UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ETSI - ES 201 671

Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic

active, Most Current
Organization: ETSI
Publication Date: 1 May 2018
Status: active
Page Count: 128
scope:

The present document is step 3 of a three-step approach to describe a generic Handover Interface (HI) for the provision of lawful interception from a Network Operator, an Access Provider or a Service Provider (NWO/AP/SvP) to the Law Enforcement Agencies (LEAs). The provision of lawful interception is a requirement of national law, which is usually mandatory for the operation of any telecommunication service.

Step 1 contains the requirements for lawful interception from a users (LEAs) point of view and is published in ETSI TS 101 331 [1].

Step 2 describes the derived network functions and the general architecture (or functional model) and is published in ETSI ES 201 158 [2]. The present document specifies:

• the generic flow of information as well as the procedures and information elements, which are applicable to any future telecommunication network or service;

• the network/service specific protocols relating to the provision of lawful interception at the Handover Interface (HI), for the following networks/services:

- switched circuit; and

- packet data.

The technologies covered in the present document are: GSM, TETRA, GPRS, ISDN, PSTN, fixed NGN (including PSTN/ISDN emulation) and fixed IMS PSTN simulation.

NOTE: As new networks and/or services are developed, the present document will be expanded as the relevant standards become available.

Document History

ES 201 671
May 1, 2018
Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic
The present document is step 3 of a three-step approach to describe a generic Handover Interface (HI) for the provision of lawful interception from a Network Operator, an Access Provider or a Service...
March 1, 2018
Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic
The present document is step 3 of a three-step approach to describe a generic Handover Interface (HI) for the provision of lawful interception from a Network Operator, an Access Provider or a Service...
May 1, 2007
Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic
A description is not available for this item.
October 1, 2006
Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic
The present document is step 3 of a three-step approach to describe a generic Handover Interface (HI) for the provision of lawful interception from a Network Operator, an Access Provider or a Service...
September 1, 2001
Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic
The present document is step 3 of a three step approach to describe a generic handover interface for the provision of lawful interception from a Network Operator, an Access Provider or a Service...
July 1, 2001
Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic
The present document is step 3 of a three step approach to describe a generic handover interface for the provision of lawful interception from a Network Operator, an Access Provider or a Service...
July 1, 1999
Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic
The present document is step 3 of a three step approach to describe a generic handover interface for the provision of lawful interception from a Network Operator, an Access Provider or a Service...
May 1, 1999
Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic
The present document is step 3 of a three step approach to describe a generic handover interface for the provision of lawful interception from a Network Operator, an Access Provider or a Service...

References

Advertisement