tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top        in Index        Prev        Next

TS 24.616 (CT1)
Malicious Communication Identification (MCID) using IMS – Protocol specification

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    26 p.
(P) V13.0.0    2015/12    26 p.
(P) V12.1.0    2014/06    26 p.
(P) V11.1.0    2012/12    26 p.
(P) V10.0.0    2011/03    26 p.
(P) V9.2.0    2010/09    26 p.
(P) V8.7.0    2010/09    26 p.


Rapporteur:  Mr. Kreipl, Michael
Antecedent:  TS 24.516    
See also:  MCID-related TS/TR    


This TS specifies the stage three Protocol Description of the Malicious Call Communication Identification (MCID) service based on the stage one and two of ISDN Malicious Call Identification supplementary service. It provides the protocol details in the IP Multimedia (IM) Core Network (CN) subsystem based on the Session Initiation Protocol (SIP) and the Session Description Protocol (SDP). The MCID service will store session related information independent of the service requested.

This TS is applicable to User Equipment (UE) and Application Servers (AS) which are intended to support the MCID supplementary service.


 

Here        Top

 

 

1   Scope [R8]   PDF-p. 6
2   References [R8]
3   Definitions and abbreviations [R8]   PDF-p. 7
4   Malicious Communication Identification (MCID) [R8]
4.1   Introduction
4.2   Description   PDF-p. 8
4.3   Operational requirements
4.4   Coding requirements   PDF-p. 9
4.5   Signalling requirements
4.6   Interaction with other services
4.7   Interactions with other networks   PDF-p. 14      Up
4.8   Parameter values (timers)
A   Signalling Flows [R8]   PDF-p. 15
B   Example of filter criteria [R8]   PDF-p. 21
C   Void
D   Void
E   Change history   PDF-p. 24

Up        Top