SlideShare une entreprise Scribd logo
1  sur  31
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 1
June 2018
Product Management Utimaco TS
Lawful Interception Solutions
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 2
NetworksServices
Utimaco Lawful Interception Solutions
IP Multimedia
Mobile Fixed Sat
2G 3G
5G WLAN
4G DSL
PSTN
Cable
WLAN
FTTx SAT
Internet
on Air
VoLTE RCS
Messaging LI
VoIP email PTT Umbrella
Hosted
LI
IOT
Remote
Access
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 3
General Architecture (Functional Model)
Lawful Interception
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 4
System Overview
Utimaco LIMS
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 5
Lawful Interception in 2G/3G Wireless (Voice)
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Mobile Voice Core3G Radio Access
PSTN/other PLMN
HI-2
HI-3
X2
IRI
HI-1
X1
2G Radio Access
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 6
Lawful Interception in 2G/3G Wireless (Voice)
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Mobile Voice Core3G Radio Access
PSTN/other PLMN
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
2G Radio Access
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 7
Lawful Interception in 2G/3G Wireless (Data)
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Mobile Core3G Radio Access
Internet
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
2G Radio Access
PSTN/other PLMN
Gb
A
IuPS
IuCS
Gn
E
Gí
Yu
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 8
Lawful Interception in 2G/3G Wireless (Data)
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Mobile Core3G Radio Access
Internet
HI-2
HI-3
X2
IRI
X3
CC
HI-1
2G Radio Access
PSTN/other PLMN
Gb
A
IuPS
IuCS
Gn
E
Gi
Yu
X1
Gr
LIMS Access Point GTP
tap
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 9
Lawful Interception in 2G/3G Wireless (Voice&Data)
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Mobile Core3G Radio Access
Internet
HI-2
HI-3
X2/X3
HI-1
2G Radio Access
PSTN/other PLMN
Gb
A
IuPS
IuCS
Gn
E
Gi
Yu
Gr
LIMS Access Point
X1
tap
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 10
Lawful Interception in 4G Wireless (LTE)
ETSI TS 133 106-108
3GPP TS 33.106-108
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Evolved Packet CoreLTE Radio Access Network
Internet
other networks
GERAN/UTRAN
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 11
Lawful Interception in 5G Wireless (SA)
ETSI TS 133 126-128
3GPP TS 33.126-128
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
5G Core5G Radio Access Network
Internet
other networks
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 12
Lawful Interception in 5G Wireless (NSA, EPC)
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
4G Evolved Packet Core5G Radio Access Network
Internet
other networks
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
4G Radio Access Network
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 13
Lawful Interception of IMS/VoLTE
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
IMS CoreLTE/5G RAN
Internet
other networks
GERAN/UTRAN
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
EPC/5GNGC
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 14
Lawful Interception of RCS
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
IMS CoreLTE/5G RAN
Internet
other networks
GERAN/UTRAN
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
EPC/5GNGC
RCS
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 15
Lawful Interception of Cellular IOT (4G)
EPCLTE Radio Access Network IOT Platform
SCEF
AS
MTC-
IWF
UE
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
HI-2
HI-3
X2 (IRI)
HI-1
X1
X3 (CC)
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 16
Lawful Interception of Cellular IOT (5G)
5G NGC4G/5G Radio Access Network IOT Platform
SCEF
AS
MTC-
IWF
UE
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
HI-2
HI-3
X2 (IRI)
HI-1
X1
X3 (CC)
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 17
Lawful Interception of Cloud IOT
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
HI-2
HI-3
X2 (IRI)
X3 (CC)
HI-1
X1
InternetAccess Network IOT Platform
AS
UE
IOT
Gateway
AS
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 18
Lawful Interception in WLAN
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Core Networkhotspot
Internet
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
LIMS Access Point AAA
WWW
SSG/BRAS
tap
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 19
Lawful Interception of Fixed Voice (PSTN)
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Core NetworkResidential/Enterprise
PSTN
HI-2
HI-3
X2
IRI
HI-1
X1
C5 C4
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 20
Lawful Interception in xDSL Networks
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Service Provider Core NetworkDSLAM
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
LIMS Access Point AAA
Internet
tap
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 21
Lawful Interception in xDSL Networks
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Service Provider Core NetworkDSLAM
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
LIMS Access Point AAA
Internet
LIMS Access Point IP
tap
tap
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 22
Lawful Interception in Cable Networks
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Service Provider Core NetworkResidential/Enterprise
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
LIMS Access Point AAA
Internet
tap
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 23
Lawful Interception of E-Mail
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
Service Provider Core NetworkResidential/Enterprise
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
LIMS Access Point E-Mail
Internet
tap
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 24
Lawful Interception of VoIP
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS Law Enforcement Agency
IMS Core
Internet
other networks
GERAN/UTRAN
HI-2
HI-3
X2
IRI
X3
CC
HI-1
X1
Residential/Enterprise
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 25
Umbrella LIMS
LIMS Management Server
LIMS Mediation Devices
Utimaco LIMS
HI-1
Monitoring Center
Law Enforcement Agency 1
Monitoring Center
Law Enforcement Agency 2
Monitoring Center
Law Enforcement Agency 3
LIMS Gateway
ADMF
DF2
DF3
DF3
Network 1
Network 2
Network n
HI-2
HI-3
X1
X2
X3
X3 (CS)
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 26
Remote Access Interface
LIMS Management Server
LIMS Mediation Devices
Utimaco LIMS
HI-1 (Utimaco RAI)
Monitoring Center
Law Enforcement Agency
LIMS Gateway
ADMF
DF2
DF3
DF3
Network 1
Network 2
Network n
X1
X2
X3
X3 (CS)
HI-2
HI-3
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 27
Hosted LI
LIMS Management Server
LIMS Mediation Devices
Utimaco LIMS
HI-1
Monitoring Center
Law Enforcement Agency 1
LIMS Gateway
ADMF
DF2
DF3
DF3
Network 1
Network 2
Network n
X1
X2
X3
X3 (CS)
HI-2
HI-3
Managed Service Provider
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 28
Lawful Interception for SAT Internet
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS
Law Enforcement Agency
Operator Core NetworkSAT Ground Station
HI-2 HI-3
X2 (IRI)
X3 (CC)
HI-1
Gn
E
X1
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 29
Lawful Interception for inflight Internet
LIMS Management Server
LIMS Mediation Device
Monitoring Center
Utimaco LIMS
Law Enforcement Agency
Operator Core NetworkSAT Ground Station
HI-2 HI-3
X2 (IRI)
X3 (CC)
HI-1
Gn
E
X1
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 30
Utimaco TS GmbH
Germanusstraße 4
52080 Aachen, Germany
Phone +49 241 1696-0
Web www.utimaco.com
E-Mail info@utimaco.com
Copyright © 2018 – Utimaco TS GmbH
All trademarks are trademarks of the particular copyright holder.
Specifications are subject to change without notice.
Thank you for your attention!
Utimaco TS GmbH · Aachen, Germany · June 2018 Page 31
Access Methods
Lawful Interception
 Active
 Passive
Utimaco LIMS
X1 (target provisioning)
X2/X3 (IRI/CC delivery)
Network elements with IIF
Utimaco LIMS
X1 (target provisioning)
X2/X3 (IRI/CC delivery)
Network with tap and probe
LIMS Access Point
X1’

Contenu connexe

Tendances

ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sipVikas Shokeen
 
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014  Segment Routing TI-LFA Fast ReRouteMPLS WC 2014  Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014 Segment Routing TI-LFA Fast ReRouteBruno Decraene
 
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public NetworksAdvanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks3G4G
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVikas Shokeen
 
Ericsson NFVi solution
Ericsson NFVi solutionEricsson NFVi solution
Ericsson NFVi solutionEricsson
 
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...ProcExpl
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)3G4G
 
Part 6: Standalone and Non-Standalone 5G - 5G for Absolute Beginners
Part 6: Standalone and Non-Standalone 5G - 5G for Absolute BeginnersPart 6: Standalone and Non-Standalone 5G - 5G for Absolute Beginners
Part 6: Standalone and Non-Standalone 5G - 5G for Absolute Beginners3G4G
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attachaliirfan04
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basicsMustafa Golam
 
Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...
Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...
Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...Michael Gronovius
 
5G NR parameters
5G NR parameters5G NR parameters
5G NR parametersSasi Reddy
 
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionAPNIC
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxtharinduwije
 
5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation3G4G
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial TrainingSumanPramanik7
 

Tendances (20)

ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014  Segment Routing TI-LFA Fast ReRouteMPLS WC 2014  Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
 
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public NetworksAdvanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
Ericsson NFVi solution
Ericsson NFVi solutionEricsson NFVi solution
Ericsson NFVi solution
 
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
 
Part 6: Standalone and Non-Standalone 5G - 5G for Absolute Beginners
Part 6: Standalone and Non-Standalone 5G - 5G for Absolute BeginnersPart 6: Standalone and Non-Standalone 5G - 5G for Absolute Beginners
Part 6: Standalone and Non-Standalone 5G - 5G for Absolute Beginners
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attach
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
 
Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...
Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...
Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...
 
Rach procedure in lte
Rach procedure in lteRach procedure in lte
Rach procedure in lte
 
5G Network Slicing
5G Network Slicing5G Network Slicing
5G Network Slicing
 
5G NR parameters
5G NR parameters5G NR parameters
5G NR parameters
 
BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
 
5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation5G Network Architecture, Design and Optimisation
5G Network Architecture, Design and Optimisation
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial Training
 
DMVPN
DMVPNDMVPN
DMVPN
 

Similaire à LI Solutions

VSSML18. European Machine Learning Platform
VSSML18. European Machine Learning PlatformVSSML18. European Machine Learning Platform
VSSML18. European Machine Learning PlatformBigML, Inc
 
Security Made in Germany gateprotect
Security Made in Germany gateprotectSecurity Made in Germany gateprotect
Security Made in Germany gateprotectGiovanni Zanasca
 
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...Amazon Web Services
 
The Charter of Trust. Presentation by Ludmila Morozova-Buss @ 'Free and Safe ...
The Charter of Trust. Presentation by Ludmila Morozova-Buss @ 'Free and Safe ...The Charter of Trust. Presentation by Ludmila Morozova-Buss @ 'Free and Safe ...
The Charter of Trust. Presentation by Ludmila Morozova-Buss @ 'Free and Safe ...Ludmila Morozova-Buss
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated DrivingITU
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...TI Safe
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUMEUBrasilCloudFORUM .
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsITU
 
Ieee 5 g summit_ericsson_a
Ieee 5 g summit_ericsson_aIeee 5 g summit_ericsson_a
Ieee 5 g summit_ericsson_aMaria Boura
 
Hilscher netIOT - Industrial Cloud Communication
Hilscher netIOT - Industrial Cloud CommunicationHilscher netIOT - Industrial Cloud Communication
Hilscher netIOT - Industrial Cloud CommunicationArmin Pühringer
 
Norwich Union Insurance Telematics Pilot - Pay as you drive - V Fricke
Norwich Union Insurance Telematics Pilot - Pay as you drive - V FrickeNorwich Union Insurance Telematics Pilot - Pay as you drive - V Fricke
Norwich Union Insurance Telematics Pilot - Pay as you drive - V Frickemfrancis
 
The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...Capgemini
 
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...NETWAYS
 
Mission Critical communications for Rome Airports
Mission Critical communications for Rome AirportsMission Critical communications for Rome Airports
Mission Critical communications for Rome AirportsLeonardo
 
ICARUS @EBDVF 2018 - TransformingTransport Session (November 2018, Vienna)
ICARUS @EBDVF 2018 - TransformingTransport Session (November 2018, Vienna)ICARUS @EBDVF 2018 - TransformingTransport Session (November 2018, Vienna)
ICARUS @EBDVF 2018 - TransformingTransport Session (November 2018, Vienna)ICARUS2020.aero
 
ETDP 2015 D2 Keynote Rapid Response - Hub Group
ETDP 2015 D2 Keynote Rapid Response - Hub GroupETDP 2015 D2 Keynote Rapid Response - Hub Group
ETDP 2015 D2 Keynote Rapid Response - Hub GroupComit Projects Ltd
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunk
 
IoT digest. April 2018
IoT digest. April 2018IoT digest. April 2018
IoT digest. April 2018ElifTech
 

Similaire à LI Solutions (20)

VSSML18. European Machine Learning Platform
VSSML18. European Machine Learning PlatformVSSML18. European Machine Learning Platform
VSSML18. European Machine Learning Platform
 
Security Made in Germany gateprotect
Security Made in Germany gateprotectSecurity Made in Germany gateprotect
Security Made in Germany gateprotect
 
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
Industrial IoT: Connecting Existing Machines to Tomorrow's IoT, ft. Deutsche ...
 
The Charter of Trust. Presentation by Ludmila Morozova-Buss @ 'Free and Safe ...
The Charter of Trust. Presentation by Ludmila Morozova-Buss @ 'Free and Safe ...The Charter of Trust. Presentation by Ludmila Morozova-Buss @ 'Free and Safe ...
The Charter of Trust. Presentation by Ludmila Morozova-Buss @ 'Free and Safe ...
 
5G for Connected and Automated Driving
5G for Connected and Automated Driving5G for Connected and Automated Driving
5G for Connected and Automated Driving
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
 
Coordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT EcosystemsCoordination of Threat Analysis in ICT Ecosystems
Coordination of Threat Analysis in ICT Ecosystems
 
Ieee 5 g summit_ericsson_a
Ieee 5 g summit_ericsson_aIeee 5 g summit_ericsson_a
Ieee 5 g summit_ericsson_a
 
Hilscher netIOT - Industrial Cloud Communication
Hilscher netIOT - Industrial Cloud CommunicationHilscher netIOT - Industrial Cloud Communication
Hilscher netIOT - Industrial Cloud Communication
 
Norwich Union Insurance Telematics Pilot - Pay as you drive - V Fricke
Norwich Union Insurance Telematics Pilot - Pay as you drive - V FrickeNorwich Union Insurance Telematics Pilot - Pay as you drive - V Fricke
Norwich Union Insurance Telematics Pilot - Pay as you drive - V Fricke
 
CLOUD-NATIVE NETWORKS FOR THE ADVANCEMENT OF AI/IoT
CLOUD-NATIVE NETWORKS FOR THE ADVANCEMENT OF AI/IoTCLOUD-NATIVE NETWORKS FOR THE ADVANCEMENT OF AI/IoT
CLOUD-NATIVE NETWORKS FOR THE ADVANCEMENT OF AI/IoT
 
The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...
 
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
OSMC 2019 | Zero Trusted Networks – why Perimeter Security is dead by Jochen ...
 
Mission Critical communications for Rome Airports
Mission Critical communications for Rome AirportsMission Critical communications for Rome Airports
Mission Critical communications for Rome Airports
 
Avitech corporatepresentation jul2015-linkedin
Avitech corporatepresentation jul2015-linkedinAvitech corporatepresentation jul2015-linkedin
Avitech corporatepresentation jul2015-linkedin
 
ICARUS @EBDVF 2018 - TransformingTransport Session (November 2018, Vienna)
ICARUS @EBDVF 2018 - TransformingTransport Session (November 2018, Vienna)ICARUS @EBDVF 2018 - TransformingTransport Session (November 2018, Vienna)
ICARUS @EBDVF 2018 - TransformingTransport Session (November 2018, Vienna)
 
ETDP 2015 D2 Keynote Rapid Response - Hub Group
ETDP 2015 D2 Keynote Rapid Response - Hub GroupETDP 2015 D2 Keynote Rapid Response - Hub Group
ETDP 2015 D2 Keynote Rapid Response - Hub Group
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use Case
 
IoT digest. April 2018
IoT digest. April 2018IoT digest. April 2018
IoT digest. April 2018
 

Plus de Денис Забіяко, BCIP (11)

Linux basic course (BMSTU)
Linux basic course (BMSTU)Linux basic course (BMSTU)
Linux basic course (BMSTU)
 
Linux INTUIT Course (eng)
Linux INTUIT Course (eng)Linux INTUIT Course (eng)
Linux INTUIT Course (eng)
 
Linux INTUIT Course
Linux INTUIT CourseLinux INTUIT Course
Linux INTUIT Course
 
Zabiyako CV
Zabiyako CVZabiyako CV
Zabiyako CV
 
Certificate denis zabiyako
Certificate denis zabiyakoCertificate denis zabiyako
Certificate denis zabiyako
 
Unix administration general
Unix administration generalUnix administration general
Unix administration general
 
Linux administration general
Linux administration generalLinux administration general
Linux administration general
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Decision group company_profile_2017
Decision group company_profile_2017Decision group company_profile_2017
Decision group company_profile_2017
 
4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)
 
Ubuntu pack v1.9
Ubuntu pack v1.9Ubuntu pack v1.9
Ubuntu pack v1.9
 

Dernier

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 

Dernier (20)

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 

LI Solutions

  • 1. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 1 June 2018 Product Management Utimaco TS Lawful Interception Solutions
  • 2. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 2 NetworksServices Utimaco Lawful Interception Solutions IP Multimedia Mobile Fixed Sat 2G 3G 5G WLAN 4G DSL PSTN Cable WLAN FTTx SAT Internet on Air VoLTE RCS Messaging LI VoIP email PTT Umbrella Hosted LI IOT Remote Access
  • 3. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 3 General Architecture (Functional Model) Lawful Interception
  • 4. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 4 System Overview Utimaco LIMS
  • 5. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 5 Lawful Interception in 2G/3G Wireless (Voice) LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Mobile Voice Core3G Radio Access PSTN/other PLMN HI-2 HI-3 X2 IRI HI-1 X1 2G Radio Access
  • 6. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 6 Lawful Interception in 2G/3G Wireless (Voice) LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Mobile Voice Core3G Radio Access PSTN/other PLMN HI-2 HI-3 X2 IRI X3 CC HI-1 X1 2G Radio Access
  • 7. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 7 Lawful Interception in 2G/3G Wireless (Data) LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Mobile Core3G Radio Access Internet HI-2 HI-3 X2 IRI X3 CC HI-1 X1 2G Radio Access PSTN/other PLMN Gb A IuPS IuCS Gn E Gí Yu
  • 8. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 8 Lawful Interception in 2G/3G Wireless (Data) LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Mobile Core3G Radio Access Internet HI-2 HI-3 X2 IRI X3 CC HI-1 2G Radio Access PSTN/other PLMN Gb A IuPS IuCS Gn E Gi Yu X1 Gr LIMS Access Point GTP tap
  • 9. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 9 Lawful Interception in 2G/3G Wireless (Voice&Data) LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Mobile Core3G Radio Access Internet HI-2 HI-3 X2/X3 HI-1 2G Radio Access PSTN/other PLMN Gb A IuPS IuCS Gn E Gi Yu Gr LIMS Access Point X1 tap
  • 10. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 10 Lawful Interception in 4G Wireless (LTE) ETSI TS 133 106-108 3GPP TS 33.106-108 LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Evolved Packet CoreLTE Radio Access Network Internet other networks GERAN/UTRAN HI-2 HI-3 X2 IRI X3 CC HI-1 X1
  • 11. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 11 Lawful Interception in 5G Wireless (SA) ETSI TS 133 126-128 3GPP TS 33.126-128 LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency 5G Core5G Radio Access Network Internet other networks HI-2 HI-3 X2 IRI X3 CC HI-1 X1
  • 12. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 12 Lawful Interception in 5G Wireless (NSA, EPC) LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency 4G Evolved Packet Core5G Radio Access Network Internet other networks HI-2 HI-3 X2 IRI X3 CC HI-1 X1 4G Radio Access Network
  • 13. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 13 Lawful Interception of IMS/VoLTE LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency IMS CoreLTE/5G RAN Internet other networks GERAN/UTRAN HI-2 HI-3 X2 IRI X3 CC HI-1 X1 EPC/5GNGC
  • 14. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 14 Lawful Interception of RCS LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency IMS CoreLTE/5G RAN Internet other networks GERAN/UTRAN HI-2 HI-3 X2 IRI X3 CC HI-1 X1 EPC/5GNGC RCS
  • 15. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 15 Lawful Interception of Cellular IOT (4G) EPCLTE Radio Access Network IOT Platform SCEF AS MTC- IWF UE LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency HI-2 HI-3 X2 (IRI) HI-1 X1 X3 (CC)
  • 16. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 16 Lawful Interception of Cellular IOT (5G) 5G NGC4G/5G Radio Access Network IOT Platform SCEF AS MTC- IWF UE LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency HI-2 HI-3 X2 (IRI) HI-1 X1 X3 (CC)
  • 17. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 17 Lawful Interception of Cloud IOT LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency HI-2 HI-3 X2 (IRI) X3 (CC) HI-1 X1 InternetAccess Network IOT Platform AS UE IOT Gateway AS
  • 18. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 18 Lawful Interception in WLAN LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Core Networkhotspot Internet HI-2 HI-3 X2 IRI X3 CC HI-1 X1 LIMS Access Point AAA WWW SSG/BRAS tap
  • 19. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 19 Lawful Interception of Fixed Voice (PSTN) LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Core NetworkResidential/Enterprise PSTN HI-2 HI-3 X2 IRI HI-1 X1 C5 C4
  • 20. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 20 Lawful Interception in xDSL Networks LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Service Provider Core NetworkDSLAM HI-2 HI-3 X2 IRI X3 CC HI-1 X1 LIMS Access Point AAA Internet tap
  • 21. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 21 Lawful Interception in xDSL Networks LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Service Provider Core NetworkDSLAM HI-2 HI-3 X2 IRI X3 CC HI-1 X1 LIMS Access Point AAA Internet LIMS Access Point IP tap tap
  • 22. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 22 Lawful Interception in Cable Networks LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Service Provider Core NetworkResidential/Enterprise HI-2 HI-3 X2 IRI X3 CC HI-1 X1 LIMS Access Point AAA Internet tap
  • 23. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 23 Lawful Interception of E-Mail LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Service Provider Core NetworkResidential/Enterprise HI-2 HI-3 X2 IRI X3 CC HI-1 X1 LIMS Access Point E-Mail Internet tap
  • 24. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 24 Lawful Interception of VoIP LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency IMS Core Internet other networks GERAN/UTRAN HI-2 HI-3 X2 IRI X3 CC HI-1 X1 Residential/Enterprise
  • 25. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 25 Umbrella LIMS LIMS Management Server LIMS Mediation Devices Utimaco LIMS HI-1 Monitoring Center Law Enforcement Agency 1 Monitoring Center Law Enforcement Agency 2 Monitoring Center Law Enforcement Agency 3 LIMS Gateway ADMF DF2 DF3 DF3 Network 1 Network 2 Network n HI-2 HI-3 X1 X2 X3 X3 (CS)
  • 26. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 26 Remote Access Interface LIMS Management Server LIMS Mediation Devices Utimaco LIMS HI-1 (Utimaco RAI) Monitoring Center Law Enforcement Agency LIMS Gateway ADMF DF2 DF3 DF3 Network 1 Network 2 Network n X1 X2 X3 X3 (CS) HI-2 HI-3
  • 27. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 27 Hosted LI LIMS Management Server LIMS Mediation Devices Utimaco LIMS HI-1 Monitoring Center Law Enforcement Agency 1 LIMS Gateway ADMF DF2 DF3 DF3 Network 1 Network 2 Network n X1 X2 X3 X3 (CS) HI-2 HI-3 Managed Service Provider
  • 28. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 28 Lawful Interception for SAT Internet LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Operator Core NetworkSAT Ground Station HI-2 HI-3 X2 (IRI) X3 (CC) HI-1 Gn E X1
  • 29. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 29 Lawful Interception for inflight Internet LIMS Management Server LIMS Mediation Device Monitoring Center Utimaco LIMS Law Enforcement Agency Operator Core NetworkSAT Ground Station HI-2 HI-3 X2 (IRI) X3 (CC) HI-1 Gn E X1
  • 30. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 30 Utimaco TS GmbH Germanusstraße 4 52080 Aachen, Germany Phone +49 241 1696-0 Web www.utimaco.com E-Mail info@utimaco.com Copyright © 2018 – Utimaco TS GmbH All trademarks are trademarks of the particular copyright holder. Specifications are subject to change without notice. Thank you for your attention!
  • 31. Utimaco TS GmbH · Aachen, Germany · June 2018 Page 31 Access Methods Lawful Interception  Active  Passive Utimaco LIMS X1 (target provisioning) X2/X3 (IRI/CC delivery) Network elements with IIF Utimaco LIMS X1 (target provisioning) X2/X3 (IRI/CC delivery) Network with tap and probe LIMS Access Point X1’

Notes de l'éditeur

  1. Functional Model of Lawful Interception We segment the market in three functional areas: Access Function : IRI and CC is intercepted within the network operator network Mediation Function: Mapping of IRI and CC with intercept requests, conversion of data formats and protocols, delivery of IRI and CC over standardized interfaces to authorized law enforcement agencies Collection Function: Receipt and analysis of IRI and CC for interception target Handover interfaces are standardized by international bodies, like ETSI, 3GPP, ANSI/ATIS. National regulations usually refer to these standards. Internal Network Interfaces (INI or x-interface) are vendor proprietary or depending on the type of network element. There can be large number of different internal network interfaces in one network. IRI: Interception Related Information CC: Content of Communication x1, x2, x3: Internal Network Interfaces for LI administration, IRI and CC exchange HI1, HI2, HI3: Standard handover interface to the Law Enforcement Agency for LI administration, IRI and CC exchange
  2. GSM/UMTS Voice Interception (with direct handoff) 1) Receipt of intercept order via HI1 for target-ID (MSISDN/IMSI/IMEI) 2) LIMS provisions target-ID on all MSCs and optionally voicemail servers in the network using the X1 interface 3) MD receives IRI from MSC over vendor specific X2 interface 4) MD delivers IRI to LEA over HI2 interface 5) MSC and voicemail server deliver CC to LEA over HI3 interface (direct handoff over TDM links, ETSI TS 101 671, TS 133 108) Options: HLR monitoring provides additional IRI messages (e.g. location updates, also for roaming users) Gateway MSC can be provisioned for B-number monitoring (‘Auslandskopfüberwachung’)
  3. GSM/UMTS Voice Interception (splitted architecture with IP-based handover) 1) Receipt of intercept order via HI1 for target-ID (MSISDN/IMSI/IMEI) 2) LIMS provisions target-ID on all MSS and optionally voicemail servers in the network using the X1 interface 3) MD receives IRI from MSS over vendor specific X2 interface 4) MD delivers IRI to LEA over HI2 interface 5) MGW and voicemail server intercept and forwards all targets’ calls to the LIMS MD for mediation and delivery to the LEA over standardized HI-3 (IP-based, ETSI TS 102 232-6, TS 133 108) Options: HLR monitoring provides additional IRI messages (e.g. location updates, also for roaming users) Gateway MSC can be provisioned for B-number monitoring
  4. GSM/UMTS Data Interception 1) Receipt of intercept order via HI1 for target-ID (MSISDN/IMSI/IMEI) 2) LIMS provisions target-ID on each SGSN in the network over the X1 interface 3) MD receives IRI from SGSN over vendor specific X2 interface and forwards the IRI to the LEA over HI2 interface 4) MD receives CC from SGSN over vendor specific X3 interface and forwards the CC to the LEA over HI3 interface Worldwide standard is ETSI TS 133 108 (3GPP TS 33.108) Options: Interception at the GGSN is feasible, too, and allows for surveillance of outbound roamers (when direct tunneling/home routing is enabled in the network) Passive monitoring, see next page
  5. GSM/UMTS Data Interception (passive monitoring) 1) Receipt of intercept order via HI1 for target-ID (MSISDN/IMSI/IMEI) 2) LIMS provisions target-ID on LIMS Access Point(s) GTP (network probe connected by tap) via X1 interface 3) MD receives IRI and CC from the probe(s) and forwards the IRI to the LEA over HI2+HI3 interface Worldwide standard is ETSI TS 133 108 (3GPP TS 33.108) Passive monitoring of the Gn interface (GTP) provides comparable results as active monitoring of SGSN/GGSN. Event messages solely available on the Gb/IuPS interface, however, cannot be intercepted; e.g. GPRS attach/detach. Options: Passive interception of roaming traffic on Gr interface (GTP)
  6. GSM/UMTS Voice&Data Interception (passive monitoring in the access network – RAN ) 1) Receipt of intercept order via HI1 for target-ID (IMSI/IMEI) 2) LIMS provisions target-ID on LIMS Access Point(s) (network probe connected by tap) via X1 interface 3) MD receives IRI and CC from the probe(s) and forwards the IRI to the LEA over HI2+HI3 interface Worldwide standard is ETSI TS 133 108 (3GPP TS 33.108) Passive monitoring of the Gb/IuPS interface (GTP) is feasible when interfaces can be tapped and data is unencrypted. Passive monitoring of the A/IuCS interface (TDM) is feasible when interfaces can be tapped and data is unencrypted. Different bearer types/physical interface can be supported (TDM and IP). MSISDN is not available as target ID on these interfaces, but can be correlated by passive monitoring of MAP at the HLR. Options: Passive interception on Abis interface (BTS<->BSC) may be feasible, too when the interfaces can be tapped and data is unencrypted. 2G voice, SMS: A interface 2G data: Gb interface 3G voice: IuCS interface 3G data: IuPS interface
  7. IAPs for LTE are the MME and the SGW. These nodes intercept all IRI and CC of targets in the home network. optional Interception Access Points: Outbound roamers: HSS: delivers additional IRI: serving EPC (when MS is roaming) Outbound roamers: PGW: delivers same IRI and CC as SGW (so LIMS must decide whether intercept shall be provisioned to SGW or PGW), PGW is the mobility anchor between 3GPP and non-3GPP accesses Non-3GPP clients: ePGW: delivers IRI and CC for non-3GPP clients, target ID = NAI PGW (PDN Gateway): The PDN Gateway provides connectivity from the UE to external packet data networks by being the point of exit and entry of traffic for the UE. A UE may have simultaneous connectivity with more than one PGW for accessing multiple PDNs. The PGW performs policy enforcement, packet filtering for each user, charging support, lawful Interception and packet screening. Another key role of the PGW is to act as the anchor for mobility between 3GPP and non-3GPP technologies such as WiMAX and 3GPP2 (CDMA 1X and EvDO). Home subscriber server The Home Subscriber Server (HSS), or User Profile Server Function (UPSF), is a master user database that supports the IMS network entities that actually handle calls. It contains the subscription-related information (subscriber profiles), performs authentication and authorization of the user, and can provide information about the subscriber's location and IP information. It is similar to the GSM Home Location Register (HLR) and Authentication Centre (AuC).
  8. This shows the setup for the Standalone Architecture (full user and control plane capability for 5G NR, utilizing the new 5G Core) 5G standardization is in progress. 3GPP expects phase 1 release in 2019, with first commercial deployments in 2020. Pre-standard 5G trials starting in 2018. LI requirements will be considered in the 3GPP standards. AMF: event messages (IRI) for network access SMF: event messages (IRI) for user sessions and VoLTE interception in VPLMN UPF: content of communication (CC) Others network functions may provide additional IRI Note: Operators have several options to deploy 5GC together with 4G EPC
  9. This shows the high-level LI setup for a Non-Standalone Architecture(3GPP Rel. 15, option 3) which will is used in early 5G deployments NSA utilizes the existing LTE radio and core network (EPC) as an anchor for mobility management and coverage while adding a new 5G carrier.
  10. When VoLTE is provided by an IMS (IP Multimedia Subsystem) there are the following IAPs: CSCF for the control plane (IRI), depending on the equipment vendor this can be the P-CSCF or S-CSCF. BGF for the user plane (CC) Depending on the network architecture other IAPs must be considered, too. E.g. TAS (MMTel) for monitoring complex call scenarios and supplementary services MGW for calls to/from other TDM networks The Handover Interface (HI) is defined by 3GPP/ETSI; ETSI TS 102 232-5 and/or TS 133 108
  11. The Rich Communications Suite (RCS) is a set of applications and services running on top of an IMS (IP Multimedia Subsystem). RCS shall enable interoperable, enriched communications including enhanced phonebook, enhanced messaging and enriched audio and video calls. It provides features such as sharing of pictures or videos during a call, file transfer, instant text messages between two or more people, automatic discovery of peoples’ location and supported services. Monitoring RCS requires the interception of the following protocols: SIP (Signaling, control plane) RTP (audio and video media, user plane) MSRP (messaging, file exchange) XCAP/HTTP (presence, phone book, buddy lists) HTTP (file sharing) In the solution diagram above SIP/RTP/MSRP are intercepted by the Session Border Controllers (BGF, P-CSCF) towards the access network. In addition XCAP/HTTP can be intercepted at the RCS application server (in case a IIF is available). As on option as LIMS Access Point DPI can be used to intercept the XCAP/HTTP data. All intercepted data are mediated by LIMS and forwarded to the LEA in compliance with ETSI TS 102 232-5.
  12. Cellular IOT services make use of a mobile network (4G, 5G) for access, authentication, authorization, accounting, etc.. The full signaling and media is routed via the mobile core network and can be intercepted at the at the MME and SGW (or PGW) in a 4G EPC. Cellular IOT services may use a separate network (from regular voice and data services) using „network slicing“. The full architecture is being standardized by 3GPP (NB-IOT in Rel. 13+ and 5G IOT in Rel. 15+).
  13. Cellular IOT services make use of a mobile network (4G, 5G) for access, authentication, authorization, accounting, etc.. The full signaling and media is routed via the mobile core network and can be intercepted at the AMF/SMF (IRI) and UPF (CC); respectively at the MME and SGW/PGW in a 4G EPC. Cellular IOT services may use a separate network (from regular voice and data services) using „network slicing“. The full architecture is being standardized by 3GPP (NB-IOT in Rel. 13+ and 5G IOT in Rel. 15+). SCEF : Service Capability Exposure Function MTC-IWF : Machine to Machine Communication Interworking Function AS : Application Server
  14. Cloud-based IOT services are provided “over the top”. This means that devices connect to a (proprietary) IOT Gateway using various type of access networks (zigbee, Bluetooth, z-wave, …). The gateway acts as a bridge between sensors/IOT devices and the service platform in cloud. Many sensors/devices will “talk” to a gateway and the gateway will transmit this information to the IOT servers in the cloud (over HTTPS, MQTT, AMQPS or other OTT transport protocol). LIMS must interface with the IOT platform for lawful interception.
  15. WLAN Data Interception (hybrid monitoring) of a carrier WLAN services (WLAN hotspots) 1) Receipt of intercept order via HI1 for target-ID (e.g. user name, MSISDN/IMSI/IMEI for mobile hotspot services) 2) LIMS provisions target-ID on LIMS Access Point(s) AAA (network probe connected by tap) via X1 interface 3a) MD receives IRI from the probe(s) and forwards the IRI to the LEA over HI2 interface 3b) LIMS analyses all IRI and dynamically provisions CC intercept on the SSG or BRAS (Service Selection Gateway or Broadband Access Server) when a new target authentication has been detected (x1) 4) The SSG/BRAS intercepts the full IP data to and from a target and send the CC to the LIMS MD for mediation and delivery to the LEA via HI-3 Handover interface standard is ETSI TS 102 232-3 Options: Passive interception of CC by IP probe (in case the IIF of the SSG/BRAS is not available)
  16. Data Interception in Broadband xDSL Networks (hybrid access) 1) Receipt of intercept order via HI1 2) LIMS provisions the target-ID (e.g. line-ID, user-ID) on a LIMS Access Point AAA which is connected to the AAA server via a network tap (i.e. receives copies of the RADIUS (and/or DHCP) traffic) 3) MD receives IRI on AAA events incl. the source IP address of the target user and the ID of the appropriate BRAS (router) for CC interception 4a) MD delivers IRI to LEA over HI2 interface 4b) LIMS provisions CC intercept on the BRAS (Access Server) using the target user’s IP address or session-ID 5) MD receives CC of the target over x3 6) MD delivers CC and HI3 interface to LEA Options: - Active access: In case the AAA server supports a IIF, LIMS can provision the target here (instead of probe) - Passive intercept: In case the IP data can not be intercepted by the BRAS (or other router) as passive IP probe can be used (LIMS Access Point IP) - Optional target-Ids (triggers): depending on the capabilities of the network elements used, the triggers for monitoring the IP data may be different; e.g. Circuit-ID, Calling-Station-ID (RADIUS attr. 31), Accounting-Session-ID (RADIUS Attr. 44) - Database look-up: Optionally the LIMS can look up the appropriate target-ID from a user database
  17. Data Interception in Broadband xDSL Networks (passive access) 1) Receipt of intercept order via HI1 2) LIMS provisions the target-ID (e.g. line-ID, user-ID) on a LIMS Access Point AAA which is connected to the AAA server via a network tap (i.e. receives copies of the RADIUS (and/or DHCP) traffic) 3) MD receives IRI on AAA events incl. the source IP address of the target user and the ID of the appropriate BRAS (router) for CC interception 4a) MD delivers IRI to LEA over HI2 interface 4b) LIMS provisions CC intercept on a LIMS Access Point IP (probe) using the target user’s IP address. The probe intercepts all IP data to/from the target. 5) MD receives CC of the target over x3 6) MD delivers CC and HI3 interface to LEA - Optional target-Ids (triggers): depending on the capabilities of the network elements used, the triggers for monitoring the IP data may be different; e.g. Circuit-ID, Calling-Station-ID (RADIUS attr. 31), Accounting-Session-ID (RADIUS Attr. 44) - Database look-up: Optionally the LIMS can look up the appropriate target-ID from a user database
  18. Data Interception in Broadband Cable Networks (hybrid access) 1) Receipt of intercept order via HI1 2) LIMS provisions the target-ID (e.g. MAC address, user-ID) on a LIMS Access Point AAA which is connected to the AAA server via a network tap (i.e. receives copies of the DHCP traffic) 3) MD receives IRI on AAA events incl. the source IP address of the target user and the ID of the appropriate BRAS (router) for CC interception 4a) MD delivers IRI to LEA over HI2 interface 4b) LIMS provisions CC intercept on the BRAS (Access Server) using the target user’s IP address or MAC address 5) MD receives CC of the target over x3 6) MD delivers CC and HI3 interface to LEA Options: - In some networks the target-ID (modem MAC address) can be queried from a database. In this case the target-ID can be provisioned to the CMTS directly (no dynamic provisioning)
  19. E-Mail Interception (passive access) A LIMS Access Point E-Mail (i.e. a probe or e-mail filter) is introduced into the service provider’s network to intercept the e-mail traffic of persons under surveillance. For this purpose the entire e-mail traffic is mirrored by a tap or switch span port and sent to the LIMS Access Point E-Mail. The probe intercepts e-mail to/from a target to the mediation device which forwards the data to the LEA using the standardized HI2 and HI3 interfaces. HI standard is ETSI TS 102 232-2 Options: - Active interception can be implemented in case the e-mail server integrates basic interception capabilities.
  20. VoIP Interception (active) 1) LIMS provisions the target-ID (Tel-URL or SIP-URI) on the central softswitch using the X1 interface 2a) The IFF of the softswitch mirrors all signaling data to/from a target to the LIMS MD over the X2 interface 2b) The softswitch dynamically provisions the IIF of the appropriate gateway (BGF, MGF) to intercept the call media (CC). This depends on the routing of a call. Intercepted CC is mirrored to the LIMS MD by the CC-IIF. 3) MD delivers the IRI to the LEA over HI2 interface 4) MD delivers the CC to the LEA over HI3 interface Common HI standards: ETSI TS 102 232-5, ATIS T1.678 Options: SBC only intercept: LIMS provisions targets on all SBC (access SBC) to intercept both signaling and media Passive intercept: LIMS provisions one or more LIMS Access Point VoIP which are connected to the VoIP core network via taps.
  21. Utimaco RAI provides an API for remote administration and/or operation of LIMS by the LEA Warrant management (ICD) Target management NE management LEA/MC management User management Logs & alarms
  22. Utimaco LIMS can be operated as a multi-tenant system enabling hosted LI services (LI as a service) Full network separation User separation LEA separation (if needed) LIMS DF servers (MD) can be deployed centrally or at every operator (depending on security requirements and bandwidth).
  23. Internet via SAT - Voice & Data Interception 1) Receipt of intercept order via HI1 for target-ID (MSISDN/IMSI/IMEI, Login, user name) 2) LIMS provisions target-ID on the MSC and SGSN nodes in the service provider’s core network 3) LIMS MD receives IRI and CC over vendor specific X2/X3 interface 4) LIMs MD evaluates location information and delivers mediated IRI/CC to national LEA when the user location is within the country’s jurisdiction HI-2/HI-3 are commonly based on ETSI LI standards. National specifics can be accommodated (depending on the target’s location).
  24. Inflight Voice & Data Interception 1) Receipt of intercept order via HI1 for target-ID (MSISDN/IMSI/IMEI, Login, user name) 2) LIMS provisions target-ID on the MSC and SGSN nodes in the service provider’s core network 3) LIMS MD receives IRI and CC over vendor specific X2/X3 interface 4) LIMs MD evaluates location information and delivers mediated IRI/CC to national LEA when the plane location is within the country’s jurisdiction HI-2/HI-3 are commonly based on ETSI LI standards. National specifics can be accommodated (depending on the plane’s location).
  25. Active: LIMS (ADMF) provisions LI targets on network nodes with IIF (Internal Interception Function) over x1 IIF sometimes distributes targets internally to all serving nodes (x1’) IIFs mirror IRI and CC and forward to LIMS (DF) over x2 and x3 interfaces Passive: LIMS (ADMF) provisions LI targets on network probes (LIMS Access Point) over x1 LI Probe monitors a tapped copy of the entire traffic for relevant target data and mirror IRI and CC and forward to LIMS (DF) over x2 and x3 interfaces