D.2 LI for Registration and Deregistration

33.1273GPPLawful Interception (LI) architecture and functionsRelease 18TS

D.2.1 Background

RCS Registration is usually handled by the IMS automatically when a user that is authorised RCS Services registers to the IMS with a UE that supports RCS Services.

D.2.2 Architecture

The figure 7.13.2-1 without the CC-POI in the RCS Server provides the architecture for LI for capability discovery.

In a normal deployment, the S-CSCF, a Presence Server or Messaging Server may perform the function of the RCS Server in figure 7.13.2-1.