The present invention generally relates to systems, software and methods and, more particularly, to mechanisms and techniques to monitor retained data related to a web browsing session in a communication network.
In many countries the operators and Internet service providers are today obliged by legal requirements to provide stored traffic data generated from public telecommunication and Internet services for the purpose of detection, investigation and prosecution of crime and criminal offences including terrorism. There are also a number of initiatives within the European Union EU to regulate the legal basis for data retention. The EU Parliament has recently adopted a set of amendments and by that approved the Council's proposed directive on data retention [See Directive 2006/24/EC of the European Parliament and of the Council of 15 Mar. 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC]. This proposal describes not only initial requirements, but also how an extension of the directive will be handled. Consequently, an essential part of operator's effort to comply with current legislation will be to secure that processes and tools are adaptable to handle an expansion of the scope for data retention.
The ETSI document TS 102 656 V1.2.1 (2008-12) (Retained Data; Requirements of Law Enforcement Agencies for handling Retained Data) gives guidance for the delivery and associated issues of retained data of telecommunications and subscribers. It provides a set of requirements relating to handover interfaces for the retained traffic data and subscriber data by law enforcement and other authorized requesting authorities. The requirements are to support the implementation of Directive 2006/24/EC of the European Parliament and of the Council of 15 Mar. 2006 on the retention of data.
The ETSI document ETSI TS 102 657 V1.4.1 (2009-12) (Lawful Interception (LI); Retained data handling; Handover interface for the request and delivery of retained data) contains handover requirements and a handover specification for the data that is identified in EU Directive 2006/24/EC on retained data.
The Ericsson Automatic Data Retention System ADRS provides a solution for collecting, storing and delivering of communication data generated by telecommunication and Internet services in public fixed and mobile networks.
ETSI don't require the retention of Web Browsing data. In particular ETSI TS 102 657 V1.4.1 (Lawful Interception (LI); Retained data handling; Handover interface for the request and delivery of retained data) covers in Annex E Network Access Services, that are services offering a capability to access public networks (typically the internet) including GPRS/UMTS-PS. Nothing is reported about web browsing. On the other side an increasing number of Law Enforcement Agencies (e.g. in Ireland, in Spain, in Lithuania, in Denmark, in Belgium . . . ) are asking telecom firms to hand over all information about which web pages people browse on their mobiles. To handle internet web browsing traffic from several networks that can be geographically or business wise separated, would require several proxy nodes integration in Data Retention Solution, entailing high operator costs.
An aim of the invention is to overcome above identified limitations of the prior art. The invention focuses on that a Multiservice Proxy is acting as data retention source.
According to one aspect of the present invention, a method is provided to monitor retained data related to a web browsing session in a communication network. A Multiservice Proxy is hereby acting as data retention source. The method further comprises the following steps:
According to a further aspect of the invention an arrangement is adapted to monitor retained data related to a web browsing session.
According to yet a further aspect of the present invention, a node is configured to receive a query request specifying retained data to be accessed, which data is related to internet web browsing service received from a Multiservice Proxy (or any network node implementing such function). The node is further configured to forward the accessed data.
According to yet a further aspect of the present invention, a node is configured to send a query request specifying retained data in a Data Retention System related to internet web browsing service received from a Multiservice Proxy, and to receive the accessed data.
According to further one aspect of the invention, Handover Interfaces between a data Retention System and a Requesting Authority have been enhanced for transportation of query requests and for transportation of data related to internet web browsing service.
Some advantages of the invention are as follows:
The invention will now be described more in detail with the aid of preferred embodiments in connection with the enclosed drawings.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate one or more embodiments and, together with the description, explain these embodiments. In the drawings:
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular circuits, circuit components, techniques, etc. in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well known methods, devices, and circuits are omitted so as not to obscure the description of the present invention with unnecessary detail.
Using Virtual Gateway features, one Multiservice Proxy node can handle Internet traffic from several networks in operator domain 16—networks that may be separated geographically or in a business wise. An Operator with affiliates only needs to buy one Multiservice Proxy and place it in a central location, which reduces operational costs. The Operator can provide proxy services to their affiliate operators and sell proxy services to small operators that do not need the full capacity of a Multiservice Proxy node.
Multiservice Proxy browsing support provides the means for end-users to retrieve information from origin servers. A typical example is browsing the World Wide Web, where the end-user enters a URL into their device. The request is sent to the Multiservice Proxy and is processed by the Multiservice Proxy browsing proxy, before being sent to the origin server. The origin server answers by sending the content (a web page) to Multiservice Proxy, which then forwards it to the end user device.
Multiservice Proxy charging support allows the Operator to bill subscribers and push initiators and collect information on users based on the traffic events they generate in the Multiservice Proxy node, detailed event data records can be generated which can be post-processed in an external post processing system.
Multiservice Proxy obtains the MSISDN and additional information from the mobile network using a RADIUS Accounting protocol (RFC 2866). This protocol enables Multiservice Proxy to store the IP address allocated to the device together with the MSISDN and other related user and network attributes in a RADIUS cache 11. The information is stored prior to the receipt of a first request in a session. For each incoming request, the MSISDN and/or other parameters can be looked up in the RADIUS cache using the IP address or MSISDN as a key. The detailed data records for browsing traffic are called pull attempt records. To fill the pull attempt records with information, Multiservice Proxy uses information in the request, information stored in the RADIUS cache, and information stored in the subscriber database. Examples of information in pull attempt records to be retained are as follows, whereby examples of data to be monitored according to the invention are printed in extra bold:
A method according to a first embodiment of the invention will now be explained together with
The reciprocal signaling between the above different Data Retention entities is to be seen just as example. For example can the Storage be an integrated part of the MF/DF. In this example the query requests are sent from the RA but may also be communicated by an intermediary, such as a human operator who receives the command from an authorized source, and then inputs the requests to the DRS.
In another aspect, the Multiservice Proxy allows affiliate Operators, which use a Multiservice Proxy virtual gateway as the proxy for browsing traffic, to transfer CDR information to Data Retention System. The Multiservice Proxy can be configured to store CDR data specific for each virtual gateway in separate files and folders. The SFTP transfer of these files is defined using file transfer scripts. By configuring virtual gateways and CDR for each affiliate operator, the post processing effort in the Data Retention System is minimized. An Operator can provide Data Retention services to their affiliate operators and sell web browsing DR services to small Mobile Virtual Network Operators (MVNOs) that do not need the full capacity of a Data Retention System. One physical Data Retention System node can be divided into up to several (e.g. 20) Virtual Nodes each of them hosting Data Retention functionality for a small operator. The Virtual Gateway name reported in CDRs indicates which Virtual Gateway is used. This parameter is only applicable if the virtual gateway functionality is used in the Multiservice Proxy.
A system that can be used to put the invention into practice is schematically shown in
The systems and methods of the present invention may be implemented for example on any of the Third Generation Partnership Project (3GPP), European Telecommunications Standards Institute (ETSI), American National Standards Institute (ANSI) or other standard telecommunication network architecture. Other examples are the Institute of Electrical and Electronics Engineers (IEEE) or The Internet Engineering Task Force (IETF).
The description, for purposes of explanation and not limitation, sets forth specific details, such as particular components, electronic circuitry, techniques, etc., in order to provide an understanding of the present invention. But it will be apparent to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known methods, devices, and techniques, etc., are omitted so as not to obscure the description with unnecessary detail. Individual function blocks are shown in one or more figures. Those skilled in the art will appreciate that functions may be implemented using discrete components or multi-function hardware. Processing functions may be implemented using a programmed microprocessor or general-purpose computer. The invention is not limited to the above described and in the drawings shown embodiments but can be modified within the scope of the enclosed claims.
The invention is of course not limited to the above described and in the drawings shown embodiments but can be modified within the scope of the enclosed claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/SE2010/050654 | 6/11/2010 | WO | 00 | 12/14/2012 |