摘要:
It is desirable to allow mobile stations such as mobile telephones or cell phones to connect to a wireless cellular network even without the presence of a SIM card or other identification information. This is desirable for example, for access to emergency services. By configuring the mobile station to be able to populate replies to request for identification information during call set up which are received from the network, it is possible to avoid redesigning the network while providing “SIM-less” access to the network.
摘要:
A method of routing calls which require intelligent network (IN) services between a pair of subscribers, at least one of which subscribers is a mobile network subscriber. A mobile network (30) routes a call to an intelligent network (31) via a first path (32) to apply an IN service, and routes the call back to the mobile network via a second (33) or a third (34) path. Calls routed via the second path (33) are completed to the called party. Calls routed via the third path (34) may require further routing to the IN (31) prior to completion, such as where a different called party is involved or where a terminating IN service may be needed.
摘要:
According to one aspect of the present invention there is provided a method of preparing second protocol data for transmitting over a first protocol network comprising the steps of compressing the data to be transmitted in accordance with the first protocol, to produced first protocol compressed data and encrypting the first protocol compressed data in accordance with the first protocol to produce first protocol compressed and encrypted data. The invention consists of a means for the client to indicate to the first hop proxy that it wishes S/MIME encryption to be applied to part of an outgoing message. The first hop proxy then applies this encryption on behalf of the client. The encryption is therefore applied after the message has traversed the end terminal link. On the first proxy link, the message is sent without S/MIME encryption and can therefore benefit from compression (before the first hop IPSEC encryption is applied). A second aspect of the invention allows the support of end-to-end compression to be negotiated between end devices so that SIP compression can be applied to data before it is encrypted using S/MIME by the end system.