Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 24.629
Word version: 18.0.0
1…
4…
4
Explicit Communication Transfer (ECT)
4.1
Introduction
4.2
Description
4.3
Operational requirements
4.4
Coding requirements
4.5
Signalling requirements
4.6
Interaction with other services
4.7
Interworking with other networks
4.8
Parameter values (timers)
4.9
Service configuration
A
Signalling flows
B
Example of filter criteria
C
Example charging model
$
Change History
4
Explicit Communication Transfer (ECT)
p. 8
4.1
Introduction
p. 8
4.2
Description
p. 8
4.2.1
General description
p. 8
4.3
Operational requirements
p. 8
4.3.1
Provision/withdrawal
p. 8
4.3.2
Requirements on the transferor network side
p. 8
4.3.3
Requirements on the transferee network side
p. 8
4.3.4
Requirements on the transfer target network side
p. 9
4.4
Coding requirements
p. 9
4.5
Signalling requirements
p. 9
4.5.1
Activation/deactivation
p. 9
4.5.1A
Registration/erasure
p. 9
4.5.1B
Interrogation
p. 9
4.5.2
Invocation and operation
p. 9
4.5.2.1
Actions at the transferor UE
p. 9
4.5.2.2
Void
4.5.2.3
Void
4.5.2.4
Actions at the transferor AS
p. 11
4.5.2.4.1
Invocation of ECT service
p. 11
4.5.2.4.1.1
Prerequisite for invocation of the ECT service
p. 11
4.5.2.4.1.2
Determine whether the ECT applies
p. 11
4.5.2.4.1.2.1
REFER request received on a separate dialog
p. 11
4.5.2.4.1.2.2
REFER request received in the to be transferred dialog
p. 11
4.5.2.4.1.2.2A
Procedures for call transfer with 3PCC
p. 12
4.5.2.4.1.2.3
Actions of ECT when invoked with a transfer request
p. 12
4.5.2.4.2
Subsequent procedures
p. 13
4.5.2.4.2.1
Actions of ECT when invoked again by the transferred communication
p. 13
4.5.2.5
Actions at the transferee UE
p. 14
4.5.2.5.1
Actions at the transferee UE (without 3PCC)
p. 14
4.5.2.5.2
Actions at the transferee UE (with 3PCC)
p. 14
4.5.2.6
Void
4.5.2.7
Actions at the transferee AS
p. 14
4.5.2.7.0
Prerequisite for invocation of the ECT service
p. 14
4.5.2.7.1
Determine whether ECT applies
p. 14
4.5.2.7.2
Actions of the ECT AS when invoked with a transfer request
p. 14
4.5.2.7.3
Actions of the ECT AS when invoked again by the transferred communication
p. 15
4.5.2.8
Void
4.5.2.9
Void
4.5.2.10
Void
4.5.2.11
Void
4.5.2.12
Void
4.5.2.13
Void
4.5.2.14
Void
4.5.2.15
Actions at the transfer target's AS
p. 15
4.5.2.16
Void
4.5.2.17
Actions at the transfer target's UE
p. 15
4.6
Interaction with other services
p. 16
4.6.1
Communication HOLD (HOLD)
p. 16
4.6.2
Terminating Identification Presentation (TIP)
p. 16
4.6.3
Terminating Identification Restriction (TIR)
p. 16
4.6.4
Originating Identification Presentation (OIP)
p. 16
4.6.5
Originating Identification Restriction (OIR)
p. 16
4.6.6
CONFerence Calling (CONF)
p. 16
4.6.7
Communication DIVersion Services (CDIV)
p. 16
4.6.8
Malicious Communication IDentification (MCID)
p. 16
4.6.9
Anonymous Communication Rejection and Communication Barring (ACR/CB)
p. 17
4.6.10
Explicit Communication Transfer (ECT)
p. 17
4.6.10.1
Determine whether a previously transferred communication is transferred again
p. 17
4.6.10.2
Handling of transfer requests
p. 17
4.6.10.3
Actions when this ECT instance is invoked again by the transferred communication
p. 17
4.6.11
Enhanced Calling Name (eCNAM)
|R13|
p. 17
4.6.12
Multi-Device (MuD)
|R13|
p. 18
4.6.13
Multi-Identity (MiD)
|R13|
p. 18
4.7
Interworking with other networks
p. 18
4.7.1
Void
4.7.2
Void
4.7.3
Void
4.8
Parameter values (timers)
p. 18
4.9
Service configuration
p. 18
A
Signalling flows
p. 19
A.1
Blind transfer
p. 19
A.2
Consultative transfer
p. 22
A.3
Blind call transfer with third party call control
p. 23
A.4
Consultative call transfer with third party call control
p. 24
B
Example of filter criteria
p. 25
B.1
Example of filter criteria for ECT
p. 25
C
Example charging model
p. 26
C.1
Example of B REFER's A to C
p. 26
C.2
Example of A REFER's B to C
p. 27
D
Void
$
Change History
p. 29