Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TR 33.937 (SA3)
Study of mechanisms for
Protection against Unsolicited Communication for IMS (PUCI)

ToC   3GPP‑Page   ETSI‑search   Help    
V14.0.0 (PDF)  2017/03  98 p.
V13.0.0  2016/01  97 p.
V12.0.0  2014/09  97 p.
V11.0.0  2012/09  97 p.
V10.0.0  2011/04  97 p.
V9.2.0  2010/06  97 p.


Rapporteur:  Dr. Prasad, Anand
See also:  –

The scope of this report is to highlight alternative solutions that could be used to protect mobile subscribers from receiving unsolicited communication over IMS and to analyze these solutions in respect of their requirements and impacts on standardized interfaces.

This activity took into account the study done in TISPAN TR 187 009 on 'Feasibility study of prevention of unsolicited communications in the NGN'.


 

Here   Top   None   None   Next
1…      7.3…     

 

 

1  ScopePDF-p. 8
2  References
3  Definitions, Symbols and AbbreviationsPDF-p. 9
4  System Environment for PUCIPDF-p. 11
5  PUCI Risk AnalysisPDF-p. 25
5.1  General
5.2  UC Threats & ScenariosUp
5.2.2  General Scenario
5.2.3  Privacy ViolationPDF-p. 26
5.2.4  Contentious Incoming Call Service Charge
5.2.5  Contentious Roaming Cost
5.2.6  Non-disclosure of Call Back Cost
5.2.7  Phishing
5.2.8  Network Equipment Hijacking
5.2.9  User Equipment HijackingPDF-p. 30
5.2.10  Mobile Phone Virus
5.2.11  Sender Impersonation UCUp
5.2.12  Unavailability of Service or Degraded Service Quality
5.2.13  Negative Service Preconception Leading to Non-adoptionPDF-p. 32
5.3  Specific UC threats in non-IMS inter-connections
6  Security RequirementsPDF-p. 36
7  Supporting Mechanisms and Solution AlternativesPDF-p. 37

Up   Top   ToC