adhoc1----Page:13
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16 

Malicious Communication Identification (MCID) Issue 1 How to provide an indication of the malicious sessions from the UA to the network. The logging of the call information is independent of the origin presentation restrictions. The logged information will not be provided to the callee, but to the legal authorities. Possible solutions: a) Define a new event package to trigger the logging. The event package subscription will be performed as a fetch operation.
PPT Version