Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.937
Word version: 18.0.0
1…
4…
7…
7
Supporting Mechanisms and Solution Alternatives
8
Evaluation of Solution Alternatives
9
Potential PUCI Architecture
10
Summary
A
Usability and Business Aspects
B
Analysis of UC protection mechanisms for non-IMS interconnection
$
Change History
7
Supporting Mechanisms and Solution Alternatives
p. 36
7.1
Review of Measures and Potential Supporting Mechanisms
p. 36
7.1.1
Measure for Protection Against Privacy Violation
p. 36
7.1.1.1
Measures Against Bulk UC
p. 36
7.1.1.2
Measures Against Targeted UC
p. 39
7.1.2
Measures for Protection Against Contentious Incoming Call Service Charge
p. 39
7.1.3
Measures for Protection Against Contentious Roaming Cost
p. 39
7.1.4
Measures for Protection Against Non-disclosure of Call Back Cost
p. 39
7.1.5
Measures for Protection Against Phishing
p. 40
7.1.6
Measures for Protection Against Network Equipment Hijacking
p. 40
7.1.7
Measures for Protection Against User Equipment Hijacking
p. 40
7.1.8
Measures for Protection Against Mobile Phone Virus
p. 41
7.1.9
Measures for Protection Against Sender Impersonation UC
p. 42
7.1.10
Measures for Protection Against Unavailability of Service or Degraded Service Quality
p. 42
7.2
IMR-Based Solution Approach
p. 42
7.2.1
General
p. 42
7.2.2
IMR Approach
p. 43
7.2.3
From Requirements to Solution
p. 44
7.2.4
IMR Solution Variations
p. 46
7.2.4.1
General
p. 46
7.2.4.2
IMR Solution Based on Supplementary Services
p. 47
7.2.5
Detailed Solution
p. 48
7.2.5.1
Overview
p. 48
7.2.5.2
Simple PUCI Invocation
p. 48
7.2.5.3
PUCI with Supplementary Services and 3rd Party PUCI AS
p. 50
7.2.5.4
Standardization
p. 52
7.3
SPIT/UC Protection with Supplementary Services
p. 52
7.3.1
Introduction
p. 52
7.3.2
Supplementary Services usable for SPIT/UC Prevention
p. 53
7.3.3
SPIT/UC Prevention Scenarios with Supplementary Services
p. 54
7.3.3.1
Simple Black List combined with Anonymous Call Rejection
p. 54
7.3.3.2
White List with Consent Mailbox
p. 55
7.3.3.3
White List with Consent Mailbox, protected by a Black List
p. 55
7.3.3.4
Sophisticated SPIT/UC Prevention Profile with Audio CAPTCHA
p. 56
7.3.3.5
White List Consent Achievement by IN Server
p. 57
7.3.3.6
SPIT/UC Feedback by User Based on Key Pad Entries in the Phone
p. 59
7.4
Contextual Information
p. 59
7.4.1
Introduction
p. 59
7.4.2
IMS Mechanism Outline
p. 60
7.4.3
Use of Contextual Information
p. 60
7.4.3.1
General
p. 60
7.4.3.2
Reaction
p. 61
7.4.3.3
Marking
p. 61
7.4.3.4
Sharing of Information
p. 61
7.4.3.5
Impact on Supplementary Services
p. 62
7.5
UC protection framework for non-IMS interconnection: the Open Proxy Handshake
p. 62
7.5.1
Objectives
p. 62
7.5.2
Assumptions
p. 62
7.5.3
Basic principles
p. 64
7.5.4
Detailed principles
p. 65
7.5.4.1
No shared secret between domain A and domain B
p. 66
7.5.4.2
A shared secret is established between domain A and domain B
p. 67
7.6
Alternative Methods for Authentication of Originating Network
p. 68
7.6.1
Introduction
p. 68
7.6.2
P-Asserted-Identity
p. 69
7.6.3
SIP Identity
p. 69
7.6.4
Trusted Interconnect with IPSec
p. 70
7.6.5
Trusted Interconnect with IPSec combined with P-Asserted-Identity
p. 70
7.6.6
Summary
p. 71
8
Evaluation of Solution Alternatives
p. 72
8.1
Evaluation Criteria
p. 72
8.2
Evaluation of Alternatives
p. 75
8.3
Usage Space
p. 82
9
Potential PUCI Architecture
p. 84
9.1
High-level architecture, mapping PUCI functionality to the IMS architecture
p. 84
9.2
Centralized/Distributed PUCI AS
p. 84
9.3
UC identification / UC prevention
p. 85
9.4
Originating/Terminating UC identification and prevention
p. 85
9.5
Real-time / non-real-time UC identification and prevention
p. 86
9.6
Standardized versus Vendor specific aspects
p. 86
9.7
Interaction with non-IMS networks
p. 87
10
Summary
p. 88
A
Usability and Business Aspects
p. 89
A.1
Usability Consideration
p. 89
A.1.1
User Prompting
p. 89
A.1.2
User vs UE
p. 89
B
Analysis of UC protection mechanisms for non-IMS interconnection
p. 90
B.1
Solutions based on sender identity
p. 90
B.2
Call analysis and UC identification
p. 90
B.3
Network solutions
p. 91
B.4
Applicative solutions
p. 91
$
Change History
p. 93