Table of Contents
7MaliciousCallIdentification(MCID)
7.1Scope
7.2References
7.3Definitions
7.4Abbreviations
7.5Description
7.6Operationalrequirements
7.6.1Provision/withdrawal
7.6.2Requirementsontheoriginatingnetwork
side
7.6.3Requirementsontheterminatingnetworkside
7.7Codingrequirements
7.8Statedefinitions
7.9Signallingrequirements
7.9.1Activation/deactivation/registration
7.9.2Invocationandoperation
7.10ProceduresforinterworkingwithprivateISDNs
7.11Interactionswithothernetworks
7.11.1Interactionswithnon-ISDNs
7.12Interactionswithothersupplementaryservice
7.12.1Callwaiting
7.12.2Explicitcalltransfer
7.12.3Connectedlineidentificationpresentation
7.12.4Connectedlineidentificationrestriction
7.12.5Callinglineidentificationpresentation
7.12.6Callinglineidentificationrestriction
7.12.7Closedusergroup
7.12.8Conferencecalling
7.12.9Directdiallingin
7.12.10Calldiversion(callforwarding)services
7.12.11Linehunting
7.12.12Three-Partyservice
7.12.13User-to-usersignalling
7.12.14Multiplesubscribernumber
7.12.15Callhold
7.12.16Adviceofcharge
7.12.17Subaddressing
7.12.18Terminalportability
7.12.19Completionofcallstobusysubscribers
7.12.20Maliciouscallidentification
7.12.21Reversecharging
7.12.22Multilevelprecedenceandpreemption
7.12.23Supportofprivatenumberingplan
7.12.24Internationaltelecommunicationchargecard
7.12.25Globalvirtualnetworkservices
7.13Parametervalues(timers)
7.14Dynamicdescription(SDLs)
AppendixISignallingflows
Abstract
Allows a user to request that the source of an incoming call is identified and registered in the network.