Recommendation ITU-T X.1246 Amendment 1 (05/2022) Technologies involved in countering voice spam in telecommunication organizations
Summary
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of voice spam
     6.1 Voice communication scenarios
     6.2 Characteristics of voice spam
7 Technologies for countering voice spam
     7.1 General aspects
     7.2 Network-side technologies
          7.2.1 Signalling record and collect
               7.2.1.1 SS7 signalling
               7.2.1.2 Intelligent network (IN)
               7.2.1.3 Customized ring back tone (CRBT)
               7.2.1.4 Voice mail server (VMS)
               7.2.1.5 Honeypot
          7.2.2 Analysis
          7.2.3 Interactive verification
          7.2.4 Controlling
               7.2.4.1 Whitelists/blacklists
               7.2.4.2 Trace back mechanism
     7.3 User-side technologies
          7.3.1 Whitelists/blacklists
          7.3.2 Call-delay
          7.3.3 Feedback
     7.4 Collaboration mechanism
     7.5 Proposed solutions
Annex A  Interactive and technical measures to combat spam calls
     A.1 Interactive feedback scenario/algorithm/use case
     A.2 Technical requirements
Appendix I  Comprehensive measures on countering voice spam
Appendix II  A suggested solution for interactive verification
Appendix III  Policy considerations in countering voice spam
     III.1 Users
     III.2 Operators
     III.3 Management entities and third-party organizations
Bibliography
<\pre>