Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.033
Word version: 13.0.0
1…
4…
A…
4
Functional architecture
5
Activation, deactivation and interrogation
6
Invocation of Lawful Interception
7
Security
4
Functional architecture
p. 8
5
Activation, deactivation and interrogation
p. 9
5.1
Activation
p. 10
5.1.1
X1_1-interface
p. 10
5.1.2
X1_2-interface (IRI)
p. 11
5.1.3
X1_3-interface (IP)
p. 11
5.2
Deactivation
p. 12
5.2.1
X1_1-interface
p. 12
5.2.2
X1_2-interface (IRI)
p. 13
5.2.3
X1_3-interface (IP)
p. 13
5.3
Interrogation
p. 14
5.3.1
Interrogation of the MSC/VLR and the GMSC
p. 14
5.3.2
Interrogation of Delivery Functions
p. 14
6
Invocation of Lawful Interception
p. 15
6.1
Provision of Intercept Product - Circuit Switched
p. 16
6.1.1
Void
6.1.2
Two stubline configuration (circuit switched data or speech) to LEA
p. 17
6.1.3
X3-interface
p. 17
6.2
Provision of Intercept Product - Short Message Service
p. 18
6.3
Provision of Intercept Related Information
p. 18
6.3.1
X2-interface
p. 19
6.3.2
Structure of the events
p. 19
6.3.3
Call Related events
p. 21
6.3.3.1
Call establishment
p. 21
6.3.3.2
Answer
p. 21
6.3.3.3
Supplementary Services
p. 22
6.3.3.4
Handover
p. 22
6.3.3.5
Release
p. 22
6.3.4
Non Call Related events
p. 23
6.3.4.1
SMS
p. 23
6.3.4.2
Location update
p. 23
6.3.4.3
Subscriber Controlled Input (SCI)
p. 23
6.4
Intercept cases for supplementary services
p. 24
6.4.1
Interception of Multiparty call
p. 24
6.4.1.1
Intercept Product only for Multiparty
p. 24
6.4.1.2
Intercept Related Information for Multiparty
p. 25
6.4.2
Interception for Call Forwarding / Call Deflection
p. 25
6.4.3
Interception on Call Hold / Call Waiting
p. 25
6.4.4
Interception after ECT
p. 25
7
Security
p. 26
7.1
Security
p. 26
7.1.1
Administration security
p. 26
7.1.2
IRI security
p. 26
7.1.2.1
Normal operation
p. 26
7.1.2.2
Communication failure
p. 26
7.1.3
IP security
p. 27
7.1.4
Security aspects of Lawful Interception charging
p. 27
7.1.5
Other security issues
p. 27
7.1.5.1
Log files
p. 27
7.1.5.2
Data consistency
p. 27