RFC 3087 (rfc3087) - Page 2 of 39
Control of Service Context using SIP Request-URI
Alternative Format: Original Text Document
RFC 3087 SIP Service Control April 2001
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 3
2. Example Application . . . . . . . . . . . . . . . . . . . 3
2.1 Using URIs to Control Voice Mail Service Behavior . . . . 3
3. Voice Mail Scenario Descriptions . . . . . . . . . . . . . 5
3.1 Deposits . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1.1 Direct Request to Deposit to a particular mailbox . . . . 5
3.1.1.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1.1.2 Arbitrary PSTN source . . . . . . . . . . . . . . . . . . 5
3.1.1.3 Recognized PSTN source . . . . . . . . . . . . . . . . . . 6
3.1.2 Direct Request to Deposit, mailbox to be determined . . . 6
3.1.2.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . . 6
3.1.2.2 PSTN source . . . . . . . . . . . . . . . . . . . . . . . 6
3.1.2.3 Indirect Request to Deposit, due to find-me proxy decision 6
3.2 Retrievals . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2.1 Request to Retrieve from a particular mailbox . . . . . . 7
3.2.1.1 Trusted SIP source . . . . . . . . . . . . . . . . . . . . 7
3.2.1.2 Authenticated SIP source . . . . . . . . . . . . . . . . . 7
3.2.1.3 Unauthenticated SIP source . . . . . . . . . . . . . . . . 7
3.2.1.4 PSTN source . . . . . . . . . . . . . . . . . . . . . . . 7
3.2.2 Request to Retrieve, mailbox to be determined . . . . . . 7
3.2.2.1 SIP source . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2.2.2 Arbitrary PSTN source . . . . . . . . . . . . . . . . . . 8
3.2.2.3 Recognized PSTN source . . . . . . . . . . . . . . . . . . 8
4. Voice Mail Call Flow Examples . . . . . . . . . . . . . . 8
4.1 Generic Scenario . . . . . . . . . . . . . . . . . . . . . 8
4.1.1 Direct call to the voice mail system . . . . . . . . . . . 8
4.2 Message Deposit Scenarios . . . . . . . . . . . . . . . . 13
4.2.1 Call to known subscriber forwarded on no answer . . . . . 13
4.2.2 Call to known subscriber forwarded on busy . . . . . . . . 19
4.2.3 Direct call to a subscriber's mailbox . . . . . . . . . . 24
4.3 Message Retrieval Scenarios . . . . . . . . . . . . . . . 29
4.3.1 Call to retrieve messages believed to be from a known
subscriber . . . . . . . . . . . . . . . . . . . . . . . . 29
4.3.2 Call to retrieve messages from an authenticated subscriber 33
5. Security Considerations . . . . . . . . . . . . . . . . . 38
6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . 38
References . . . . . . . . . . . . . . . . . . . . . . . . 38
Authors' Addresses . . . . . . . . . . . . . . . . . . . . 38
Full Copyright Statement . . . . . . . . . . . . . . . . . 39
Campbell & Sparks Informational