Tech-invite  3GPPspecsRELsGlossariesSIP
21222324252627282931323334353637384‑5x

Top   in Index   Prev   Next

TS 24.616CT1
Malicious Communication Identification (MCID)
using IMS

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.0.0 (Wzip)2019/12  24 p.
V15.0.0 (PDF)  2017/12  25 p.
V14.0.0  2017/03  26 p.
V13.0.0  2015/12  26 p.
V12.1.0  2014/06  26 p.
V11.1.0  2012/12  26 p.
V10.0.0  2011/03  26 p.
V9.2.0  2010/09  26 p.
V8.7.0  2010/09  26 p.

Rapporteur:  Mr. Kreipl, Michael

This TS specifies the stage three Protocol Description of the Malicious Call Communication Identification (MCID) service based on the stage one and two of ISDN Malicious Call Identification supplementary service. It provides the protocol details in the IP Multimedia (IM) Core Network (CN) subsystem based on the Session Initiation Protocol (SIP) and the Session Description Protocol (SDP). The MCID service will store session related information independent of the service requested.

full Table of Contents for  TS 24.616  Word version:   16.0.0

Here   Top
1  ScopeWord-p. 6
2  References
3  Definitions and abbreviationsWord-p. 7
4  Malicious Communication Identification (MCID)Word-p. 8
4.1  Introduction
4.2  Description
4.3  Operational requirements
4.4  Coding requirements
4.5  Signalling requirementsWord-p. 10
4.6  Interaction with other services
4.7  Interactions with other networks
4.8  Parameter values (timers)
A  Signalling FlowsWord-p. 15
B  Example of filter criteriaWord-p. 21
CVoid
DVoid
E  Change historyWord-p. 24

Up   Top