UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

- Trained on our vast library of engineering resources.

ITU-T X.1246

Technologies involved in countering voice spam in telecommunication organizations

active, Most Current
Buy Now
Organization: ITU-T
Publication Date: 1 September 2015
Status: active
Page Count: 26
scope:

This Recommendation gives an overview of voice spam and reviews existing technologies used to assist countering voice spam, including network-side and user-side technologies and the collaboration mechanism between them. In addition, this Recommendation also proposes additional practical anti-spam solutions, such as signalling records, interactive verification, controlling measures, etc.

This Recommendation focuses only on countering voice spam that has originated from the circuitedswitched area in telecommunication networks with specified consideration of the characteristics of the network infrastructure. The technologies for countering voice spam originating from the IP-based area should be referred to [ITU-T X.1244], [b-ITU-T X.1245] and [b-IETF RFC 5039]. The technologies that prevent the impersonation of caller identities are outside of the scope of this Recommendation.

Compliance with all relevant laws and regulations should be considered before adopting the antispam methods described in this Recommendation.

Document History

May 1, 2022
Technologies involved in countering voice spam in telecommunication organizations Amendment 1
This Recommendation gives an overview of voice spam and reviews existing technologies used to assist countering voice spam, including network-side and user-side technologies and the collaboration...
ITU-T X.1246
September 1, 2015
Technologies involved in countering voice spam in telecommunication organizations
This Recommendation gives an overview of voice spam and reviews existing technologies used to assist countering voice spam, including network-side and user-side technologies and the collaboration...

References

Advertisement