an xIRI in the Point Of Interception.
LI component:
The function and equipment involved in handling the Lawful Interception functionality in the CSP's network.
Lawful Interception Identifier (LIID):
Unique identifier that associates a warrant to Lawful Interception Product delivered by the CSP to the LEA.
LI system:
The collection of all LI components involved in handling the Lawful Interception functionality in the CSP's network.
Non-3GPP Access Entity (N3A Entity):
The network functions responsible for interworking between 3GPP Core Network Functions and Non-3GPP access networks. These include TWIF, TNGF, N3IWF and W-AGF.
Non-local ID:
An identity assigned and managed at a different CSP than the CSP performing LI.
Provisioning:
The action taken by the CSP to provide its Lawful Interception functions information that identifies the target and the specific communication services of interest to the LEA, sourced from the LEA provided warrant.
Triggering:
The action taken by a dedicated function (Triggering Function) to provide another dedicated function (Triggered POI), that Provisioning could not directly be applied to, with information that identifies the specific target communication to be intercepted.
User Plane (UP) Entity:
The network elements or network functions responsible for handling the User Plane Functions. These include the SGW and PGW in EPS without CUPS, the SGW-U and PGW-U in EPS with CUPS and the UPF in 5GS.
Warrant:
The formal mechanism to require Lawful Interception from a LEA served to the CSP on a single target identifier. Depending on jurisdiction also known as: intercept request, intercept order, lawful order, court order, lawful order or judicial order (in association with supporting legislation).
xCC:
The content of communication as forwarded from the Point Of Interception (over the LI_X3) interface to the Mediation and Delivery Function 3.
xIRI:
The intercept related information as forwarded from the Point Of Interception (over the LI_X2) interface to the Mediation and Delivery Function 2.
For the purposes of the present document, the abbreviations given in
TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in
TR 21.905.
5GC
5G Core Network
5GMS
5G Media Streaming
5GS
5G System
AAnF
AKMA Anchor Function
AC
Application Client
ACR
Application Context Relocation
ADMF
LI Administration Function
AF
Application Function
AF_ID
Application Function Identity
AKA
Authentication and Key Agreement
A-KID
AKMA Key IDentifier
AKMA
Authentication and Key Management for Applications
AMF
Access and Mobility Management Function
AS
Application Server
AUSF
Authentication Server Function
BBIFF
Bearer Binding Intercept and Forward Function
BSS
Business Support System
CAG
Closed Access Group
CC
Content of Communication
CP
Control Plane
CPIM
Common Presence and Instant Messaging
CPS
Call Placement Service
CSI
Cell Supplemental Information
CSP
Communication Service Provider
CSR
Cell Site Report
CUPS
Control and User Plane Separation
DN
Data Network
DNAI
Data Network Access Identifier
DoNAS
Data over NAS
EAP
Extensible Authentication Protocol
EAS
Edge Application Server
ECGI
E-UTRAN Cell Global Identifier
eCNAM
Enhanced Calling Name
ECSP
Edge Computing Service Provider
E-CSCF
Emergency - Call Session Control Function
EDN
Edge Data Network
EEC
Edge Enabler Client
EECID
Edge Enabler Client IDentifier
EES
Edge Enabler Server
GPSI
Generic Public Subscription Identifier
HMEE
Hardware Mediated Execution Enclave
HR
Home Routed
IBCF
Interconnection Border Control Functions
ICF
Identity Caching Function
IEF
Identity Event Function
IMS-AGW
IMS Access Gateway
IM-MGW
IM Media Gateway
IP
Interception Product
IQF
Identity Query Function
IRI
Intercept Related Information
KAF
AKMA Application Key
KAKMA
AKMA Anchor Key
KID
Key IDentifier
KLI
Decryption key(s) for services encrypted by CSP-provided keys
KSF
Key Server Function
LAF
Location Acquisition Function
LALS
Lawful Access Location Services
LARF
Location Acquisition Requesting Function
LBO
Local Break Out
LEA
Law Enforcement Agency
LEMF
Law Enforcement Monitoring Facility
LI
Lawful Interception
LI CA
Lawful Interception Certificate Authority
LICF
Lawful Interception Control Function
LI_HI1
Lawful Interception Handover Interface 1
LI_HI2
Lawful Interception Handover Interface 2
LI_HI3
Lawful Interception Handover Interface 3
LI_HI4
Lawful Interception Handover Interface 4
LI_HILA
Lawful Interception Handover Interface Location Acquisition
LI_HIQR
Lawful Interception Handover Interface Query Response
LIID
Lawful Interception Identifier
LIPF
Lawful Interception Provisioning Function
LIR
Location Immediate Request
LI_SI
Lawful Interception System Information Interface
LISSF
Lawful Interception State Storage Function
LI_ST
Lawful Interception State Transfer Interface
LI_T1
Lawful Interception Internal Triggering Interface 1
LI_T2
Lawful Interception Internal Triggering Interface 2
LI_T3
Lawful Interception Internal Triggering Interface 3
LI_X0
Lawful Interception Internal Interface 0
LI_X1
Lawful Interception Internal Interface 1
LI_X2
Lawful Interception Internal Interface 2
LI_X2_LA
Lawful Interception Internal Interface 2 Location Acquisition
LI_X3
Lawful Interception Internal Interface 3
LI_X3A
Lawful Interception Internal Interface 3 Aggregator
LI_XEM1
Lawful Interception Internal Interface Event Management Interface 1
LI_XER
Lawful Interception Internal Interface Event Record
LI_XLA
Lawful Interception Internal Interface Location Acquisition
LI_XQR
Lawful Interception Internal Interface Query Response
LMF
Location Management Function
LMISF
LI Mirror IMS State Function
LMISF-CC
LMISF for the handling of CC
LMISF-IRI
LMISF for the handling of IRI
LTF
Location Triggering Function
MA
Multi-Access
MANO
Management and Orchestration
MDF
Mediation and Delivery Function
MDF2
Mediation and Delivery Function 2
MDF3
Mediation and Delivery Function 3
MRFP
Multimedia Resource Function Processor
MSRP
Message Session Relay Protocol
N3A
Non-3GPP Access
N3IWF
Non 3GPP Inter Working Function
N9HR
N9 Home Routed
NAS
Non-Access Stratum
NCGI
NR Cell Global Identity
NEF
Network Exposure Function
NFV
Network Function Virtualisation
NFVI
Network Function Virtualisation Infrastructure
NFVO
Network Function Virtualisation Orchestrator
NIDD
Non-IP Data Delivery
NPLI
Network Provided Location Information
NR
New Radio
NRF
Network Repository Function
NSSF
Network Slice Selection Function
NWDAF
Network Data Analytics Function
OSS
Operations Support System
PAG
POI Aggregator
PCF
Policy Control Function
P-CSCF
Proxy - Call Session Control Function
PEI
Permanent Equipment Identifier
PGW
PDN Gateway
PGW-C
PDN Gateway Control Plane
PGW-U
PDN Gateway User Plane
POI
Point Of Interception
PLMN
Public Land Mobile Network
PTC
Push to Talk over Cellular
RCD
Rich Call Data
RCS
Rich Communication Suite
S8HR
S8 Home Routed
SCEF
Service Capability Exposure Function
SCS
Service Capability Server
SGW
Serving Gateway
SGW-C
Serving Gateway Control Plane
SGW-U
Serving Gateway User Plane
SHAKEN
Signature-based Handling of Asserted information using toKENs
SIRF
System Information Retrieval Function
S-CSCF
Serving - Call Session Control Function
SIP
Session Initiation Protocol
SMF
Session Management Function
SMSF
SMS-Function
STF
Security Terminating Function
STIR
Secure Telephony Identity Revisited
SUCI
Subscriber Concealed Identifier
SUPI
Subscriber Permanent Identifier
TAI
Tracking Area Identity
TF
Triggering Function
TLS
Transport Layer Security
TNGF
Trusted Non-3GPP Gateway Function
TrGW
Transit Gateway
TWIF
Trusted WLAN Interworking Function
UDM
Unified Data Management
UDR
Unified Data Repository
UDSF
Unstructured Data Storage Function
UPF
User Plane Function
VNF
Virtual Network Function
VNFC
Virtual Network Function Component
W-AFG
Wireline Access Gateway Function
xCC
LI_X3 Content of Communication
xIRI
LI_X2 Intercept Related Information