Caller Identity Analytics function:
A verification function that analyzes a large set of traffic data to identify fraud and caller identity spoofing trends and make risk recommendations about the originating telephone number based on trend analysis.
Block list:
List of identities or identity ranges that, for one reason or another, are being denied a particular service.
Spoofed call:
A call where caller identity creation, modification or removal in call signalling results in an unauthorized or illegal use of this identity in the call., This typically occurs where the caller intends to defraud the called user or otherwise illegally obscure the real caller identity.
Allow list:
List of identities or identity ranges that are provided particular services. Allow list is also named VIP list.
(void).
For the purposes of the present document, the abbreviations given in
TR 21.905 and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in
TR 21.905.
3PTY
Three Party
ACR
Anonymous Communication Rejection
AOC-C
Advice Of Charge - Charging
AOC-D
Advice Of Charge - During the communication
AOC-E
Advice Of Charge - at the End of the communication
AOC-I
Advice Of Charge - Information
AOC-S
Advice Of Charge - charging information at communication Set-up time
CAT
Customized Alerting Tone
CB
Communication session Barring
CCBS
Completion of Communication sessions to Busy Subscriber
CD
Communication Deflection
CDIV
Communication DIVersion
CFB
Communication Forwarding Busy
CFNL
Communication Forwarding on Not Logged-in
CFNR
Communication Forwarding No Reply
CFNRc
Communication Forwarding on Subscriber Not Reachable
CFU
Communication Forwarding Unconditional
COLP
COnnected Line identification Presentation
COLR
COnnected Line identification Restriction
CONF
CONFerence
CRS
Customized Ringing Signal
CS
Circuit Switched
CUG
Closed User Group
CW
Communication Waiting
eCNAM
Enhanced Calling Name
ECT
Explicit Communication Transfer
FA
Flexible Alerting
HOLD
Communication HOLD
ICB
Incoming Communications Barring
MCID
Malicious Communication IDentification
MWI
Message Waiting Indication
OCB
Outgoing Communications Barring
OIP
Originating Identification Presentation
OIR
Originating Identification Restriction
PSAP
Public Safety Answer Point
PUI
Public User Identity
SHAKEN
Signature-based Handling of Asserted information using toKENs
STIR
Secure Telephone Identity Revisited
TIP
Terminating Identification Presentation
TIR
Terminating Identification Restriction