ITU-T I 251 7 (REV 1)-1992 Malicious Call Identification (Study Group I) 10 pp《恶意呼叫识别(研究组I)共10页》.pdf
《ITU-T I 251 7 (REV 1)-1992 Malicious Call Identification (Study Group I) 10 pp《恶意呼叫识别(研究组I)共10页》.pdf》由会员分享,可在线阅读,更多相关《ITU-T I 251 7 (REV 1)-1992 Malicious Call Identification (Study Group I) 10 pp《恶意呼叫识别(研究组I)共10页》.pdf(10页珍藏版)》请在麦多课文档分享上搜索。
1、CCITT RECMN*I-25L- 7*(REV*L) 92 W 4862591 0573847 855 INTERNATIONAL TELECOMMUNICATION UNION CCITT 1.251.7 (rev.1) THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE INTEGRATED SERVICES DIGITAL NETWORK (ISDN) GENERAL STRUCTURE AND SERVICE CA PA B I LITI ES MALICIOUS CALL IDENTIFICATION
2、Recommendation 1.251.7 (rev.1) Geneva, 1992 FOREWORD The CCIlT (the International Telegraph and Telephone Consultative Committee) is a permanent organ of the International Telecommunication. Union (IT). CCIiT is responsible for studying technical, operating and tariff questions and issuing Recommend
3、ations on them with a view to standardizing telecommunications on a worldwide basis. The Plenary Assembly of CCI“T which meets every four years, establishes the topics for study and approves Recommendations prepared by its Stlidy Groups. The approval of Recommendations by the members of CCIlT betwee
4、n Plenary Assemblies is covered by the procedure laid down in CCl“ Resolution No. 2 (Melbourne, 1988). Recommendation 1.251.7 was prepared by Study Group I and was approved under the Resolution No. 2 procedure on the 4th of August 1992. CCITT NOTE In this Recommendation, the expression “Administrati
5、on“ is used for conciseness to indicate both a telecommunication Administration and a recognized private operating agency. O IT 1992 Ail rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microf
6、ilm, without permission in writing from the ITU. Recommendation 1.251.7 MALICIOUS CALL IDENTIFICATION (revised 1992) 1 Definition Maiicious Call Identification is a Supplementary service offered to the called party which enables the called party to request that the calling party be identified to the
7、 network and be registered in the network. Note - This would be used by the called party on cails considered to be malicious. 2 Description 2.1 General description Malicious Call Identification (MCID) gives an integrated services digital network (ISDN) user the possibility to cause, by an appropriat
8、e request, the registration in the network of the following items: - called party number; - calling party number; - local time and date of the invocation in the network serving the called user; and - as a service provider option: calling party sub-address (if provided by the calling user). In the ca
9、se of interaction with other supplementary services, it may be required to register more information (see 0 6). The location of the registration function in the served users network is a matter of implementation. The information will not be available to the terminal equipment under the control of th
10、e called user nor the calling user. The information will be stored at a location(s) under the control of the network operator. The provision of call information for MCID purposes on calls between different networks is subject to bilateral agreement between the service providers involved. Furthermore
11、, the provision of call information for MCID purposes across international boundaries wiil be subject to bilateral agreement between the legal authorities of the countries involved. The MCID supplementary service can either be invoked during or after the active phase of the call, but before the call
12、ed user has cleared. Other alternatives are for further study (see 0 3.2.2). A network subscription option may be provided which allows automatic invocation of MCID on calls to the served user which are not answered. As a network option, besides the above registration of call information, the connec
13、tion may be held automatically for legal purposes, on invocation of MCID until the intervention of the service provider. This option is beyond the scope of this Recommendation. Recommendation 1.251.7 1 2.2 Specijc terminology Calling party number: This is the public network provided number which ide
14、ntifies either the calling party or at least the access into the public network of the call from the calling party. Served user: A called user to whom the MCID supplementary service has been provided. 2.3 Qualijcation on the applicability to telecommunication services This supplementary service is a
15、pplicable to all telecommunication services. 3 Procedures 3.1 Provisiodwithdrawal This service shall be provided and withdrawn after pre-arrangement with the service provider, in accordance with national legal requirements. A network subscription option may be provided which allows automatic invocat
16、ion of MCID on calls to the served user which are not answered. Note - The purpose of this option is to allow for registration of calls that ring for a short time only. 3.2 Normalprocedures 3.2.1 Activatioddeactivatiodregistration The MCID supplementary service is activated at provision and deactiva
17、ted at withdrawal, under the control of the service provider. 3.2.2 Invocation and operation The served user can invoke the Malicious Call Identification supplementary service by an appropriate procedure in the following cases: - Before answer (as a service provider option). Note - A typical example
18、 is where a called user may have received a Calling Line Identification (CLI), but wishes to “register” the incoming call with the exchange, possibly without answering the call. (This option is for further study.) During the active phase of the call: This is the normal situation. In this instance, t
19、he called user should be able to continue with the call after invocation of MCID. After the calling party has cleared This would be possible during the limited time the network is awaiting the called users reaction to the network disconnect indication, unless MCID has already been invoked for that c
20、all. After called party has cleared (network option): This would be possible during a short time-out period. (This option is for further study.) - - - Successful invocation will result in registration of the call information described in 0 2.1, The served user should be informed by an appropriate ac
21、knowledgement that the registration has been performed, If the option described in 0 3.1 is subscribed to by the served user, MCID will be invoked automatically by the network at the clearance of all or particular calls to the served user which have not been answered. 2 Recommendation 1.251.7 CCITT
22、RECMNaI.251. 7*(REV*3) 92 m 4862591 0573853 286 m Note - Restrictions may be applied to automatic invocation in order to avoid excessive registration of call information on unanswered calls. Such restrictions may consist of, e.g.: - automatic invocation only on “short” unanswered calls, i.e. those w
23、hich are terminated within a certain time interval after presentation (e.g. 10 seconds); automatic invocation only during certain periods of the day (e.g. night hours). - If on an answered call, the calling user disconnects first, the network should allow the served (= called) user to invoke MCID wi
24、thin the normal time-out applied by the network awaiting the called users reaction to the network disconnect indication, unless MCID has already been invoked for that call. 3.3 Exceptional procedures 3.3.1 Activatioddeactivatiodregistration Not applicable. 3.3.2 Invocation and operation If an invoca
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTI2517REV11992MALICIOUSCALLIDENTIFICATIONSTUDYGROUPI10PP 恶意 呼叫 识别 研究 10 PDF

链接地址:http://www.mydoc123.com/p-798180.html