CONTENTS

7 Malicious Call Identification (MCID)
7.1 Scope
7.2 References
7.3 Definitions
7.4 Abbreviations
7.5 Description
7.6 Operational requirements
7.6.1 Provision/withdrawal
7.6.2 Requirements on the originating network side
7.6.3 Requirements on the terminating network side
7.7 Coding requirements
7.8 State definitions
7.9 Signalling requirements
7.9.1 Activation/deactivation/registration
7.9.2 Invocation and operation
7.10 Procedures for interworking with private ISDNs
7.11 Interactions with other networks
7.11.1 Interactions with non-ISDNs
7.12 Interactions with other supplementary services
7.12.1 Call waiting
7.12.2 Explicit call transfer
7.12.3 Connected line identification presentation
7.12.4 Connected line identification restriction
7.12.5 Calling line identification presentation
7.12.6 Calling line identification restriction
7.12.7 Closed user group
7.12.8 Conference calling
7.12.9 Direct dialling in
7.12.10 Call diversion (call forwarding) services
7.12.11 Line hunting
7.12.12 Three-Party service
7.12.13 User-to-user signalling
7.12.14 Multiple subscriber number
7.12.15 Call hold
7.12.16 Advice of charge
7.12.17 Subaddressing
7.12.18 Terminal portability
7.12.19 Completion of calls to busy subscribers
7.12.20 Malicious call identification
7.12.21 Reverse charging
7.12.22 Multilevel precedence and preemption
7.12.23 Support of private numbering plan
7.12.24 International telecommunication charge card
7.12.25 Global virtual network services
7.13 Parameter values (timers)
7.14 Dynamic description (SDLs)
Appendix I Signalling flows