1、INTERNATIONAL TELECOM M UN CATI ON UNION ITU=T TELECOMMUNICATION STAN DARD IZATI ON SECTOR OF ITU Q.731.7 SERIES Q: SWITCHING AND SIGNALLING Specifications of Signalling System No. 7 - ISDN supplementary services (06/97) Stage 3 description for number identification supplementary services using Sign
2、alling System No. 7: Malicious call identification (MCID) TU-T Recommendation Q.731.7 (Previously CCIlT Recommendation) STD-ITU-T RECMN Q.731.7-ENGL 1997 m LiBb2591 Ob38388 b7b m ITU-T Q-SERIES RECOMMENDATIONS SWITCHING AND SIGNALLING SIGNALLING IN THE INTERNATIONAL MANUAL SERVICE INTERNATIONAL AUTO
3、MATIC AND SEMI-AUTOMATIC WORKING FUNCTIONS AND INFORMATION FLOWS FOR SERVICES IN THE ISDN SPECIFICATIONS OF SIGNALLING SYSTEMS No. 4 AND No. 5 SPECIFICATIONS OF SIGNALLING SYSTEM No. 6 SPECIFICATIONS OF SIGNALLING SYSTEM RI SPECIFICATIONS OF SIGNALLING SYSTEM R2 DIGITAL EXCHANGES INTERWORKING OF SIG
4、NALLING SYSTEMS SPECIFICATIONS OF SIGNALLING SYSTEM No. 7 CLAUSES APPLICABLE TO ITU-T STANDARD SYSTEMS General Message transfer part (MTP) Signalling connection control part (SCCP) Q.1-Q.3 Q. 4-Q . 59 Q.60-Q.99 Q.100-Q.119 Q.120-Q.249 Q.250-Q.309 Q.310-Q.399 Q.400-Q.499 Q .500-Q. 599 Q.600-Q.699 Q ,
5、700-Q. 849 Q.700 Q.701-Q.709 Q.711-Q.719 II Telephone user part (TUP) Q. 720-Q ,729 Data user part Q.740-Q.749 Signalling System No. 7 management ISDN user part Transaction capabilities application part Test specification Q3 interface General Data link layer Network layer User-network management Sta
6、ge 3 description for supplementary services using DSS 1 DIGITAL SUBSCRIBER SIGNALLING SYSTEM No. 1 PUBLIC LAND MOBILE NETWORK INTERWORKING WITH SATELLITE MOBILE SYSTEMS INTELLIGENT NETWORK BROADBAND ISDN Q.750-Q.759 Q.760-Q.769 Q.770-Q.779 Q.780-Q.799 Q. 800-Q.849 Q.850-Q.999 Q.850-Q.919 Q. 920-Q.92
7、9 Q.930-Q.939 Q. 940-Q. 949 Q.950-Q. 999 Q. 1000-Q. I O99 Q.1100-Q.1199 Q.1200-Q.1999 Q.2000-Q.2999 For further details, please refer to ITU-T List of Recommendations. ITU-T RECOMMENDATION 4.731.7 STAGE 3 DESCRIPTION FOR NUMBER IDENTIFICATION SUPPLEMENTARY SERVICES USING SIGNALLING SYSTEM NO. 7: MAL
8、ICIOUS CALL IDENTIFICATION (MCID) Summary This Recommendation defines the essential functions, procedures and messages of the ISUP protocol required for the provisioning to ISDN users of the Malicious Call Identification supplementary service, which enables a user to request that the source of an in
9、coming call is identified and registered in the network. Source ITU-T Recommendation 4.73 1.7 was prepared by ITU-T Study Group 11 (1997-2000) and was approved under the WTSC Resolution No. 1 procedure on the 5th of June 1997. STD-ITU-T RECMN Q.731.7-ENGL 1997 48b259L b38370 224 FOREWORD ITU (Intern
10、ational Telecommunication Union) is the United Nations Specialized Agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (IT-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommend
11、ations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics.
12、The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down in WTSC Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommend
13、ation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use
14、 of a claimed Intellectual Property Right. The IT takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendati
15、on, the ITU hadhad not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O
16、 ITU 1997 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the IT. Recommendation Q.73 1.7 (06/97) 11 . STD-ITU-T RECMN Q-732-7-ENGL 2997 = 48
17、b257L Ob38371 LbO 9 7 7.1 7.2 7.3 7.4 7.5 7.6 CONTENTS Malicious Call Identification (MCID) Introduction 7.1.1 Scope . 7.1.2 References . 7.1.3 Terms and definitions Description . 7.2.1 General description . 7.2.2 Specific terminology . Qualification on the applicability to telecommunications servic
18、es . Operational requirements . Requirements on the originating network side Requirements in the network Requirements on the destination network side Coding requirements Signalling requirements 7.5.1 Activatioddeactivationregistration 7.5.2 Invocation and operation . Interactions with other suppleme
19、ntary services 7.2.3 7.2.4 State definitions . 7.3.1 Provisionwithdrawal 7.3.2 7.3.3 7.3.4 7.6.1 7.6.2 7.6.3 7.6.4 7.6.5 7.6.6 7.6.7 7.6.8 7.6.9 7.6.1 O 7.6.1 1 7.6.12 7.6.13 7.6.14 7.6.15 7.6.16 7.6.17 Call Waiting (CW) Call transfer services . Connected Line Identification Presentation (COLP) Conn
20、ected Line Identification Restriction (COLR) Calling Line Identification Presentation (CLIP) . Calling Line Identification Restriction (CLIR) . Closed User Group (CUG) Conference Calling (CONF) . Direct-Dialling-In (DDI) . Line Hunting (LH) Call Diversion (call forwarding) services (CDIV) Three-Part
21、y Service (3PTY) User-to-User Signalling (UUS) . Multiple Subscriber Number (MSN) . Advice of Charge (AOC) Call Hold (HOLD) Sub-addressing (SUB) . Page 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 5 5 5 5 5 5 5 5 5 5 5 6 6 6 6 6 6 7 . Recommendation Q.73 1.7 (06/97) 111 STD-ITU-T RECMN Q.73L-7-ENGL L997 D
22、48b2571 Ob38392 UT7 7.6.18 7.6.19 7.6.20 7.6.2 1 7.6.22 7.6.23 7.6.24 Terminal Portability (TP) Completion of Calls to Busy Subscriber (CCBS) . Malicious Call Identification (MCID) . Reverse Charging (REV) Multi-level precedence and preemption (MLPP) Private Numbering Plan (PNP) . International Tele
23、communication Charge Card 7.7 Interactions with other networks 7.8 Signalling flows 7.9 Parameter value (timers) . Page 7 7 7 7 7 7 7 7 7 8 iv Recommendation Q.731.7 (06/97) Recommendation Q.731.7 STAGE 3 DESCRIPTION FOR NUMBER IDENTIFICATION SUPPLEMENTARY SERVICES USING SIGNALLING SYSTEM No. 7: MAL
24、ICIOUS CALL IDENTIFICATION (MCID) (Geneva, 1997) 7 Malicious Call Identification (MCID) 7.1 Introduction 7.1.1 Scope The Malicious Call Identification (MCID) supplementary service enables a user to request that the source of an incoming call is identified and registered in the network. 7.1.2 Referen
25、ces The following ITU-T Recommendations, and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; all u
26、sers of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. i ITU-T Recommendation I. 1 12 (1 993), Vocabu
27、lary of terms for ISDNs. 2 CCITT Recommendation 1.130 (1988), Method for the characterization of telecommunication services supported by an ISDN and network capabilities of an ISDN. 3 ITU-T Recommendation 1.21 O (1 993), Principles of telecommunication services supported by an ISDN and the means to
28、describe them. 4 CCITT Recommendation 1.250 (1 988), Definition of supplementary services. 5 ITU-T Recommendation E. 164 (1 9971, The international public telecommunication numbering plan. 6 CCITT Recommendation 1.25 1.7 (1 992), Number identijcation supplementary services: Malicious Call Identijcat
29、ion. 7 ITU-T Recommendation Q.Sl.7 (1997), Stage 2 description for number identlJication supplementary services: Malicious Call Identification (MCID). 8 ITU-T Recommendation 4.730 (1 993), ISDN supplementary services. 9 ITU-T Recommendation 4.761 (1993), Functional description of the ISDN user part
30、of Signalling System No. 7. lo ITU-T Recommendation 4.762 (1993), General function of messages and signals of the ISDN user part of Signalling System No. 7. li ITU-T Recommendation Q.763 (1993), Formats and codes of the ISDN user part of Signalling System No. 7. Recommendation Q.731.7 (06/97) 1 STD-
31、ITU-T RECMN Q.73LJ-ENGL 1797 48b257L Ob3839Y 77T = 121 131 ITU-T Recommendation 4.764 (1 993), ISDN user part signallingprocedures. ITU-T Recommendation Q.95 1.7 (1 997), Stage 3 description for number identjcation supplementary services using DSS 1 : Malicious Call Ident$cation (MCID). 7.1.3 Terms
32、and definitions None identified. 7.2 Description 7.2.1 General description The Malicious Call Identification supplementary service gives the possibility to obtain by an appropriate request, the identification of the calling party. The identification request invokes, in the destination exchange, the
33、registration of the following items: - called party number; - calling party number; - - As a national option, besides the above registration of call information, the holding of the connection may be provided until the intervention of the Service Provider. The stage 1 description of the Malicious Cal
34、l Identification supplementary service is given in Recommendation 1.251.7 6. The stage 2 description is given in Recommendation Q.81.7 7. The stage 3 DSS 1 description is given in Recommendation Q.951.7 13. This stage 3 description of the Malicious Call Identification supplementary service uses the
35、ISUP user part protocol as defined in Recommendations Q.761 9-Q.764 12 and Q.730 SI. time and date of the call;. optionally: calling party sub-address (if provided). 7.2.2 Specific terminology See 7.1.3, Terms and definitions. 7.2.3 Provision and withdrawal of the MCID supplementary service are spec
36、ified in Recommendation 1.25 1.7 6. Qualification on the applicability to telecommunications services 7.2.4 State definitions No specific state definitions are required. 7.3 Operational requirements 7.3.1 Provision/withdrawal See Recommendation 1.25 1.7 6. 7.3.2 Not applicable. Requirements on the o
37、riginating network side 7.3.3 Requirements in the network No specific requirements are needed in the network. 2 Recommendation Q.731.7 (06/97) 7.3.4 Not applicable. Requirements on the destination network side. 7.4 Coding requirements Recommendation Q.763 li defines the messages and parameters for t
38、he MCID supplementary service. The following messages and parameters are used to support the MCID supplementary service. 4 Messages - Identification request. - Identification response. b) Parameters - MCID request indicators. - MCID response indicators. The Identification request and Identification
39、response messages are accompanied by the Message compatibility information parameter. The MCID request and MCID response indicators are accompanied by the Parameter compatibility information parameter. The procedures for compatibility are defined in Recommendation 4.764 121. 7.5 Signalling requireme
40、nts 7.5.1 Activation/deactivation/registration No specific signalling requirements for activation, deactivation and registration are identified. 7.5.2 Invocation and operation 7.5.2.1 Actions at the originating local exchange 7.5.2.1.1 Normal operation On receipt of the Identification request messag
41、e with bit A of the MCID request indicator set to 1, the originating local exchange sends an Identification response message with bit A of the MCID response indicator set to 1. The number information of the calling user is included in the Calling party number parameter. When the MCID information is
42、not available, an Identification response message with bit A of the MCID response indicator set to O is returned. The originating local exchange must be able to support the MCID request until the reception of the Answer or Connect message. 7.5.2.1.2 Exceptional procedures When the MCID supplementary
43、 service is not supported, an Identification response message with bit A of the MCID response indicator set to O is returned. 7.5.2.2 Actions at the transit exchange 7.5.2.2.1 Normal operation The transit exchange shall pass a received Identification request message transparently to the preceding ex
44、change. The subsequent Identification response message is passed transparently to the succeeding exchange. Recommendation 4.731.7 (06/97) 3 STD = ITU-T RECMN Q.731.7-ENGL 1997 48b2571 Ob3839b 742 m 7.5.2.2.2 Exceptional procedures No exceptional procedures are identified. 7.5.2.3 Actions at the outg
45、oing international gateway exchange 7.5.2.3.1 Normal operation An outgoing international exchange shall pass a received Identification request message transparently into the national network. The subsequent Identification response message is passed into the international network. The outgoing intern
46、ational gateway exchange shall add the country code to the number(s) (if necessary) according to the procedures for the CLIPKLIR supplementary services and set the nature of address indicator(s) accordingly. 7.5.2.3.2 Exceptional procedures When the MCID supplementary service is not supported, an Id
47、entification response message with bit A of the MCID response indicator set to O is returned. 7.5.2.4 Actions at the incoming international gateway exchange 7.5.2.4.1 Normal operation An incoming international exchange shall pass a received Identification request message transparently into the inter
48、national network. The subsequent Identification response message is passed into the national network. The incoming international gateway exchange shall treat the Calling party number parameter included in an Identification response message according to the procedures for the CLIP/CLIR supplementary
49、service. 7.5.2.4.2 Exceptional procedures When the Identification response message is received with bit A of the MCID response indicator set to O, the incoming international gateway exchange may modi this indicator according to the information available in the exchange. 7.5.2.5 Actions at the destination local exchange 7.5.2.5.1 Normal procedure In the case of an incoming call to a user having the MCID supplementary service, the call Set-up procedure depends on whether or not the complete calling party number is included in