摘要 |
The current IMS security architecture only protects data transmitted in the IMS control plane. Embodiments are described which provide end-to-end encryption of data transmitted in the IMS media plane but which also allow lawful interception and interpretation of such end-to-end communications under the control of the relevant IMS core (3A, 3B). |