 |
Mobile messaging spam is proliferating dramatically along with the fast development of mobile messaging services. Unfortunately, no single measure has proved to be the silver bullet against mobile messaging spam. Therefore, it is necessary to establish a practical framework for countering mobile messaging spam. Recommendation ITU-T X.1247 gives an overview of mobile messaging anti-spam processes, and proposes a technical framework for countering mobile messaging spam. Entity functions and processing procedures are specified in this framework. In addition, this Recommendation provides information sharing mechanisms against mobile messaging spam within the anti-spam domain and among anti-spam domains.
Amendment 1 introduces the feedback mechanism from the client, receiving possible spam call (with voice, short message service (SMS) or multimedia messaging service (MMS)) to its operator. It provides technical requirements for telecommunication management systems and/or client support services to receive notifications of income spam calls, voice or messages (SMS/MMS). Scenarios of interactive interaction of clients with operators/service providers of telephone communication networks about incoming spam calls and the necessary technical measures to maintain such interaction are presented. Such interaction is based on making a call to the anti-spam number provided by the telecom operator in advance by the recipient of the spam call immediately after it is completed.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/14989 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1230-X.1249: Countering spam |
Approval date: |
2022-05-20 |
Provisional name: | X.tfcmm |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 6 (09/2009)
|
ITU-T X.1240 series – Supplement on countering spam and associated threats
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|