CONTENTS

 7     Malicious Call Identification (MCID)
        7.1     Scope
        7.2     References
        7.3     Definitions
        7.4     Symbols and abbreviations
        7.5     Description
        7.6     Derivation of the functional model
                  7.6.1     The functional model description
                  7.6.2     Description of the functional entities
                  7.6.3     Relationship with a basic service
        7.7     Information flows
                  7.7.1     Information flow diagrams
                  7.7.2     Definitions of individual information flows
        7.8     SDL diagrams for functional entities
                  7.8.1     FE1
                  7.8.2     FE2
                  7.8.3     FE3
                  7.8.4     FE4
        7.9     Functional Entity Actions (FEAs)
                  7.9.1     FEAs of FE1
                  7.9.2     FEAs of FE2
                  7.9.3     FEAs of FE3
                  7.9.4     FEAs of FE4
       7.10     Allocation of functional entities to physical localities
Annex A – Procedure to be included in the basic call process (Recommendation Q.71 [4])