Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

Top   in Index   Prev   Next

TS 24.616 (CT1)
Malicious Communication Identification (MCID)
using IMS

3GPP‑Page   ETSI‑search   full‑ToC    
use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.0 (PDF)  2017/12  25 p.
V14.0.0  2017/03  26 p.
V13.0.0  2015/12  26 p.
V12.1.0  2014/06  26 p.
V11.1.0  2012/12  26 p.
V10.0.0  2011/03  26 p.
V9.2.0  2010/09  26 p.
V8.7.0  2010/09  26 p.


Rapporteur:  Mr. Kreipl, Michael
See also:

This TS specifies the stage three Protocol Description of the Malicious Call Communication Identification (MCID) service based on the stage one and two of ISDN Malicious Call Identification supplementary service. It provides the protocol details in the IP Multimedia (IM) Core Network (CN) subsystem based on the Session Initiation Protocol (SIP) and the Session Description Protocol (SDP). The MCID service will store session related information independent of the service requested.

full Table of Contents for  TS 24.616  Word version:   15.0.0

 

Here   Top

 

1  Scope [R8]Word-p. 6
2  References [R8]
3  Definitions and abbreviations [R8]Word-p. 7
4  Malicious Communication Identification (MCID) [R8]
4.1  Introduction
4.2  DescriptionWord-p. 8
4.3  Operational requirements
4.4  Coding requirementsWord-p. 9
4.5  Signalling requirements
4.6  Interaction with other services
4.7  Interactions with other networks
4.8  Parameter values (timers)
A  Signalling Flows [R8]Word-p. 15
B  Example of filter criteria [R8]Word-p. 21
CVoid
DVoid
E  Change historyWord-p. 25

Up   Top