ITU-T M 3210 1-2001 TMN management services for IMT-2000 security management (Study Group 4)《国际移动通信-2000(IMT-2000)安全管理的TMN管理业务》.pdf
《ITU-T M 3210 1-2001 TMN management services for IMT-2000 security management (Study Group 4)《国际移动通信-2000(IMT-2000)安全管理的TMN管理业务》.pdf》由会员分享,可在线阅读,更多相关《ITU-T M 3210 1-2001 TMN management services for IMT-2000 security management (Study Group 4)《国际移动通信-2000(IMT-2000)安全管理的TMN管理业务》.pdf(28页珍藏版)》请在麦多课文档分享上搜索。
1、 INTERNATIONAL TELECOMMUNICATION UNION ITU-T M.3210.1 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2001) SERIES M: TMN AND NETWORK MAINTENANCE: INTERNATIONAL TRANSMISSION SYSTEMS, TELEPHONE CIRCUITS, TELEGRAPHY, FACSIMILE AND LEASED CIRCUITS Telecommunications management network TMN managemen
2、t services for IMT-2000 security management ITU-T Recommendation M.3210.1 (Formerly CCITT Recommendation) ITU-T M-SERIES RECOMMENDATIONS TMN AND NETWORK MAINTENANCE: INTERNATIONAL TRANSMISSION SYSTEMS, TELEPHONE CIRCUITS, TELEGRAPHY, FACSIMILE AND LEASED CIRCUITS Introduction and general principles
3、of maintenance and maintenance organization M.10M.299 International transmission systems M.300M.559 International telephone circuits M.560M.759 Common channel signalling systems M.760M.799 International telegraph systems and phototelegraph transmission M.800M.899 International leased group and super
4、group links M.900M.999 International leased circuits M.1000M.1099 Mobile telecommunication systems and services M.1100M.1199 International public telephone network M.1200M.1299 International data transmission systems M.1300M.1399 Designations and information exchange M.1400M.1999 International trans
5、port network M.2000M.2999 Telecommunications management network M.3000M.3599 Integrated services digital networks M.3600M.3999 Common channel signalling systems M.4000M.4999 For further details, please refer to the list of ITU-T Recommendations. ITU-T M.3210.1 (01/2001) i ITU-T Recommendation M.3210
6、.1 TMN management services for IMT-2000 security management Summary This Recommendation is one of the series of M.3200 Recommendations on TMN Management Services that provide description of management services, goals and context for management aspects of IMT-2000 networks. This Recommendation provid
7、es a profile for fraud management in an IMT-2000 mobile network. This Recommendation builds on the function sets identified in ITU-T M.3400 by defining new function sets, functions and parameters and adding additional semantics and restrictions. Source ITU-T Recommendation M.3210.1 was prepared by I
8、TU-T Study Group 4 (2001-2004) and approved under the WTSA Resolution 1 procedure on 19 January 2001. Keywords Telecommunications Management Network (TMN), TMN Management Service, International Mobile Telecommunications: IMT-2000, Security Management, Fraud Detection and Containment, Third Generatio
9、n Wireless 3G Systems. ii ITU-T M.3210.1 (01/2001) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for stud
10、ying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study grou
11、ps which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with I
12、SO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Reco
13、mmendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of ap
14、proval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TS
15、B patent database. ITU 2001 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from ITU. ITU-T M.3210.1 (01/2001) iii CONTENTS Page 1 Introduction. 1
16、 1.1 Purpose and scope. 1 2 References. 1 3 Definitions 1 3.5 Role-related definitions. 2 4 Abbreviations and acronyms 2 4.1 Conventions 2 5 Security Management Service 3 5.1 Security issues. 3 5.2 Management Service description 3 6 Management high-level requirements 4 6.1 Management Service overvie
17、w. 6 6.2 Telecommunication resources 6 6.2.1 Fraud Information Gathering System (FIGS) 6 6.2.2 Visited Network. 7 6.2.3 Home Network Fraud Detection System (HN-FDS). 7 6.3 Fraud Information Gathering use cases 7 6.3.1 Fraud Alert use case 8 6.3.2 Activate Information Gathering use case 8 6.3.3 Repor
18、t FIGS use case 9 6.3.4 Deactivate Information Gathering use case. 9 6.3.5 Modify FIGS Report use case . 10 6.3.6 Advise Suspend FIGS Monitoring use case 10 6.3.7 Advise Resume FIGS Monitoring use case. 11 7 Management Functions analysis. 11 7.1 Fraud Information Gathering Function set . 11 7.2 Obje
19、ct Classes and State Chart . 11 7.3 Fraud Information Gathering functions and sequence diagrams 13 7.3.1 Fraud Alert function 13 7.3.2 Activate Information Gathering function 13 7.3.3 Report FIGS function 14 7.3.4 Deactivate Information Gathering function. 15 7.3.5 Modify FIGS Report function . 16 7
20、.3.6 Advise Suspend FIGS Monitoring function 18 7.3.7 Advise Resume FIGS Monitoring function. 19 iv ITU-T M.3210.1 (01/2001) Page Annex A Fraud Management criteria 20 Annex B Information transferred by the Visited Network . 21 ITU-T M.3210.1 (01/2001) 1 ITU-T Recommendation M.3210.1 TMN management s
21、ervices for IMT-2000 security management 1 Introduction This Recommendation provides requirements and analysis of the security management (administration) of IMT-2000. The emphasis is on the X interface between two service providers and the management services needed between the two service provider
22、s to detect and prevent fraud. The methodology used in this Recommendation is based on ITU-T M.3020. 1.1 Purpose and scope This Recommendation describes a subset of security management services, identified in ITU-T M.3200 as a TMN managed area, for IMT-2000 management. It describes the requirements
23、and analysis of operating the Fraud Information Gathering System (FIGS) between service providers. FIGS provides the means for the wireless service provider to monitor a defined set of subscriber activities. The aim is to enable service providers/network operators to use FIGS to limit their financia
24、l exposure to large unpaid bills produced on subscriber accounts whilst the subscriber is roaming outside their home areas. Verification of the authenticity of the Home Network-FDS and the Visited Service Provider is beyond the scope of this management service. 2 References The following ITU-T Recom
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTM321012001TMNMANAGEMENTSERVICESFORIMT2000SECURITYMANAGEMENTSTUDYGROUP4 国际 移动 通信 2000 IMT2000 安全管理

链接地址:http://www.mydoc123.com/p-800173.html