Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.838
Study on PUCI (Protection against Unsolicited Communication for IMS)

V11.0.0 (Wzip)  2012/03  21 p.
Rapporteur:
Dr. Prasad, Anand
NEC Europe Ltd

full Table of Contents for  TR 33.838  Word version:  11.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 5
2References  p. 5
3Definitions, abbreviations  p. 6
3.1Definitions  p. 6
3.2Abbreviations  p. 6
4Definition of PUCI scope  p. 7
4.1Communication modes  p. 7
4.2Bulk communications vs targeted communications  p. 7
5Design principles and security requirements  p. 8
5.1Design principles  p. 8
5.2Security requirements  p. 8
6Preventive measures  p. 9
6.1Introduction  p. 9
6.2Non-technical prevention measures  p. 9
6.2.1General  p. 9
6.2.2Legislation  p. 9
6.2.3Contractual agreements between operators and their customers  p. 9
6.2.4Contractual agreements between different operators (SLAs)  p. 10
6.3Technical prevention measures  p. 10
7Interworking with non-IMS systems  p. 11
7.1Background  p. 11
7.1.1IETF Work on SIP Peering  p. 11
7.1.2Operator SPIT/UC interworking and source identification  p. 11
7.1.2.1Introduction  p. 11
7.1.2.2Interworking between mutually trusting VoIP operators  p. 12
8PUCI architectural considerations  p. 14
8.1Overview  p. 14
8.2PUCI information storage  p. 14
8.3PUCI function invocation  p. 14
8.4Compatibility with IMS centralized services, SRVCC, and service continuity  p. 15
8.4.1General  p. 15
8.4.2Mechanisms based on supplementary services  p. 15
8.4.3IMR  p. 15
9Solution alternatives  p. 15
9.1High level architecture  p. 15
10PUCI information exchange  p. 16
10.1PUCI information type and structure  p. 16
10.2PUCI information signalling  p. 17
10.3PUCI function communication  p. 19
10.4PUCI user notification  p. 20
11Conclusions and recommendations  p. 20
$Change history  p. 21

Up   Top