3 Definitions, symbols and abbreviations

33.1273GPPLawful Interception (LI) architecture and functionsRelease 18TS

3.1 Definitions

For the purposes of the present document, the terms and definitions given in 3GPP TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in 3GPP TR 21.905 [1].

Content of Communication (CC): The content of communication as forwarded from the Mediation and Delivery Function 3 (over the LI_HI3 interface) to the Law Enforcement Monitoring Facility.

Control Plane (CP) Entity: The network elements or network functions responsible for handling the Control Plane Functions. These include the SGW and PGW in EPS without CUPS, the SGW-C and PGW-C in EPS with CUPS and the SMF in 5GS.

CUPS: As defined in 3GPP TS 23.214 [12], represents PLMN with architecture enhancements for control and user plane separation of EPC nodes.

Intercept Related Information (IRI): The intercept related information as forwarded from the Mediation and Delivery Function 2 (over the LI_HI2 interface) to the Law Enforcement Monitoring Facility.

IRI event: The network procedure or event that created an xIRI in the Point Of Interception.

LI component: The function and equipment involved in handling the Lawful Interception functionality in the CSP’s network.

Lawful Interception Identifier (LIID): Unique identifier that associates a warrant to Lawful Interception Product delivered by the CSP to the LEA.

LI system: The collection of all LI components involved in handling the Lawful Interception functionality in the CSP’s network.

Non-3GPP Access Entity (N3A Entity): The network functions responsible for interworking between 3GPP Core Network Functions and Non-3GPP access networks. These include TWIF, TNGF, N3IWF and W-AGF.

Non-local ID: An identity assigned and managed at a different CSP than the CSP performing LI.

Provisioning: The action taken by the CSP to provide its Lawful Interception functions information that identifies the target and the specific communication services of interest to the LEA, sourced from the LEA provided warrant.

Triggering: The action taken by a dedicated function (Triggering Function) to provide another dedicated function (Triggered POI), that Provisioning could not directly be applied to, with information that identifies the specific target communication to be intercepted.

User Plane (UP) Entity: The network elements or network functions responsible for handling the User Plane Functions. These include the SGW and PGW in EPS without CUPS, the SGW-U and PGW-U in EPS with CUPS and the UPF in 5GS.

Warrant: The formal mechanism to require Lawful Interception from a LEA served to the CSP on a single target identifier. Depending on jurisdiction also known as: intercept request, intercept order, lawful order, court order, lawful order or judicial order (in association with supporting legislation).

xCC: The content of communication as forwarded from the Point Of Interception (over the LI_X3) interface to the Mediation and Delivery Function 3.

xIRI: The intercept related information as forwarded from the Point Of Interception (over the LI_X2) interface to the Mediation and Delivery Function 2.

3.2 Symbols

3.3 Abbreviations

For the purposes of the present document, the abbreviations given in 3GPP TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in 3GPP TR 21.905 [1].

5GC 5G Core Network

5GMS 5G Media Streaming

5GS 5G System

AAnF AKMA Anchor Function

AC Application Client

ACR Application Context Relocation

ADMF LI Administration Function

AF Application Function

AF_ID Application Function Identity

AKA Authentication and Key Agreement

A-KID AKMA Key IDentifier

AKMA Authentication and Key Management for Applications

AMF Access and Mobility Management Function

AS Application Server

AUSF Authentication Server Function

BBIFF Bearer Binding Intercept and Forward Function

BSS Business Support System

CAG Closed Access Group

CC Content of Communication

CP Control Plane

CPIM Common Presence and Instant Messaging

CPS Call Placement Service

CSI Cell Supplemental Information

CSP Communication Service Provider

CUPS Control and User Plane Separation

DN Data Network

DNAI Data Network Access Identifier

DoNAS Data over NAS

EAP Extensible Authentication Protocol

EAS Edge Application Server

eCNAM Enhanced Calling Name

ECSP Edge Computing Service Provider

E-CSCF Emergency – Call Session Control Function

EDN Edge Data Network

EEC Edge Enabler Client

EECID Edge Enabler Client IDentifier

EES Edge Enabler Server

GPSI Generic Public Subscription Identifier

HMEE Hardware Mediated Execution Enclave

HR Home Routed

IBCF Interconnection Border Control Functions

ICF Identity Caching Function

IEF Identity Event Function

IMS-AGW IMS Access Gateway

IM-MGW IM Media Gateway

IP Interception Product

IQF Identity Query Function

IRI Intercept Related Information

KAF AKMA Application Key

KAKMA AKMA Anchor Key

KID Key IDentifier

KLI Decryption key(s) for services encrypted by CSP-provided keys

KSF Key Server Function

LAF Location Acquisition Function

LALS Lawful Access Location Services

LARF Location Acquisition Requesting Function

LBO Local Break Out

LEA Law Enforcement Agency

LEMF Law Enforcement Monitoring Facility

LI Lawful Interception

LI CA Lawful Interception Certificate Authority

LICF Lawful Interception Control Function

LI_HI1 Lawful Interception Handover Interface 1

LI_HI2 Lawful Interception Handover Interface 2

LI_HI3 Lawful Interception Handover Interface 3

LI_HI4 Lawful Interception Handover Interface 4

LI_HILA Lawful Interception Handover Interface Location Acquisition

LI_HIQR Lawful Interception Handover Interface Query Response

LIID Lawful Interception Identifier

LIPF Lawful Interception Provisioning Function

LIR Location Immediate Request

LI_SI Lawful Interception System Information Interface

LISSF Lawful Interception State Storage Function

LI_ST Lawful Interception State Transfer Interface

LI_T1 Lawful Interception Internal Triggering Interface 1

LI_T2 Lawful Interception Internal Triggering Interface 2

LI_T3 Lawful Interception Internal Triggering Interface 3

LI_X0 Lawful Interception Internal Interface 0

LI_X1 Lawful Interception Internal Interface 1

LI_X2 Lawful Interception Internal Interface 2

LI_X2_LA Lawful Interception Internal Interface 2 Location Acquisition

LI_X3 Lawful Interception Internal Interface 3

LI_X3A Lawful Interception Internal Interface 3 Aggregator

LI_XEM1 Lawful Interception Internal Interface Event Management Interface 1

LI_XER Lawful Interception Internal Interface Event Record

LI_XLA Lawful Interception Internal Interface Location Acquisition

LI_XQR Lawful Interception Internal Interface Query Response

LMF Location Management Function

LMISF LI Mirror IMS State Function

LMISF-CC LMISF for the handling of CC

LMISF-IRI LMISF for the handling of IRI

LTF Location Triggering Function

MA Multi-Access

MANO Management and Orchestration

MDF Mediation and Delivery Function

MDF2 Mediation and Delivery Function 2

MDF3 Mediation and Delivery Function 3

MRFP Multimedia Resource Function Processor

MSRP Message Session Relay Protocol

N3A Non-3GPP Access

N3IWF Non 3GPP Inter Working Function

N9HR N9 Home Routed

NAS Non-Access Stratum

NCGI NR Cell Global Identity

NEF Network Exposure Function

NFV Network Function Virtualisation

NFVI Network Function Virtualisation Infrastructure

NFVO Network Function Virtualisation Orchestrator

NIDD Non-IP Data Delivery

NPLI Network Provided Location Information

NR New Radio

NRF Network Repository Function

NSSF Network Slice Selection Function

OSS Operations Support System

PAG POI Aggregator

PCF Policy Control Function

P-CSCF Proxy – Call Session Control Function

PEI Permanent Equipment Identifier

PGW PDN Gateway

PGW-C PDN Gateway Control Plane

PGW-U PDN Gateway User Plane

POI Point Of Interception

PLMN Public Land Mobile Network

PTC Push to Talk over Cellular

RCD Rich Call Data

RCS Rich Communication Suite

S8HR S8 Home Routed

SCEF Service Capability Exposure Function

SCS Service Capability Server

SGW Serving Gateway

SGW-C Serving Gateway Control Plane

SGW-U Serving Gateway User Plane

SHAKEN Signature-based Handling of Asserted information using toKENs

SIRF System Information Retrieval Function

S-CSCF Serving – Call Session Control Function

SIP Session Initiation Protocol

SMF Session Management Function

SMSF SMS-Function

STF Security Terminating Function

STIR Secure Telephony Identity Revisited

SUCI Subscriber Concealed Identifier

SUPI Subscriber Permanent Identifier

TAI Tracking Area Identity

TF Triggering Function

TLS Transport Layer Security

TNGF Trusted Non-3GPP Gateway Function

TrGW Transit Gateway

TWIF Trusted WLAN Interworking Function

UDM Unified Data Management

UDR Unified Data Repository

UDSF Unstructured Data Storage Function

UPF User Plane Function

VNF Virtual Network Function

VNFC Virtual Network Function Component

W-AFG Wireline Access Gateway Function

xCC LI_X3 Content of Communication

xIRI LI_X2 Intercept Related Information